Attack Detection and Mitigation for AGC
Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 3
Abstract
Cyber systems play a critical role in improving the efficiency and reliability of power system operation and ensuring the system remains within safe operating margins. An adversary can inflict severe damage to the underlying physical system by compromising the control and monitoring applications facilitated by the cyber layer. There is a growing need for cyber-attack-resilient control techniques that look beyond traditional cyber defense mechanisms to detect highly skilled attacks. In this paper, we make the following contributions. We first demonstrate the impact of data integrity attacks on Automatic Generation Control (AGC) on power system frequency and electricity market operation. We propose a general framework to the application of attack resilient control to power systems as a composition of smart attack detection and mitigation. Finally, we develop a model-based anomaly detection and attack mitigation algorithm for AGC. We evaluate the detection capability of the proposed anomaly detection algorithm through simulation studies. Our results show that the algorithm is capable of detecting scaling and ramp attacks with low false positive and negative rates. The proposed model-based mitigation algorithm is also efficient in maintaining system frequency within acceptable limits during the attack period.
Geotechnical Aspects for Roads on Expansive Soils
This paper presents some issues of geotechnical investigation for roads built on expansive soils. The aim of the study is to provide road ‎engineers with guidance on site investigation; field and laboratory identificatio...
Secure Information Transmission Based on Cryptography Fused with Steganography by using Metamorphic Video Encryption
Abstract: Metamorphic cryptography is the inconsistency between of cryptography and steganography. This combination will be used for the higher level of security has gained a lot of importance. Cryptography refers to the...
Enhancing the Protection scheme for FACTS-Based Transmission Lines using a Data Mining Model
This review paper is based on the use of the thyristor control series compensator (TCSC) for the fault zone identification and protection of FACTS based transmission lines by using data mining model with the use of ensem...
Security and Privacy Issues in High Level MANET Protocol
The High Level MANET Protocol is an application level routing protocol that was designed to support nomad workers performing mobile collaborative activities. Due to various security attacks and third party interference,...
An Exploratory Study on Infrastructure Financing in India
"ABSTRACT An Exploratory Study on Infrastructure Financing in India Infrastructure is one of crucial pillars of productivity in any economy. It not only attracts foreign direct investment, but also affects economic grow...