Classification of Disturbances and Cyber Attacks
Classification of Disturbances and Cyber Attacks
3, JUNE 2015
Abstract—Visualization and situational awareness are of vital Poor visibility across the power system may also cause the sig-
importance for power systems, as the earlier a power-system event nificance of an event to be misunderstood and lead to incorrect
such as a transmission line fault or cyber-attack is identified, the control actions by operators in control centers. Additionally, as
quicker operators can react to avoid unnecessary loss. Accurate
time-synchronized data, such as system measurements and device power systems increasingly depend on communication infras-
status, provide benefits for system state monitoring. However, the tructures to provide the wide-area monitoring and control,
time-domain analysis of such heterogeneous data to extract pat- power systems are exposed to the threat of cyber-attacks.
terns is difficult due to the existence of transient phenomena in the Cyber-attacks are another form of power-system contingency.
analyzed measurement waveforms. This paper proposes a sequen- Attacks that target power systems can exploit vulnerabilities in
tial pattern mining approach to accurately extract patterns of
power-system disturbances and cyber-attacks from heterogeneous control devices and communication links to corrupt the con-
time-synchronized data, including synchrophasor measurements, trol and measurement signals [2], [3], and interrupt monitoring
relay logs, and network event monitor logs. The term common algorithms [4]. Cyber-attacks that corrupt control and measure-
path is introduced. A common path is a sequence of critical system ment signals can be disguised as power-system disturbances or
states in temporal order that represent individual types of distur- control actions. Situational awareness technologies are needed,
bances and cyber-attacks. Common paths are unique signatures
for each observed event type. They can be compared to observed which distinguish between actual power-system disturbances
system states for classification. In this paper, the process of auto- related to natural events and cyber-attacks. The emphasis of
matically discovering common paths from labeled data logs is this work is not on classifying disturbance types as quite a
introduced. An included case study uses the common path-mining number of methods have been proposed to do so in the power
algorithm to learn common paths from a fusion of heterogeneous system, but on distinguishing between disturbances and cyber-
synchrophasor data and system logs for three types of distur-
bances (in terms of faults) and three types of cyber-attacks, which attacks. First, in the case that a cyber-attack impersonates a
are similar to or mimic faults. The case study demonstrates the disturbance or control action, proper classification will lead to
algorithm’s effectiveness at identifying unique paths for each type proper response. Classifying a cyber-attack as a disturbance or
of event and the accompanying classifier’s ability to accurately control action can lead to improper response and cause an out-
discern each type of event. age or other negative impacts on the power system. Conversely,
Index Terms—Common paths, cyber-attack detection, distur- incorrectly classifying a disturbance or control action as a
bances, symmetric and unsymmetrical faults, synchrophasor data cyber-attack can lead to improper response within the informa-
and device log mining. tion and communications technology (ICT) system. Second, a
single classifier, which identifies all types of power-system con-
I. I NTRODUCTION tingences, is needed as an input to automated event response
algorithms such as autonomic management frameworks, sys-
S ITUATIONAL awareness technologies have been stud-
ied and continuously improved for decades. The need to
continue situational awareness improvements is motivated by
tem integrity protection schemes (SIPS) [5], wide-area protec-
tion systems (WAPS) [6], and autonomic control frameworks
[7]. This paper presents a methodology to mine the patterns
recent power disturbances, which have led to large-scale black- for disturbances and cyber-attacks using a two-dimensional
outs [1]. A power-system disturbance, such as a transmission (2-D) graph from logged heterogeneous system data, to use the
line fault, can initiate a chain of reactions, which lead to a cas- common paths in the graph as signatures of each type of mod-
cading blackout if timely actions from operators are not taken. eled scenario, and finally, to classify specific disturbances and
cyber-attacks. For proof of concept, in the paper, we consider
Manuscript received July 01, 2014; revised September 18, 2014, December disturbances as different types of line-to-ground and line-to-line
18, 2014 and February 19, 2015; accepted March 22, 2015. Date of publication
April 08, 2015; date of current version June 02, 2015. Paper no. TII-14-0692. faults.
The authors are with the Department of Electrical and Computer Wide-area measurement systems (WAMS) couple time-
Engineering, Mississippi State University, Starkville, MS 39762 USA (e-mail: synchronized voltage, current, and frequency measurements
[email protected]; [email protected]; [email protected]).
with high-speed networks to allow improved power-system
Color versions of one or more of the figures in this paper are available online
at http://ieeexplore.ieee.org. situational awareness [8]. Compared with the traditional super-
Digital Object Identifier 10.1109/TII.2015.2420951 visory control and data acquisition (SCADA) systems that poll
1551-3203 © 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Jaypee Insituite of Information Technology-Noida Sec 128 (L3). Downloaded on February 13,2024 at 05:12:56 UTC from IEEE Xplore. Restrictions apply.
PAN et al.: CLASSIFICATION OF DISTURBANCES AND CYBER-ATTACKS IN POWER SYSTEMS 651
field sensors once per several seconds, synchrophasor systems in this work belong to masquerading and/or man-in-the-middle
allow measurement of up to 120 samples/s. Synchrophasor data (MITM) attacks that target physical devices such as phasor
were used in this work for two reasons. First, the common measurement units (PMU) and relays. These attacks may orig-
path-mining algorithm uses a set of observed system states inate from a compromised node in control center, sending
in temporal order as a signature for each observed event control commands or measurement packets covered by legiti-
type. Synchrophasor measurements enable identification of mate source IP addresses and legal packet formats. As such, it
fast-moving power-system events. Some power-system events is assumed that the masquerading packets cannot be detected
involve fast-changing behaviors and may last only a few mil- by traditional network intrusion detection systems. Validation
liseconds [9]. For example, zone 1 faults are typically set to of the common path-mining algorithm is based on simulated
be cleared instantly. The presence of a fault and the system data because actual synchrophasor data are not available for
response of opening the breaker to clear the fault take just researchers due to the proprietary nature of data, confiden-
a few cycles. These events can be missed by slower speed tiality issues, and lack of proper sharing mechanism among
measurement systems. Second, synchrophasor systems pro- researchers and institutes. Additionally, datasets captured from
vide more accurate system-state visibility due to the use of utilities contain a limited number of scenarios. This limits
time-synchronized measurements. The common path-mining diversity in the dataset. Some power-system scenarios are rare,
algorithm can leverage this improved visibility to track events especially cyber-attacks. Hardware-in-the-loop (HIL) simula-
related to a single event from multiple sensors. The relatively tion allows targeted dataset creation with realistic scenarios
high measurement frequency and time-synchronized charac- captured from the same commercial devices found in utilities.
teristic offered by WAMS create very large volumes of data The same datasets used in this work have also been used in [11]
and enable various applications including wide-area protection for synchrophasor data-mining research.
schemes (WAPS), and SIPS [5], [6], [10]. The common path- This work has three primary contributions that distinguish
mining algorithm is not dependent on synchrophasor systems. it from existing methods. First, this work demonstrates a new
Common path mining requires the ability to observe sequences classifier capable of distinguishing power-system disturbances
of events. Other devices such as fault data recorders or meters and cyber security attacks that interrupt power-system control
may potentially be substituted to detect events of interest. Using actions and mimic real disturbances. Compared to a similar
synchrophasor data alone is not enough to detect cyber-attacks. work in [11], the method described in this paper provides pre-
For example, a cyber-attack can mimic a real fault by first cise classifications of fault types and the types of cyber-attacks
injecting false measurements, then tripping the relay. Such with similar accuracy. Second, this work uses the common
mimicry cannot be detected with synchrophasor data alone. The path-mining algorithm to mine fused heterogeneous data and
status of other power-system components such as relays and create common paths for each known event type. The common
breakers is also available as time-synchronized data via syn- path-mining algorithm uses less memory when compared to tra-
chrophasor systems [10]. Combining synchrophasor data with ditional data mining methods that require data to be mapped
other system logs such as relay status log and network event into memory before mining. The smaller memory requirement
monitor logs can extend the situational awareness capabilities is achieved via a preprocessing step, which compresses the mas-
provided by a synchrophasor system to detect cyber-attacks. sive time-synchronized data into a sequence of system states,
However, this creates the challenge of how heterogeneous data aka paths, which require considerably less memory than storing
sources can be merged to train and use such a classifier. This all time-synchoronized measurements associated with an event.
paper provides a solution to this problem by proposing a Third, power systems are dynamic in nature, which leads to
data-mining approach that leverages the timestamped data to minor variations in system state for known scenarios. The clas-
extract temporal patterns, which can be used to describe system sifier presented in this paper learns by parsing datasets marked
behavior related to disturbances and cyber-attacks. Henceforth, with scenario type. The training process results in an ordered
disturbances and cyber-attacks are collectively referred to as sequence of system states, i.e., a path, representing each unique
scenarios. instance of a scenario found in the dataset. To avoid overfitting,
In this work, a pattern for a scenario is presented as a the common path-mining algorithm was developed to discover
common path that consists of a sequence of system states in critical states shared by similar paths representing the same sce-
temporal order. A system state in a common path is made up nario. The result of the common path algorithm is a merged set
of multiple instantaneous readings from available sensors from of paths representing all scenarios in the dataset. The classifier
the system. One advantage of the common path is that it over- matches monitored state-transition patterns to common paths
comes the difficulty in analyzing time-domain waveforms by of known scenarios to provide a specific classification of the
discovering the critical system states across very short time observed behavior.
intervals (in milliseconds). The automatic process of discov- The remainder of this paper is organized as follows.
ering common paths is introduced by using a case study in Section II presents related works including an overview of
a simulated three-bus two-line transmission system. For this other data-mining approaches used for classification of power-
work, a case study is provided, which considers disturbances system disturbances or cyber-attacks. Section III discusses the
including symmetric and asymmetric faults and different cyber- methodology, the process of common path mining, and the
attacks that mimic the single-line-to-ground (1LG) fault to con- classifier training and validation phases. Section IV introduces
fuse operators in the control center. The cyber-attacks studied the case study test bed, test data, and test data preprocessing
Authorized licensed use limited to: Jaypee Insituite of Information Technology-Noida Sec 128 (L3). Downloaded on February 13,2024 at 05:12:56 UTC from IEEE Xplore. Restrictions apply.
652 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 11, NO. 3, JUNE 2015
procedure. Section V presents the classification results of three can quickly exhaust available memory resources. The method
experiments. Section VI concludes this work and proposes proposed in this paper distinguishes itself from batch process-
future work. ing data-mining approaches by compressing fused synchropha-
sor and system log information into a set of system-state
transitions, which minimize memory requirements during the
II. R ELATED W ORKS
training step. Furthermore, the same compression scheme is
Current research on applying data mining to synchrophasor used during the classification step allowing the use of pattern
data for power-system fault and disturbance classification can matching to support real-time classification.
be found in [12] and [13]. The K-nearest neighbor algorithm The work presented in this paper uses a sequential data-
was used to classify three phase faults (3LG), voltage oscilla- mining approach to classify patterns from sequences of events.
tion, and voltage sag scenarios in [11]. The algorithm accuracy Sequential data mining is better suited for high-velocity and
is not provided in [12]. Hoeffding Tree-based stream data min- high-volume synchrophasor data streams because synchropha-
ing is used in [13]. This approach was able to classify 3LG sor data are discrete data but continuous in time. Additionally,
and 1LG faults grouped for binary classification with greater the common path-mining algorithm presented in this paper
than 90% accuracy. Both [12] and [13] used simulated power- can learn to classify traditional power-system contingencies,
system data. Both [12] and [13] propose methods to mine such as faults, and cyber-attacks against power systems which
synchrophasor data. However, both are designed for power- masquerade as traditional contingencies.
system measurement data only and do not incorporate any other Machine-learning approaches have also been applied to
types of system information. By only considering measurement detect cyber-attacks against power systems, but they do not
data, it is impossible to detect cyber-attacks such as fault replay consider power-system fault detection. In [21], detection rules
or command injection attacks in which valid measurements or were derived by manually specifying allowable ranges for dif-
control commands are replayed. The work described in this ferent system measurements using domain expert knowledge.
paper fuses synchrophasor data and control system log infor- Such specification-based methods have been shown to have
mation to allow precise classification of power-system faults high detection accuracy; however, the manual effort required
and cyber-attacks. to develop such a decision tree is too great to apply to a prob-
Multiple traditional data-mining algorithms were used to lem on the scale of power-system protection. Other works have
classify power-system faults and cyber-attacks in [11]. The been found, which provide intrusion detection for synchropha-
authors of [11] used the same dataset for algorithm validation as sor systems, but they still do not provide power-system fault
that used for this paper. The traditional data-mining algorithms detection. An intrusion detection system (IDS) was proposed,
were able to differentiate between power-system disturbances which uses white lists to detect invalid network behaviors based
and cyber-attacks. However, the traditional data-mining algo- on a synchrophasor network protocol specification [22]. A sec-
rithms were not able to classify specific fault and cyber-attack ond proposed IDS uses timing and data-volume information to
types within each large category. identify data-integrity attacks against synchrophasor systems
Many other data-mining approaches have been developed [23]. However, by looking only at protocol format, timing,
to extract signatures and classify power-system disturbances, and data-volume information, these methods are not able to
but they have no ability to detect cyber-attacks. Many such detect insider attacks, e.g., the command injection from a valid
approaches classify power-system disturbances in the time machine where the network packets have legitimate format,
domain. Decision trees were used to classify power-system valid timing, and data-volume information. In [24], the authors
disturbances in [14] and [15]. Statistical characteristics of manually created rules using the industrial state modeling lan-
power-system frequency were used in [16] to represent the guage (ISML) to track SCADA system states. Nader et al. used
signatures of power-system disturbances. Many works have a kernel machine-learning method to model SCADA system
applied neural networks to classify faults. In [17] with the help normal behavior, in order to detect machine failures and intru-
of wavelet transforms, current phase is decomposed and fed sions [25]. Due to a lack of attack data, only system normal
into a particle swarm optimization-based neural network for behavior was learnt, and therefore, the authors were not able to
fault classification. A Chebyshev neural network is examined in test detection of attacks.
[18] on current signals to evaluate the fault classification perfor- This paper presents a data-mining technique to develop
mance. In [19], the neural network is integrated with a wavelet signatures of multiple types of power-system faults and cyber-
transform multiresolution analysis technique to extract patterns attacks. The resulting signatures provide a hybrid specification,
for faults in shipboard power systems using energy variation of which specifies both normal reactions to faults and symp-
fault signals. In [20], the authors used a neural network with toms of cyber-attacks. The data-mining algorithm presented in
current waveforms and data from digital fault recorders to clas- this paper has the distinct advantage requiring far less system
sify faults, normal maintenance operations, and power-quality expertise to create signatures.
disturbances. The works above all propose batch processing The data-mining technique used in this paper uses the min-
data-mining approaches to learn patterns for power-system ing sequential patterns’ technique which discovers patterns of
events. These methods are not suitable for synchrophasor mea- activity from time-ordered data. The mining sequential pat-
surement data because batch processing requires all data to be terns’ concept was first presented in [26] as a method to perform
read into memory to learn patterns. A single PMU can gen- market basket analysis. Mining sequential patterns was used
erate two million daily samples of data and multiple PMU to discover patterns in clinical client-care management process
Authorized licensed use limited to: Jaypee Insituite of Information Technology-Noida Sec 128 (L3). Downloaded on February 13,2024 at 05:12:56 UTC from IEEE Xplore. Restrictions apply.
PAN et al.: CLASSIFICATION OF DISTURBANCES AND CYBER-ATTACKS IN POWER SYSTEMS 653
data that consist of patient records and log data over a period
of treatment time in [27]. This technique was extended in [28]
by employing a 2-D Bayesian network to graphically repre-
sent patterns in Hemodialysis processes, which consists of a
sequence of medical activities over time. In order to discover
patterns, a patient’s physiological “state” is defined using clini-
cal log data and patient records (e.g., body temperature, weight,
mood, etc.). The pattern is therefore represented as contiguous
transitions of states in a 2-D graph. Classification was made
using the learnt patterns.
For this work, the frequent pattern (FP)-growth algorithm
as used to mine for frequent sequential patterns. FP-growth
reduces the cost of searching for frequent sequences by adopt-
Fig. 1. Ideal versus actual 1LG fault and protection system response.
ing a divide-and-conquer strategy [29]. As demonstrated in
[30], FP-growth algorithm outperforms several popular fre-
magnitude then drops through node C to zero. If following six
quent pattern-mining algorithms in run time, and therefore, it
notations are used to denote six events: “IR1 = H” as node
was chosen for this work. Frequent pattern mining is tradi-
“B,” meaning “Current measured by R1 increases to High;”
tionally used for market basket analysis, a method to build
“IR2 = H” for “Current measured by R2 increases to High;”
associations between commonly purchased items at a store. In
“R1 = Trip” for “Relay R1 trips;” “R2 = Trip” for “Relay
this paper, frequent pattern mining is used to identify associa-
R2 trips;” “IR1 = 0” as node “C” for “Current measured by
tive relationships between observed power-system states related
R1 drops to Zero;” “IR1 = 0” for “Current measured by R2
to a particular event type or scenario.
drops to Zero.” The timestamps of 1LG fault and resulting
Compared with peer works, this work is unique in that we
protection scheme operation can be represented by expres-
propose a data-mining algorithm that can learn patterns for
sion (1) where t(·) stands for the timestamp of corresponding
both power-system disturbances and cyber-attacks from het-
events
erogeneous data including synchrophasor measurements and
device logs from multiple locations in the power system. Learnt t(IR1 =H) = t(IR2 =H) < t(R1=Trip)
patterns are translated into common paths. Common paths = t(R2=Trip) < t(IR1 =0) = t(R2=0) . (1)
are used as signatures for pattern recognition. This approach
enables a fast low-memory process for detecting power-system Expression (1) assumes a fault which appears at both relays
contingencies and cyber-attacks. It is possible to use separate at the same time and assumes that both relays operate at the
classifiers for power-system event detection and cyber intrusion same time. In fact, the fault may occur at different locations
detection. However, for attacks which mimic power-system along the line leading to variations in the time each relay
events, a supervisor process (a human or another algorithm) will observes the fault and variations in relay operation time. Power
be required to analyze outputs from the two separate algorithms systems are dynamic. In Fig. 1, the dashed line shows an ideal
to resolve conflicts. Combining power-system event detection waveform of current magnitude during a fault and the solid
and cyber-intrusion detection resolves this issue. Furthermore, line graphs a waveform captured from real-time digital simu-
this work is unique because it provides a mechanism for precise lator (RTDS) simulation of a 1LG fault. The actual waveform
classification of power-system disturbances and cyber-attacks includes multiple variations from the ideal waveform. A power
which attempt to mimic the same disturbances. Such precise system’s response to load variation, fault location variation, and
classification enables automated response algorithms which transient behaviors results in irregular waveforms. Such varia-
will lead to a more reliable power system. tions are reflected as dispersions in the timestamps of node B
and node C for different instances of the same scenario. The dis-
persion in timestamps can be seen not only in the events related
III. C OMMON PATH M INING to the current magnitude but also in the events related to other
features. Fig. 2 shows box plots of timestamps of six events for
A. Sequential Events for a Power-System Scenario
three fault scenarios and one scenario where relays R1 and R2
Power-system scenarios can be described as an ordered are tripped by attackers. Fig. 2 (X-axis) is the set of observed
sequence of measureable events. For example, Fig. 1 depicts events. The box plots represent 40 instances of each scenario.
phase a current magnitude during a 1LG fault on a transmis- To provide an ordered sequence, the timestamp of the first event
sion line. The current magnitude can be quantized into three in a sequence was subtracted from timestamps of all later events
ranges: high, normal, and low which are represented by dark in the sequence. The box plots and the interconnecting edges of
gray, white, and light gray rectangles shading Fig. 1. When a scenario are depicted using the same color. As shown in Fig. 2,
the system is in a normal state, the current stays in the normal events take place in temporal order. Event timestamps vary due
range, marked as node A in Fig. 1. When the 1LG fault occurs, to system dynamics. For each scenario, a track can be drawn by
current increases to the high range via node B. The protection connecting box plot medians. The tracks shown in Fig. 2 gen-
scheme will operate two relays, R1 and R2, at both ends of the erally agree with expression 1. Expert knowledge can be used
transmission line to open breakers and isolate the fault. Current to create similar expressions for all known system behaviors.
Authorized licensed use limited to: Jaypee Insituite of Information Technology-Noida Sec 128 (L3). Downloaded on February 13,2024 at 05:12:56 UTC from IEEE Xplore. Restrictions apply.
654 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 11, NO. 3, JUNE 2015
TABLE I
M ERGED R AW DATA
TABLE IV
C ONFUSION M ATRIX FOR E XPERIMENT 2
Fig. 6. Relay trip time versus fault location for relays R1 and R2.
should ideally trip instantly. Observed trip times match the ideal
case for the 0%–20% and 80%–100% ranges. Note, the appar-
ent impedance setting for zone 2 for relay R2 causes the zone
1-to-zone 2 transition to occur at approximately 23% of the
line (77% of the line from relay R2’s perspective) instead of
at the expected 20% of the line (80% of the line from relay
R2’s perspective).
The trip times from 24% to 80% of the line are always
instantaneous. Observed trip times tended to increase as the
fault approached the zone 1 to zone 2 boundary points. To
compensate for this observed behavior, the 1LG fault paths
were grouped by fault location per the following groups: 10%–
23%, 24%–29%, 30%–35%, 36%–40%, 41%–60%, 61%–
65%, 66%–70%, 71%–80%, 81%–90%. Additionally, it was
Fig. 7. 2-D coordinates documenting 1LG fault versus command injection
observed that trip times partially correlated with the system
attack common paths.
load. As a result, the 1LG fault class used in Experiment 1 was
divided into multiple classes by fault location and load. Four
load ranges were used: (200–249, 250–399, 300–349, 350– unknown instances which matched no common path. The 16
399 MW). This subdivided the 1LG fault class into 9 ∗ 4 = 36 cases of faults, which matched common paths from more than
subclasses. one group, all occurred because both the (30%–35%) and the
The command injection attack class in Experiment 1 was also (36%–40%) shared a common path.
divided using four load ranges, which results in four command The intent of subdividing the 1LG fault class was not to clas-
injection attack classes. sify 1LG faults by a specific fault location. Correctly classifying
The extra step of subdividing the 1LG fault class and com- a fault as a fault is sufficient as many algorithms are available
mand injection attack results in a total of 40 classes. The to provide fault location information. The accuracy rate when
training dataset and testing dataset in this experiment is the the fault location classes were combined into a single class is
same as that used in Experiment 1. 96.7%. The misclassification rate was 0% and the unknown rate
Table IV is a confusion matrix for all scenarios for was 3.3%.
Experiment 2. As previously mentioned, the 1LG fault classes Common paths can be mapped into 2-D coordinates with the
were divided by fault location and system load. To save space, Y-axis indicating the state identification code (state ID) and the
the groups in the confusion matrix were combined to just show X-axis indicating normalized timestamps. An edge between two
the fault location classes and one command injection class. An vertices represents the temporal transition between two states.
extra row (marked Unk. for unknown) was added to the con- Each vertex is marked with state information. Fig. 7 shows
fusion matrix to show instances of scenarios, which were not common paths for two scenarios, a 1LG fault in the 36%–40%
classified. fault location group and a command injection attack. Both the
Experiment 2 classification accuracy, misclassification, and fault and command injection common paths start at the system
unknown rates can be viewed from multiple perspectives. The normal state. These paths differ immediately because, for faults,
overall accuracy rate for the groups shown in the confusion the PMU will measure high current when a fault is present.
matrix was 87.6%. Misclassification and unknown rates for the This makes the second state of the fault common path high cur-
same groups were 9.1% and 3.3%, respectively. From the con- rent detected at relay R1. The command injection attack occurs
fusion matrix, the majority of misclassification occurred when when there is no fault present. As such, the second state for
1LG fault groups were classified as members of a neighboring the command injection attack has normal current at both relays,
or nearby fault group. The unknown cases are separated into while both relays’ status indicates a trip.
unknown instances, which resulted from an instance matching Fig. 8 shows common paths for two different 1LG fault loca-
multiple fault common paths (“Unk. fault” in Table III) and tions. Note that not all features are displayed in the vertex
Authorized licensed use limited to: Jaypee Insituite of Information Technology-Noida Sec 128 (L3). Downloaded on February 13,2024 at 05:12:56 UTC from IEEE Xplore. Restrictions apply.
660 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 11, NO. 3, JUNE 2015
TABLE V
C ONFUSION M ATRIX FOR F OUR T YPES OF FAULTS
AND T HREE C YBER -ATTACKS
Fig. 8. 2-D coordinates comparing two common paths for 1LG faults of
different locations.
[8] R. Amgai, J. Shi, and S. Abdelwahed, “An integrated lookahead control- [29] J. Han, M. Kamber, and J. Pei, Data Mining Concepts and Techniques,
based adaptive supervisory framework for autonomic power system 3rd ed. San Mateo, CA, USA: Morgan Kaufmann, 2012.
applications,” Int. J. Elect. Power Energy Syst., vol. 63, pp. 824–835, [30] J. Han, J. Pei, Y. Yin, and R. Mao, “Mining frequent patterns without can-
2014. didate generation: a frequent-pattern tree approach,” Data Min. Knowl.
[9] A. Bose, “Smart transmission grid applications and their supporting Discovery, vol. 8, no. 1, pp. 53–87, Jan. 2004.
infrastructure,” IEEE Trans. Smart Grid, vol. 1, no. 1, pp. 11–19, Jun. [31] P. Anderson, Analysis of Faulted Power Systems. Hoboken, NJ, USA:
2010. Wiley, 1995.
[10] D. Bakken et al., “Smart generation and transmission with coherent, real- [32] H. Saadat, Power System Analysis, 3rd ed. Alexandria, VA, USA: PSA
time data,” Proc. IEEE, vol. 99, no. 6, pp. 928–951, Jun. 2011. Publishing, 2010.
[11] R. Borges et al., “Machine learning for power system disturbance and [33] M. Zeller, “Myth or reality—Does the Aurora vulnerability pose a risk
cyber-attack discrimination,” in Proc. 7th Int. Symp. Resilient Control to my generator?,” in Proc. 64th Annu. Conf. Protective Relay Eng., Apr.
Syst. (ISRCS), Aug. 2014, pp. 1–8. 11–14, 2011, pp. 130–136.
[12] M. Al Karim, M. Chenine, K. Zhu, and L. Nordstrom, “Synchrophasor- [34] H. Ferrer and E. Schweitzer, Modern Solutions for Protection, Control,
based data mining for power system fault analysis,” in Proc. 3rd IEEE and Monitoring of Electric Power Systems. Oregon, IL, USA: Quality
PES Int. Conf. Exhib. Innov. Smart Grid Technol. (ISGT Europe), Oct. Books Inc., 2010, pp. 57–104.
2012, pp. 1–8.
[13] N. Dahal, “Synchrophasor data mining for situational awareness in power
systems,” Ph.D. dissertation, Dept. Elect. Comput. Eng., Mississippi State
Univ., Starkville, MS, USA, 2012.
[14] P. K. Ray, S. R. Mohanty, N. Kishor, and J. P. S. Catalao, “Optimal fea- Shengyi Pan (S’12–M’14) received the B.Eng.
ture and decision tree-based classification of power quality disturbances degree in electronic information engineering from
in distributed generation systems,” IEEE Trans. Sustain. Energy, vol. 5, Fuzhou University, Fuzhou, China, in 2008; the
no. 1, pp. 200–208, Jan. 2014. M.Sc. degree in data communications from the
[15] A. Rodriguez et al., “A Decision Tree and S-transform based approach for University of Sheffield, Sheffield, U.K., in 2009; and
power quality disturbances classification,” in Proc. 4th Int. Conf. Power the Ph.D. degree in electrical and computer engineer-
Eng. Energy Elect. Drives (POWERENG), May 2013, pp. 1093–1097. ing from Mississippi State University, Starkville, MS,
[16] W. Gao and J. Ning, “Wavelet-based disturbance analysis for power USA, in 2014.
system wide-area monitoring,” IEEE Trans. Smart Grid, vol. 2, no. 1, From 2010 to 2014, he was a Research Assistant
pp. 121–130, Mar. 2011. with the Department of Electrical and Computer
[17] J. Upendar, C. P. Gupta, G. K. Singh, and G. Ramakrishna, “PSO Engineering, Mississippi State University, where his
and ANN-based fault classification for protective relaying,” IET Gener. research focused on smart grid cyber security and data-driven intrusion
Transmiss. Distrib., vol. 4, no. 10, pp. 1197–1212, Oct. 2010. detection technologies. He is currently a Software Engineer with MaxPoint
[18] B. Y. Vyas, B. Das, and R. P. Maheshwari, “Improved fault clas- Interactive Inc., Morrisville, NC, USA, for big data application develop-
sification in series compensated transmission line: Comparative ment in Internet digital advertising. His research interests include smart grid
evaluation of chebyshev neural network training algorithms,” technologies, cyber security, data mining, and bid data technologies.
IEEE Trans. Neural Netw. Learn. Syst., Oct. 2014 [Online].
Available: http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=
6920088&url =https%3A%2F%2Ffanyv88.com%3A443%2Fhttp%2Fieeexplore.ieee.org%2Fxpls%2Fabs_
all.jsp%3Farnumber%3D6920088
[19] W. Li, A. Monti, and F. Ponci, “Fault detection and classification in
medium voltage DC shipboard power systems with wavelets and arti- Thomas Morris (M’06–SM’08) received the B.S.
ficial neural networks,” IEEE Trans. Instrum. Meas., vol. 63, no. 11, degree in electrical engineering from Texas A&M
pp. 2651–2665, Nov. 2014. University, College Station, TX, USA, in 1994, and
[20] K. Silva, B. Souza, and N. Brito, “Fault detection and classification in the M.S. and Ph.D. degrees in computer engineer-
transmission lines based on wavelet transform and ANN,” IEEE Trans. ing from Southern Methodist University, Dallas, TX,
Power Del., vol. 21, no. 4, pp. 2058–2063, Oct. 2006. USA, in 2001 and 2008, respectively.
[21] R. Mitchell and I.-R. Chen, “Behavior-rule based intrusion detection sys- He joined Mississippi State University, Starkville,
tems for safety critical smart grid applications,” IEEE Trans. Smart Grid, MS, USA, in 2008. He currently serves as an
vol. 4, no. 3, pp. 1254–1263, Sep. 2013. Associate Professor of Electrical and Computer
[22] Y. Yang et al., “Intrusion detection system for network security in syn- Engineering, Associate Director of the Distributed
chrophasor systems,” in Proc. IET Int. Conf. Inf. Commun. Technol., Analytics and Security Institute (DASI), and the
2013, pp. 246–252. Director of the Critical Infrastructure Protection Center (CIPC). His research
[23] B. Sikdar and J. Chow, “Defending synchrophasor data networks against interests include cyber security for power systems and industrial control
traffic analysis attacks,” IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 819– systems.
826, Dec. 2011.
[24] A. Carcano et al., “A multidimensional critical state analysis for detecting
intrusions in SCADA systems,” IEEE Trans. Ind. Informat., vol. 7, no. 2,
pp. 179–186, May 2011.
[25] P. Nader, P. Honeine, and P. Beauseroy, “{l_p}-norms in one-class clas- Uttam Adhikari (S’11) received the B.S. degree
sification for intrusion detection in SCADA systems,” IEEE Trans. Ind. in electrical engineering from Tribhuvan University,
Informat., vol. 10, no. 4, pp. 2308–2317, Nov. 2014. Kathmandu, Nepal, in 2005, and he is currently
[26] R. Agrawal and R. Srikant, “Mining sequential patterns,” in Proc. 11th pursuing the Ph.D. degree in electrical and com-
Int. Conf. Data Eng., Mar. 1995, pp. 3–14. puter engineering at Mississippi State University,
[27] F. Lin, S. Chen, S. Pan, and Y. Chen, “Mining time dependency patterns Starkville, MS, USA.
in clinical pathways,” Int. J. Med. Informat., vol. 62, no. 1, pp. 11–25, His research interests include cyber-physical sys-
2001. tem modeling and simulation, wide-area measure-
[28] F. Lin, C. Chiu, and S. Wu, “Using Bayesian networks for discovering ment systems, data mining, and cyber security in
temporal-state transition patterns in hemodialysis,” in Proc. 35th Annu. smart grid.
Hawaii Int. Conf. Syst. Sci., Jan. 2002, pp. 1995–2002.
Authorized licensed use limited to: Jaypee Insituite of Information Technology-Noida Sec 128 (L3). Downloaded on February 13,2024 at 05:12:56 UTC from IEEE Xplore. Restrictions apply.