Review of Cybersecurity Analysis in Smart Distribu
Review of Cybersecurity Analysis in Smart Distribu
Review
Review of Cybersecurity Analysis in Smart Distribution
Systems and Future Directions for Using Unsupervised
Learning Methods for Cyber Detection
Smitha Joyce Pinto 1, *, Pierluigi Siano 2,3, * and Mimmo Parente 3
1 Department of Electronics and Communication, MIT Mysore, Belawadi, Srirangapatna 571438, India
2 Department of Electrical and Electronic Engineering Science, University of Johannesburg,
Johannesburg 2092, South Africa
3 Dipartimento di Scienze Aziendali—Management & Innovation Systems, Università degli Studi di Salerno,
84084 Fisciano, Italy
* Correspondence: [email protected] or [email protected] (S.J.P.); [email protected] (P.S.)
Abstract: In a physical microgrid system, equipment failures, manual misbehavior of equipment, and
power quality can be affected by intentional cyberattacks, made more dangerous by the widespread
use of established communication networks via sensors. This paper comprehensively reviews smart
grid challenges on cyber-physical and cyber security systems, standard protocols, communication,
and sensor technology. Existing supervised learning-based Machine Learning (ML) methods for
identifying cyberattacks in smart grids mostly rely on instances of both normal and attack events
for training. Additionally, for supervised learning to be effective, the training dataset must contain
representative examples of various attack situations having different patterns, which is challenging.
Therefore, we reviewed a novel Data Mining (DM) approach based on unsupervised rules for identify-
ing False Data Injection Cyber Attacks (FDIA) in smart grids using Phasor Measurement Unit (PMU)
data. The unsupervised algorithm is excellent for discovering unidentified assault events since it only
uses examples of typical events to train the detection models. The datasets used in our study, which
looked at some well-known unsupervised detection methods, helped us assess the performances of
different methods. The performance comparison with popular unsupervised algorithms is better at
Citation: Pinto, S.J.; Siano, P.; Parente,
finding attack events if compared with supervised and Deep Learning (DL) algorithms.
M. Review of Cybersecurity Analysis
in Smart Distribution Systems and
Keywords: Association Rule Mining; clustering; cyber-attacks; data mining; FDIA; smart grid
Future Directions for Using
Unsupervised Learning Methods for
Cyber Detection. Energies 2023, 16,
1651. https://doi.org/10.3390/
en16041651
1. Introduction
The growing integration of Distribution Energy Resources (DER) into the electric
Academic Editor: Wencong Su
grid, including photovoltaics (PV), wind, battery storage, fuel cells, and hydro schemes,
Received: 19 December 2022 has benefits, in that it lowers the cost of enhancing the power system, as well as draw-
Revised: 2 February 2023 backs, particularly environmental uncertainty. For efficient and continuous operation, a
Accepted: 4 February 2023 microgrid controller that coordinates and regulates the various DER using communication
Published: 7 February 2023 technologies based on established communication protocols is essential [1]. Concerns with
feeders, grid failure, communication, cyber security, control, islanding, regulation issues,
and protection are some of the specific difficulties associated with the development of
DER consumption into the grid [2]. However, because communication networks are so
Copyright: © 2023 by the authors.
widely used, they are sensitive to harmful cyber-attacks. These attacks can be particularly
Licensee MDPI, Basel, Switzerland.
dangerous if they result in physical harm to devices, technical failures, or human error.
This article is an open access article
Physical and cyber security implies frequently threats that target power utilities [3]. Mi-
distributed under the terms and
crogrid systems are more susceptible to cyberattacks because they are more dependent on
conditions of the Creative Commons
Attribution (CC BY) license (https://
distributed, active network control as their number of components grows, which raises
creativecommons.org/licenses/by/
the potential impact of an intrusion. According to a western US department of energy
4.0/). report from May 2019, the utility’s wind and solar power generation installations were
disconnected, its supervisory control and data acquisition (SCADA) systems experienced a
brief outage, and the network was temporarily disconnected for five minutes [4,5]. Both
physical harm and financial loss can result from a cyberattack that introduces instability or
incorrect information into the electrical system. Microgrid operators and developers require
a comprehensive and integrated approach to cyber-physical safety to be more adaptable.
Strengthening the microgrid, a systematic review of the interconnection security controls,
designing and formulation of disaster management, and reserves for the security procedure
are the essentials to guarantee the safety of the key energy configuration [6].
Many kinds of cyber-attacks can jeopardize the data and communication security of
the smart grids, including False Data Injection Attacks (FDIAs) [7], Distributed Denial of
Service (DDoS) attacks [8], topological attacks [9], overloading attacks [10], and resonance
attack [11]. FDIAs have excellent accessibility, interference, and concealment capabilities,
making them one of the most dangerous attack tactics in many power cyber-attacks [12].
FDIA may cause either the automated system or the operator to take incorrect action. As
a result, it leads to incorrect decision-making and control procedures, which ultimately
has fatal effects. In this kind of attack, hackers might use physical, cybernetic, and cyber-
physical channels to fraudulently obtain important information. FDIA seeks to alter data
at the measuring units or control center to achieve a certain goal. The nodal voltage
magnitudes and angles, nodal power injections, line power flows, and digital data such as
the state of breakers and switches are among the analog measured data from the power
system that FDIAs aim to capture. To monitor and manage the operation of the power
grid through analysis of meter measurement data, the power system operator (PSO) needs
to execute state estimation (SE). At the transmission system level, the issue of detecting
cyberattacks through flawed data processing in state estimators has recently attracted a lot
of attention [13].
The SE method’s central concept is the estimation of each area’s state using measure-
ments specific to that area and the sharing of boundary bus states between adjacent areas.
In energy management systems, SE algorithms play a crucial role in the processing of
inaccurate measurements. When bad data are present, it is anticipated that large residual
errors will inevitably result from the bad data, hence bad data detection (BDD) filters
measurement inaccuracies brought on by malicious assaults or device flaws. However,
when a successful FDIA is started, the residual error would remain the same as usual. To
safeguard state estimates, certain strategies for faulty measurement detection have been
developed [14].
Analyzing the power system model is not necessary for the contemporary BDD
methodologies based on data-driven models. To anticipate measurement error, they apply
the ML approach to extract the electrical attributes from the massive historical data. The
next step is to utilize clustering analysis to automatically group good and bad data into
distinct clusters [15]. For selecting the most important features to detect FDIA and remove
bad data, we reviewed unsupervised machine learning methods on smart grids.
This paper gives a comprehensive review of the field of cyber-attacks against smart
grids and introduces the background of state estimation. This paper examines cyber-attack
detection through unsupervised data mining algorithms. Clustering and Association Rule
Mining (ARM) are two different categories under unsupervised techniques. With various
advantages over supervised and reinforcement algorithms, ARM and clustering are data
mining techniques used to calculate the correlation between two or more variables in a
dataset by identifying the strongest rules that exist between their values. On another side,
the unsupervised approach of clustering has a low detection rate with tampered data. As a
result, this article offers a thorough assessment of numerous unsupervised methodologies
and approaches tailored to the difficulties posed by cyberattacks on smart grids, as well as
an analysis of their characteristics.
The structure of this article is as follows: In Section 2 the review methodology is
described and in Section 3 we will provide a general review of the cyber security issues
with smart grid technologies. Section 4 explains FDIA approaches and techniques in smart
attacks over FDIA. Sections 6 and 7 outline future studies and conclusions, re
2. Review Methodology
Energies 2023, 16, 1651 The main goal of this review is to provide a platform for researchers 3 of 24 to
various cyber-attack detection techniques on smart grids and explain the best
attacks. This review offers a thorough explanation of numerous attacks, hig
grids. Section
benefits 5 discusses
and drawbacks, the unsupervised
discusseslearning-based
present trends detection
and techniques
suggested fordirections
cyber- fo
attacks over FDIA. Sections 6 and 7 outline future studies and conclusions, respectively.
and offers a thorough evaluation of the various publications. Significan
2.publications
Review Methodology were searched for electronically in databases such as IEEE Explo
The main
Wiley, PubMed, goal of Science
this review is to provide
Direct, a platform
Frontiers, MDPI, for Research
researchers Gate,
to summarize
and Google S
various cyber-attack detection techniques on smart grids and explain the best one of those
publications were gathered using a variety of criteria, including keyword
attacks. This review offers a thorough explanation of numerous attacks, highlights their
conferences,
benefits different
and drawbacks, attacks,
discusses presentMLtrends
or DLandapproaches, classifier
suggested directions performance,
for the future,
extraction
and techniques.
offers a thorough evaluationAllofaccessible research publications
the various publications. Significant academicpublished
publica- betwee
tions
2022 were
thatsearched
used Datafor electronically
Mining (DM) in databases such as IEEE
applications Explore, Springer,
for diagnosing Wiley,
or forecasting c
PubMed, Science Direct, Frontiers, MDPI, Research Gate, and Google Scholar. The publica-
on smart grids met the screening criteria for this study. The following characte
tions were gathered using a variety of criteria, including keywords, journals, conferences,
coded attacks,
different for each ML article: (a) mainclassifier
or DL approaches, research area within
performance, dialectextraction
and feature studies; (b) g
location All
techniques. of accessible
the cyber-attack on smart
research publications grids between
published (e.g., Israel-2016,
2015 and 2022France-201
that
used Data Mining (DM) applications for diagnosing or forecasting
Portugal-2020); (c) security requirements (e.g., integrity, confidentiality, avai cyberattacks on smart
grids met the screening criteria for this study. The following characteristics were coded
key
for each points
article: (a)of mainML features
research area within (e.g.,
dialectsupervised, unsupervised,
studies; (b) geographical location semi-
ofreinforcement);
the cyber-attack on smart (e) classification type;France-2018,
grids (e.g., Israel-2016, (f) system US-2019, parameters
Portugal-2020); (e.g., su
(c) security requirements (e.g., integrity, confidentiality, availability);
confidence); (g) year of publication; (h) communication networks (e.g., LAN, M (d) key points of ML
features (e.g., supervised, unsupervised, semi-supervised, reinforcement); (e) classifica-
NAN, HAN); (i) I/O sensors (e.g., RTU, PDC, PMU); (j) evaluation
tion type; (f) system parameters (e.g., support, lift, confidence); (g) year of publication;
communication
(h) communication networks layers (e.g.,
(e.g.,LAN,application,
MAN, BAN,transport,
NAN, HAN); MAC,
(i) I/Onetwork,
sensors (e.g., physica
category
RTU, (e.g.,(j)SCADA,
PDC, PMU); evaluationsmart
criteria;meter, physical, data
(k) communication layersinjection, and replay,
(e.g., application, trans- netw
port, MAC, network, physical); (l) attack category (e.g., SCADA,
and (m) attacking cycle (e.g., reconnaissance, scanning, maintenance access, e smart meter, physical,
data injection, and replay, networks based); and (m) attacking cycle (e.g., reconnaissance,
The number
scanning, of articles
maintenance access, reviewed
exploitation).by year
The numberof publication and cyber-attack-aff
of articles reviewed by year of
grids is shown
publication in Figure 1. smart grids is shown in Figure 1.
and cyber-attack-affected
2023 2017
4% 9% 2018
4%2019
2022 4%
31% 2020
13%
2021
35%
Figure
Figure 1. Year-wise
1. Year-wise publications
publications withofthe
with the search search ofreviews
cyber-attack cyber-attack
in variousreviews in various
publications. pu
Table 1 provides a comparison between the existing survey papers in terms of the
Table 1 provides a comparison between the existing survey papers in t
main covered areas and publication year. Few reviews [16–21] are more focused on the
main covered areas and publication year. Few reviews [16–21] are more foc
Energies 2023, 16, 1651 4 of 24
sensor and communication-related topics during cyber-attacks. Some other reviews [22,23]
covered all topics of cyber-attack such as the nature of attacks, characteristics of the attack,
monitoring in smart grid, existing co-simulation tools, testbed, and awareness. Other
works focused on cyber-attack detection and mitigation techniques [19,24]. We have
concluded that the twenty-two reviews were more focused on the ML approach considered
to be the best method for the detection and mitigation of cyber-attacks in smart grids. In
these review papers, unsupervised learning algorithms have not received much interest.
Therefore, we considered unsupervised type ML for identifying FDIA cyber-attack in smart
grids which differs from the aforementioned surveys. Clustering and association rules are
two unsupervised algorithm analyses that can help locate hidden patterns and potential
relationships between variables that commonly appear together in datasets. This method
can be used to evaluate network traffic, identify patterns of cyberattacks in smart grids,
and analyze and anticipate user behavior.
Table 1. Cont.
Table 1. Cont.
• Finally, the prospects and challenges of cyber-physical smart grids in the future are
examined, which may help to clarify the cyber-physical security concerns that the
next-generation smart grid must resolve.
collect
Energies 2023, 16, x FOR PEER REVIEW telemetry data from sensor components (distributed across domains), and MTUs,
8 of 25
receive and process that data for management and topology manipulation (connected to
core systems). This promotes efficient power generation and transmission.
The
The current electricity
operating mode grid is becoming
for each more
converter is vulnerable, mostly
either voltage or because it develops
current-controlled.
and
Primary layer control actions are independent of the communication system since (IoT).
adopts new technologies such as telemetry devices and the Internet of Things local
Additionally,
controllers are recent research
directly and publications
connected show To
to converters. an increase
enhanceinthecyber security incidents
performance of the
and threatscoordination,
sources’ related between telemetry systems,
cooperative SCADA,
secondary IoT, and are
controllers the electric
used. power grid [41].
A distributed
Smart Grid is monitored and managed by a SCADA system that collects
communication layer, which only exchanges information with nearby units, enables these consumption
statistics andTobehavior
controllers. using
accomplish IoT devices
secondary and Advanced
control goals, suchMetering
as averageInfrastructure (AMI).
voltage regulation
By enabling two-way communication inside the system’s infrastructure, using
and proportionate current sharing, each unit, represented as an agent in the cyber layer, wireless
communication
sends and receives networks
DC/ACimproves the efficiency
voltage and of electricity
current from the nearbygeneration
agent(s). and delivery.
Tertiary To
control
implement an effective generation and distribution plan, the generating centers have access
operates power management, energy management, system optimization, and economic
to real-time data on power demand due to the association of smart meters and sensors
dispatch as the highest level in the hierarchical design. Using a local converter and a
across the power grid network [42]. As a result, the infrastructure of the power system
digital communication link-based coordinated control system, such as a cutting-edge
has benefited considerably from the integration of these technologies, increasing energy
cloud-based communication platform, which has control bandwidths that are at least an
efficiency and lowering electricity costs.
order of magnitude apart, simultaneously allows for the implementation of hierarchical
Real-time data from the electrical power grid are monitored, measured, and analyzed
control. As the time scale lengthens and the level of control shifts from primary to tertiary,
via SCADA, a type of process control system [43]. While it can ensure both short-range and
the control bandwidth contracts [40].
long-range communications, SCADA is most effective in large-scale environments. The
RTU, MTU, and Human–Machine Interface (HMI) are the three primary components of
Energies 2023, 16, 1651 9 of 24
this system. RTU is a device made up of three units. Data acquisition is performed by the
first unit, logic programs from the MTU are run by the second unit, and communication
infrastructure development is mostly handled by the third unit [44]. The MTU, which is a
device for controlling and monitoring the RTU, is another component of SCADA. HMI is
regarded as the final component of SCADA and serves as the operator’s Graphical User
Interface (GUI).
Over time, a few protocols were created to offer smart grid systems secure and depend-
able communication. Several industrial communication protocols used inside SCADA are
Modicon Communication Bus (Modbus), Distributed Network Protocol version 3 (DNP3),
Process Field Bus (Profibus), and International Standard Defining Communication Protocol
61850 (IEC61850). Smart meters, home appliances, and AMIs all communicate with one
another via different communication protocols. Their vulnerabilities and intrinsic security
requirements differ greatly [45,46].
While using two separate communication mediums, namely wired and wireless,
new communication and information technologies with current intelligent monitoring
systems play a crucial role in securing data transmission between smart meters and utilities.
The advantages of wireless communications over wired communications include lower
infrastructure costs and more robust connections in remote areas. Wireless technologies
include Zigbee, Z-wave, WiMAX, Wi-Fi, DASH7 (D7A), cellular, and satellite. PLC is a
wired communication that supports high-speed data from one device to another. It is
suitable for some applications, such as smart metering, home automation, and lighting.
To guarantee end-to-end data transmission, the Transmission Control Protocol/Internet
Protocol (TCP/IP) was initially applied in the smart grid. Due to its complex memory
management issues and the fact that it is only appropriate for broad-area networks, this
protocol is not thought to be a good choice for smart networks.
The Wide Area Network (WAN), Neighborhood Area Network (NAN), Home Area
Network (HAN), Building Area Network (BAN), and Industrial Area Network (IAN),
are all parts of the smart grid’s communication architecture. Each NAN has a Control
Center (CC) that is designed to handle its own. Building gateways track electricity use and
client needs, which they subsequently send to the CC. Customers can alter their electricity
usage and further energy conservation measures at any time to the CC, which saves both
cost and energy. In the context of the smart grid, the security and privacy of information
exchanges between customers and the CC have emerged as crucial and difficult issues. The
man-in-the-middle, DDOS, impersonation, FDIA, brute-force, and replay attacks are just a
few of the malicious assaults that the smart grid is susceptible to. These attacks have the
potential to have a substantial negative impact on society. As a result, a security protocol
should be provided in the smart grid.
The hierarchical architecture of the smart grid according to Figure 2, which has a
limited number of sub-networks, is seen to be crucial in the infrastructure since it connects
a wide range of systems; nevertheless, each sub-network is only in charge of a single
geographic area. According to Figure 3, the smart grid network is divided into three primary
sub-networks: WAN, NAN, and HAN. The additional sub-networks of WAN and NAN
are Local Area Networks (LAN) and Field Area Networks (FAN). Industrial Area Network
(IAN) and Building Area Network (BAN) are the two sub-networks that comprise FAN.
PAN is a subnetwork of either IAN or BAN or HAN. Most of the research in FDIA primarily
concentrates on four vulnerable protocols, including Modbus, DNP3, Profibus, and IEC61850,
which are employed in the infrastructure of smart grids [47–49]. The expected communication
network which includes RTU, MTU, smart meters, communication protocols such as Zigbee,
Z-wave, WiMAX, etc., IoT, WAN, LAN, NAN, FAN BAN, IAN, HAN, and PAN established
in the microgrid is shown in Figure 3.
Energies 2023, 16, x FOR PEER REVIEW 11 of 25
Energies 2023, 16, 1651 10 of 24
Thebasic
Figure3.3.The
Figure basicnetwork
networkarchitecture
architectureof
ofDG
DGmicrogrid
microgrid system.
system.
system operates. Regarding the security of CPS, confidentiality, integrity, and availability
are three essential characteristics that must be safeguarded [51]. The disclosure, disruption,
and deception attacks are three types of DDD attacks that can be used to categorize the
attack models of CPSs. Attacks on disclosures might result in the release of confidential
information. There are different types of cyber-attacks. For instance, denial of service (DoS),
replay, jamming, random, topological, overloading, resonance, FDIA, Man in the middle,
stealthy, etc., can be considered cyber-attacks. The commonly used cyber-attacks in DC/AC
microgrids are DoS, FDIA, and replay attacks. DoS tries to make the communication
network completely unavailable in the microgrid. Attacks that prevent users from using
information are referred to as disruption assaults are DoS attacks. Replay attacks are
another type of cyber-attack to record the reading of sensors for a certain amount of time
and after that, repeat these readings in the system to deceive the operator. FDIAs, for
example, include deception attacks to corrupt real data [52]. The various systems and
layers of the smart grid can use FDIA. Four categories—physical, network, communication,
and cyber—could be used to group them. Attacks on monitoring, control, and protection
systems are included in physical-based FDIA. The communication-based FDIA gives a
thorough analysis of the various communication methods used in smart grids and the risks
that go along with them. If the attacker gains access to any network node, network FDIA
is possible from anywhere. Cyber-based attacks are extremely harmful since they affect
the system much more severely. These assaults occur when the adversary gains access
to the control system or any applications connected to it, such as forecasting, estimating,
economic dispatching, and trading in energy.
FDIA is regarded as a remote access intrusion since it alters the payloads of packets,
compromising their data integrity [53]. Attackers use FDIA to obtain access to crucial ICS
processes or process parameters and force them to carry out a freshly injected command or
code. In cyber-physical systems, the term “FDIA” refers to a class of cyber-attacks where
the goal is to alter the integrity of the network by manipulating some sensor devices and
transmitting false data readings to the controller. The physical equipment affected by this
attack includes switches for VSI, filters, active/reactive power controllers, and MPPTs.
It also damages the electrical grid. System monitoring is necessary to ensure the power
network operates dependably, and state estimation is a result of such monitoring to give
attackers the most accurate assessment of the power grid.
False Setting Injection (FSI) and false command injection (FCI) are the two main
forms of cyber-physical attacks that are highlighted in the literature that is currently
available [54,55]. These attacks all impact system behavior, loss of inverter process control,
current controller set points, device connection, and configuration. The FSI takes into
account the hardware and software management of overcurrent, differential, and distance
relays. The aforementioned ideas offer FSI protection utilizing local end data, but they
are unreliable in a hybrid data and physical attack scenario. In the event of FCI attacks,
proposals such as [56,57] offer the creation of attack models and system vulnerability
analysis. A vulnerability known as a “command injection” allows an attacker to take
control of one or more commands that are being executed on a system. Without the need to
inject malicious code, command injection expands an application’s normal capabilities by
allowing it to deliver commands to the physical system shell.
FDIA can be modeled mathematically as in Equation (1),
where Di,j is the original dataset, and Fi,j is the injected data. The amalgamation of injected
data with original data generates false data. Here, Fi,j can be any of the following:
• Deletion of data from the original dataset, Di,j
• Change of the data in the original dataset, Di,j
• Addition of fake data to the original dataset, Di,j
ergies 2023, 16, x FOR PEER REVIEW 13 o
Figure
Figure 4. State
4. State estimation under
estimation under Cyber-attack
Cyber-attackin smart grid. grid.
in smart
The state vector for a system with n buses is represented as follows:
The state vector for a system with 𝑛 buses is represented as follows:
v = [ v1 , v2 , v3 . . . . . . v n ] T ( v i ∈ R ) (2)
𝑣 = 𝑣 , 𝑣 ,𝑣 ……𝑣 (𝑣 ∈ 𝑅)
where vi indicates the state variable at the ith bus, usually includes the voltage angle or
where 𝑣 indicates
voltage amplitude.the state variable
Consider at the ith
the measurement bus,z. usually
vector includesvector
The measurement the voltage
for a angl
system
voltage with n busesConsider
amplitude. the measurement vector 𝑧. The measurement vector fo
is written as
system with 𝑛 buses is written as T
z = [ z1 , z2 , z3 . . . . . . z n ] ( zi ∈ R ) (3)
𝑧 =between
There are some differences 𝑧 , 𝑧 measurement
, 𝑧 … … 𝑧 function (𝑧 ∈ 𝑅) and actual mea-
values
surement values for non-ideal sensors. State estimate in the actual electric power system,
accounting for measurement errors, can be defined as:
There are some differences
z1
between measurement
H1 (v1 , v2 , v3 . . . . . . vn )
function
e1
values and ac
measurement values for znon-ideal sensors. State estimate in the actual electric po
2 H2 (v1 , v2 , v3 . . . . . . vn ) e2
z =
system, accounting for . =
measurement errors, . + . (4)
..
.. can be defined ..as:
zm 𝑧 Hm (v1 ,𝐻v(𝑣
2 , v,3 .𝑣
. . ., .𝑣. vn…) … 𝑣 ) em 𝑒
𝑧 𝑒
𝐻 (𝑣 , 𝑣 , 𝑣 … … 𝑣 ) z can be created as a
𝑧 = system
The relationship between
⋮ = states v and measurements + ⋮
linear model using the DC power flow model, as shown ⋮ below:
𝑧 𝐻 (𝑣 , 𝑣 , 𝑣 … … 𝑣 ) 𝑒
z = Hv + e (5)
The relationship between system states 𝑣 and measurements 𝑧 can be created
linear model using the DC power flow model, as shown below:
𝑧 = 𝐻𝑣 + 𝑒
where 𝑒 is the measurement error (additive noise) vector that is typically represented
the Gaussian distribution, 𝑣 contains the voltage amplitude and voltage phase angl
Energies 2023, 16, 1651 13 of 24
where e is the measurement error (additive noise) vector that is typically represented by
the Gaussian distribution, v contains the voltage amplitude and voltage phase angle at the
buses, z is the vector of measurements, and H is a Jacobian topological matrix that maps
the system states to the measurements.
∂H (v)
Where H = ∂v is an invariable Jacobi matrix that depends on the impedance of the
network topology. These issues are frequently resolved using the Weighted Least Squares
algorithm. A quadratic optimization problem is created from the state estimation form,
and the estimated linearized state vector v0 is given by
−1
v0 = H T H HT z (6)
Bad data are produced as a result of measurement errors that happen at random,
whereas false data are created knowingly by malicious attackers. SE, is a common method
for detecting faulty data, is inefficient for detecting FDIA but excellent for detecting bad
data. FDIA allows for the malicious injection of the generated data b into the power flow
measurement vector as
Zbad = Hv + b + e (7)
and the injected false data vector is
b = [b1 , b2 , b3 . . . . . . bm ] T (8)
Zbad = z + b (9)
When there exist false data injected by some attackers, b will be a nonzero vector.
The estimation state variable v0 will be changed into v0F due to the injected false data
and there is v0F = v0 + c, where c is an n dimensional and nonzero vector. Assuming that the
injected data vector Zbad equals Hv, b will be ignored by the traditional detection method
as mentioned above. This is because
Measurement data will be reviewed to ensure maximum accuracy and faulty data will
be removed. Traditionally, the 2-norm residual test is used to identify faulty data:
where ∈ is the threshold for BDD. Bad data exist and should be eliminated before the
next iteration if the measurement residual rises above the threshold. However, these
conventional BDD techniques are unable to identify stealthy and intelligent attacks such
as FDI.
ˆ , x̂, and b denote the estimated state vector under attack, perfect FDI attack,
Where vbad
and injected attack vector, respectively. In this case, the derived measurement residual
in both with and without malicious data b is equal. Therefore, b = H (v̂ + c) − Hv which
results in
kz − Hvk2 = k Zbad − Hvbad k2 + Γ (12)
where Γ is an error term attributed to the state estimation that must remain within a
certain threshold depending on the power system. A method of attack that meets the
aforementioned requirement is said to be stealthy. Even if the attacker just has a limited
understanding of the network topology, such a covert attack vector is always there [59]. As
a result, the traditional residual-based BDD process in DC state estimation may be unable
to identify FDIA that are skillfully created by adversaries who are already familiar with the
grid, such as its network architecture H and estimated states v̂.
Energies 2023, 16, 1651 14 of 24
Figure 5.
Figure 5. Cyber-attack
Cyber-attack detecting
detecting techniques
techniques in
in smart
smart grid.
grid.
To minimize
To minimize and and identify
identify FDIAs
FDIAs on on SESE in
in smart
smart grids,
grids, some
some techniques
techniques have have been
been
proposed in
proposed in the
the literature
literature [60–63].
[60–63]. While
While thethe major
major objective
objective of of ML
ML isis to
to give
give the
the learning
learning
agent the ability to learn learn without
without guidance or human involvement, it might be seen as aa
potential example
potential exampleofof MLML in future.
in the the future. Thekind
The first firstofkind of ML technique,
ML technique, supervised supervised
learning,
learning,that
assumes assumes that the
the training training
data data labeled
have been have been andlabeled
that theand that the algorithm’s
algorithm’s output
output has already
been input into
has already beenthe machine.
input into theThe learningThe
machine. agent constructs
learning agenta constructs
model to go from the
a model to input
go fromto
the
the output,
input to ledthe
by output,
the trainingled data,
by theonce it is aware
training data,ofonce
the output. The supervised
it is aware learning
of the output. The
techniques
supervisedcan be divided
learning into Support
techniques can be Vector Machine
divided into (SVM),
Support Artificial
Vector Neural
Machine Networks
(SVM),
(ANN), Decision Trees (DTs), K-Nearest Neighbor (KNN),
Artificial Neural Networks (ANN), Decision Trees (DTs), K-Nearest Neighbor (KNN), and Naive Bayesian Classifier
(NB). Unsupervised
and Naive learning, (NB).
Bayesian Classifier whichUnsupervised
belongs to the second which
learning, group belongs
of ML approaches
to the second is
computationally
group of ML approaches more expensive than supervised
is computationally more learning
expensive techniques but requires
than supervised no
learning
labeling
techniques of datasets [64]. no
but requires Unsupervised learning[64].
labeling of datasets methods often focuslearning
Unsupervised on the following
methods three
often
objectives:
focus on the (i) clustering,
following three(ii) dimensionality
objectives: (i)reduction,
clustering, and(ii)(iii) density evaluation.
dimensionality Principal
reduction, and
component
(iii) density evaluation. Principal component analysis (PCA), Dirichlet processes,few
analysis (PCA), Dirichlet processes, K-means, and spectral clustering are a K-
examples
means, and of unsupervised
spectral clusteringML. Between the supervised
are a few examples of and unsupervisedML.
unsupervised learning families,
Between the
semi-supervised models use both
supervised and unsupervised labeled
learning and unlabeled
families, semi-supervised data for training.
models Algorithms
use both labeled
used in reinforcement learning models use the estimated errors
and unlabeled data for training. Algorithms used in reinforcement learning models as rewards or deterrents.
use
The
the most important
estimated errorsfeatures of reinforcement
as rewards learningThe
or deterrents. are trial-error
most importantsearch and delayed
features of
reinforcement learning are trial-error search and delayed reward. To maximize the
desired performance, this family of models enables the automatic determination of the
optimum behavior within a particular environment. Q-learning, Monte Carlo, and the
Hidden Markov are illustrations of a model that fits inside this family.
Energies 2023, 16, 1651 15 of 24
reward. To maximize the desired performance, this family of models enables the automatic
determination of the optimum behavior within a particular environment. Q-learning,
Monte Carlo, and the Hidden Markov are illustrations of a model that fits inside this family.
Because the dataset’s observations are all unlabeled and the algorithms learn the
inherent structure from the input data, researchers are now advised to utilize unsupervised
algorithms in smart grids to identify cyber-attacks [65,66]. The supervised technique has a
high computing cost and necessitates measurements with labels from continuous samplings
that may not be available in real-world operations. The majority of ML algorithms now
in use for identifying FDIAs, including [67,68], are supervised and assess anomalous data
that deviates in some way from the labeled data made available during training. Due
to high labeling costs, the datasets gathered from real-world cyber-physical systems are
only partially labeled [69]. Additionally, in practice, the scale of unlabeled data is typically
much larger than that of labeled data, and these enormous amounts of unlabeled data
infrequently participate in the supervised learning process. This absence causes the loss
of important data and, ultimately, the collapse of the process. Some newly discovered
cyberattack data are inherently unlabeled, making it challenging for supervised or semi-
supervised learning to identify FDIA. To detect unobservable attacks or outliers that avoid
the traditional BDD method, this research describes a new learning-based FDIA detection
algorithm. This unsupervised learning technique can be used online and can identify these
threats in milliseconds. The following sections describe ARM and clustering, which are
two main categories for unsupervised algorithms. ARM is about finding relationships
between the attributes of those data points and is the process of measuring the degree of
association between any two items. On the other hand, clustering is about the data points
and the process of segregating a huge number of data points into small groups sharing
similar characteristics.
Flow chart
Figure 6. Flow chart of detecting cyber-attack based on ARM.
Smart meters,
Smart meters, MTUs,
MTUs, RTUs,
RTUs, PDCs,
PDCs, and
and other
other devices
devices will
will be
be sensing
sensing the
the high
high volume
volume
of current and voltage produced by DG units. This dataset must include both invasion
of current and voltage produced by DG units. This dataset must include both invasion
and attacked signals. The sequential selection, preprocessing, transformation, data mining,
and attacked signals. The sequential selection, preprocessing, transformation, data
interpreting, and evaluating database procedure used in this study makes use of the
mining, interpreting, and evaluating database procedure used in this study makes use of
knowledge discovery database. Data cleaning is the process of eliminating noisy and useless
Energies 2023, 16, 1651 17 of 24
data from a collection. The term data integration refers to the combining of heterogeneous
data from various sources into a single source, such as the fact that the same attacks
occurred repeatedly in the same DG. The extract-load-transformation method is used for
data integration. Data selection is the process by which data from the data collection,
such as FDIA, plug or play, communication latency, load change, and link failure, that are
determined to be pertinent to the analysis are chosen and retrieved. Data transformation
is the process of converting data into the format needed for mining operations, such as
values or legends. A method used to extract potentially relevant patterns is known as
data mining. Identification of strictly increasing patterns that indicate knowledge based
on predetermined metrics is the definition of pattern evaluation. The term knowledge
representation refers to a method for visualizing data mining outcomes such as support, lift,
and confidence. The data mining outcomes were calculated by using the following method.
Training historical datasets are a primary goal of DM methods in this study [73].
Finding interesting rules from transactional databases was the original purpose of ARM. A
relationship between various attributes is described by an association rule: I f ( A AND B)
then (C ). Following this criterion, C must also be present wherever A and B are. A given
the relationship’s frequency in the data can be determined via metrics for association rules.
The conditional probability of C given A and B is the confidence, while the support is
the prior probability of A, B, and C. It finds frequent sets of items (i.e., combinations of
items that are purchased together in at least N transactions in the database), and from
the frequent items sets such as { X, Y }, generates association rules of the form: X → Y
and/or Y → X .
Multiple algorithms, including Apriori [74], FP-Growth association rule [75], Eclat [76],
Prefixspan [77], and Spade [78], are included in the ARM approach. For instance, Agarwal
and Srikant [79] proposed the Apriori method in 1994. To extract common item sets
(candidate generation) from a dataset, a level-wise bottom-up strategy is used. According
to the required minimum support count, it locates the item sets. Apriori does have some
restrictions, though. For instance, several scans are necessary. Each data set requires an
explicit scan, which could result in I/O expenses. The existence of all necessary patterns
is not guaranteed. Due to the requirement for extensive storage and processing time, the
computational cost is likewise considerable.
The other method used frequently to mine the entire set of frequent patterns is pattern
fragment growth (FP-Growth ARM). This methodology employs a divide-and-conquer
strategy to establish a connection between various elements. The processing speed is
relatively quick, and it makes greater use of the available space. When the patterns are
paired and the dataset contains a lot of objects, this strategy is ineffective. The full set of
patterns in sequential pattern mining is mined using Prefixspan (also known as Prefix-
projected Sequential pattern mining). Candidate sequel generation efforts are far fewer
than those for FP-Growth. It employs the divide and conquers strategy to unearth hidden
patterns in the database. Prefixspan’s drawbacks include the processing need for additional
child patterns and gaps. However, since we would need to identify malicious patterns in
real-time IoT traffic, these algorithms do not work well in network security applications.
The SPADE algorithm makes use of the vertical ID-list format, which enables the creation
of patterns and the computation of support for each sequence without engaging in an
excessive amount of database reading that could burden the system. However, the SPADE
algorithm has a problem that results from the generate-candidate-and-test methodology.
This method might produce many sequence patterns that do not appear in the database
very frequently. SPADE is a SNORT plugin and it minimizes computational and I/O costs
by reducing database scans.
5.2. Clustering
The clustering approach is a typical matrix-theory-based unsupervised data-driven
method. To put it another way, clustering is a technique used to divide up dissimilar
data into many clusters while grouping like data into a single cluster. AMI offers network
Energies 2023, 16, 1651 18 of 24
The traditional grid and the smart grid are susceptible to human error. These mistakes
may be the result of overworked personnel, which limits their ability to make decisions, or
they may be the result of social engineering or insider attacks if workers are not prepared
to deal with these types of assaults. Therefore, the smart grid would maintain service
availability while providing several layers of security, utilizing the virtual private network
(VPN) to increase secure communication during attacks.
Future CPS research should take into account the unpredictability of system pa-
rameters, modeling, observations, and the dynamic properties of smart grids, which are
restricted by their varied states and operating conditions. The next generation of electri-
cal systems will be completely dependent on the smart grid. Investigating and creating
a standardized architecture, framework, and technology standard for the smart grid is
crucial since it will serve as the basis for more suitable security regulations and remedies
against cyberattacks.
The protocols that are currently being used would not offer very high security. With
such outdated protocols, confidentiality, privacy, integrity, and responsibility can all be
readily compromised. New security protocols are therefore required for smart grid net-
works. Depending on the needs of the smart grid application, a new protocol must be
created or the existing protocol must be improved.
The absence of research interest in hybrid AC/DC smart grids or microgrids presents
another difficulty for power system security. Future smart grids will likely combine AC/DC
smart grids with DG power interfaces with load, energy storage, and power electronics
converter grids. In a hybrid microgrid, the number of points of vulnerability to cyber
exploitation has the potential to increase significantly because the CPS now includes various
AC-based appliances in addition to the necessary protections against cyberattacks, which
makes modeling, creating control strategies, and designing detection algorithms more
challenging. Moreover, the control strategy for the hybrid grid, in addition to protecting
their respective voltage regions, needs to consider AC/DC interlinking problem.
Before any cyberattack occurs, the models for AI-based detection systems must un-
dergo significant training. As a result, strategies that identify not only incoming signals but
also serve to both prevent new attacks and help in system recovery are required. In the field
of power system control, a cutting-edge unsupervised ML application for CPS is emerging.
To track the stability of CPS, it combines hybrid data from cyber and physical systems.
Future research in cybersecurity is suggested to concentrate more on the model-free ap-
proach, either using an unsupervised or reinforcement detection method or enhanced SE
that can assess the state of the system regardless of system dynamics. High-level security
data structures and algorithms are required because the current state estimator methods
cannot identify improper/defective data using the existing detection techniques present in
the FDIAs.
Because intelligent grids connect many devices over extensive networks of geographic
locations, this presents a problem. Protecting this equipment from the bigger infrastructure
consequently becomes the main concern. A large amount of data from a power system
requires fast and efficient computing, which has been a concern for several researchers. Task
parallelism with multi-core, cluster and grid computing can reduce the computational time
in an efficient data mining algorithm. Blockchain technology may help with future security
issues brought on by bad nodes or hackers by enabling data sharing and encryption.
7. Conclusions
Smart grids integrate cutting-edge information and communication technologies into
conventional power grids to provide and manage power efficiently. On the other hand,
newly discovered security flaws in cyberspace could be used by potential adversaries to
launch cyberattacks that cause enormous harm. An exhaustive analysis of the network
architecture under cyber-attacks, state estimation in FDIA, and detection of FDIA by using
unsupervised learning algorithms are presented in this research. Additionally, we reviewed
occurrences of cyberattacks against smart grids that occurred globally between 2017 and
Energies 2023, 16, 1651 21 of 24
2023, taking into account a variety of factors such as attack type, detection, merits, and
demerits. As a result, this article takes into account the limitations of the previous studies
and offers a detailed analysis of potential attacks on smart grids as well as a comparison of
various security measures. We analyzed and suggested a method based on unsupervised
learning algorithms to detect cyber threats in smart grids using PMU and AMI metrics that
connect the physical and cyber realms. Future research paths are thus presented from the
standpoint of emerging technologies for the robust cybersecurity of smart grids against
complex cyberattacks, as novel attack strategies are boundlessly exposed.
Author Contributions: Conceptualization, M.P. and S.J.P.; methodology, M.P. and P.S; validation,
S.J.P., P.S. and M.P.; writing—original draft preparation, S.J.P.; writing—review and editing, P.S.;
visualization, P.S.; supervision, P.S.; funding acquisition, P.S. All authors have read and agreed to the
published version of the manuscript.
Funding: This research received no external funding.
Data Availability Statement: Not applicable.
Acknowledgments: This work was supported by SERB, Department of Science and Technology,
Government of India for the project file number SIR/2022/000299 through SIRE fellowship.
Conflicts of Interest: The authors declare no conflict of interest.
References
1. Abrahamsen, F.E.; Ai, Y.; Cheffena, M. Communication Technologies for Smart Grid: A Comprehensive Survey. Sensors 2021,
21, 8087. [CrossRef]
2. Pinto, S.J.; Panda, G. Improved Decoupled Control and Islanding Detection of Inverter-based Distribution in Multibus Microgrid
Systems. J. Power Electron. 2016, 4, 1526–1540. [CrossRef]
3. Yan, Y.; Qian, Y.; Sharif, H.; Tipper, D. A Survey on Smart Grid Communication Infrastructures: Motivations, Requirements, and
Challenges. IEEE Commun. Surv. 2013, 15, 5–20. [CrossRef]
4. Alanazi, M.A.; Mahmood, A.; Chowdhury, M.J.M. SCADA Vulnerabilities and Attacks: A Review of the State-of-the-Art and
Open Issues. Comput. Secur. 2023, 125, 103028. [CrossRef]
5. Shi, L.; Dai, Q.; Ni, Y. Cyber-Physical Interactions in Power Systems: A Review of Models, Methods, and Applications. Electr.
Power Syst. Res. 2018, 163, 396–412. [CrossRef]
6. Mohammadi, Z.; Pinto, S.J.; Panda, G.; Thokchom, S. A Survey of Cyber Security in Smart Microgrid. In Sustainable Energy,
and Technological Advancements; Panda, G., Naayagi, R.T., Mishra, S., Eds.; Advances in Sustainability Science and Technology;
Springer: Singapore, 2022.
7. Bo, X.; Qu, Z.; Wang, L.; Dong, Y.; Zhang, Z.; Wang, D. Active Defense Research against False Data Injection Attacks of Power
CPS Based on Data-Driven Algorithms. Energies 2022, 15, 7432. [CrossRef]
8. Lai, S.; Chen, B.; Li, T.; Yu, L. Packet-Based State Feedback Control under DOS Attacks in Cyber-Physical Systems. IEEE Trans.
Circuits Syst. II Express Briefs 2019, 66, 1421–1425. [CrossRef]
9. Kim, J.; Tong, L. On Topology Attack of a Smart Grid. In Proceedings of the IEEE PES Innovative Smart Grid Technologies
Conference (ISGT), Washington, DC, USA, 24–27 February 2013.
10. Antoniadis, N.; Cordy, M.; Sifaleras, A.; Le Traon, Y. Preventing Overloading Incidents on Smart grids: A Multi-Objective
Combinatorial Optimization Approach. In Optimization and Learning OLA; Springer: Cham, Switzerland, 2020; Volume 1173,
pp. 269–281.
11. Wu, Y.; Wei, Z.; Weng, J.; Li, X.; Deng, R.H. Resonance Attacks on Load Frequency Control of Smart Grids. IEEE Trans. Smart Grid
2018, 9, 4490–4502. [CrossRef]
12. Du, M.; Pierrou, G.; Wang, X.; Kassouf, M. Targeted False Data Injection Attacks against AC State Estimation without Network
Parameters. IEEE Trans. Smart Grid 2021, 12, 349–5361. [CrossRef]
13. Costilla-Enriquez, N.; Weng, Y. Attack Power System State Estimation by Implicitly Learning the Underlying Models. IEEE Trans.
Smart Grid 2022, 14, 649–662. [CrossRef]
14. Liu, Y.; Ning, P.; Reiter, M.K. False Data Injection Attacks against State Estimation in Electric Power Grids. ACM Trans. Inf. Syst.
Secur. 2011, 14, 33. [CrossRef]
15. Heming, H.; Fei, L.; Tinghui, O.; Xiaoming, Z. Sequential Detection of Microgrid Bad Data via a Data-Driven Approach Combining
Online Machine Learning with Statistical Analysis. Front. Energy Res. 2022, 10, 861563.
16. El Mrabet, Z.; Kaabouch, N.; El Ghazi, H.; El Ghazi, H. Cyber-Security in Smart Grid: Survey and Challenges. Comput. Electr. Eng.
2018, 67, 469–482. [CrossRef]
17. Hasan, M.K.; Habib, A.; Shukur, Z.; Ibrahim, F.; Islam, S.; Razzaque, M.A. Review on Cyber-Physical and Cyber-Security System
in Smart Grid: Standards, Protocols, Constraints, and Recommendations. J. Netw. Comput. Appl. 2023, 209, 103540. [CrossRef]
Energies 2023, 16, 1651 22 of 24
18. Tufail, S.; Parvez, I.; Batool, S.; Sarwat, A. A Survey on Cybersecurity Challenges, Detection, and Mitigation Techniques for the
Smart Grid. Energies 2021, 14, 5894. [CrossRef]
19. Amin, M.; El-Sousy, F.F.M.; Aziz, G.A.A.; Gaber, K.; Mohammed, O.A. CPS Attacks Mitigation Approaches on Power Electronic
Systems with Security Challenges for Smart Grid Applications: A Review. IEEE Access 2021, 9, 38571–38601. [CrossRef]
20. Liu, Q.; Hagemeyer, V.; Keller, H.B. A Review of Rule Learning-Based Intrusion Detection Systems and their Prospects in Smart
Grids. IEEE Access 2021, 9, 57542–57564. [CrossRef]
21. Abir, S.M.A.A.; Anwar, A.; Choi, J.; Kayes, A.S.M. IoT-Enabled Smart Energy Grid: Applications and Challenges. IEEE Access
2021, 9, 50961–50981. [CrossRef]
22. Nafees, M.N.; Saxena, N.; Cardenas, A.; Grijalva, S.; Burnap, P. Smart Grid Cyber-Physical Situational Awareness of Complex
Operational Technology Attacks: A Review. ACM Comput. Surv. 2022, 55, 215. [CrossRef]
23. Ding, J.; Qammar, A.; Zhang, Z.; Karim, A.; Ning, H. Cyber Threats to Smart Grids: Review, Taxonomy, Potential Solutions, and
Future Directions. Energies 2022, 15, 6799. [CrossRef]
24. Tuyen, N.D.; Quan, N.S.; Linh, V.B.; Van Tuyen, V.; Fujita, G. A Comprehensive Review of Cybersecurity in Inverter-Based Smart
Power System Amid the Boom of Renewable Energy. IEEE Access 2022, 10, 35846–35875. [CrossRef]
25. Xu, Y. A Review of Cyber Security Risks of Power Systems: From Static to Dynamic False Data Attacks. Prot. Control. Mod. Power
Syst. 2020, 5, 19. [CrossRef]
26. Faquir, D.; Chouliaras, N.; Sofia, V.; Olga, K.; Maglaras, L. Cybersecurity in Smart Grids, Challenges, and Solutions. AIMS
Electron. Electr. Eng. 2021, 5, 24–37.
27. Liberati, F.; Garone, E.; Di Giorgio, A. Review of Cyber-Physical Attacks in Smart Grids: A System-Theoretic Perspective.
Electronics 2021, 10, 1153. [CrossRef]
28. Alsuwian, T.; Butt, S.A.; Amin, A.A. Smart Grid Cyber Security Enhancement: Challenges and Solutions—A Review. Sustainability
2022, 14, 14226. [CrossRef]
29. Mohammadi, F. Emerging Challenges in Smart Grid Cybersecurity Enhancement: A Review. Energies 2021, 14, 1380. [CrossRef]
30. Yohanandhan, R.V.; Elavarasan, R.M.; Manoharan, P.; Mihet-Popa, L. Cyber-Physical Power System (CPPS): A Review on
Modeling, Simulation, and Analysis with Cyber Security Applications. IEEE Access 2020, 8, 151019–151064. [CrossRef]
31. Zhang, H.; Liu, B.; Wu, H. Smart Grid Cyber-Physical Attack and Defense: A Review. IEEE Access 2021, 9, 29641–29659. [CrossRef]
32. Sridhar, S.; Hahn, A.; Govindarasu, M. Cyber-Physical System Security for the Electric Power Grid. Proc. IEEE 2012, 100, 210–224.
[CrossRef]
33. Liang, G.; Zhao, J.; Luo, F.; Weller, S.R.; Dong, Z.Y. A Review of False Data Injection Attacks Against Modern Power Systems.
IEEE Trans. Smart Grid 2017, 8, 1630–1638. [CrossRef]
34. Humayed, A.; Lin, J.; Li, F.; Luo, B. Cyber-Physical Systems Security—A Survey. IEEE Internet Things J. 2017, 4, 1802–1831.
[CrossRef]
35. Hossain, E.; Khan, I.; Un-Noor, F.; Sikander, S.S.; Sunny, M.S.H. Application of Big Data and Machine Learning in Smart Grid,
and Associated Security Concerns: A Review. IEEE Access 2019, 7, 13960–13988. [CrossRef]
36. Ye, J.; Giani, A.; Elasser, A.; Mazumder, S.K.; Farnell, F.; Mantooth, H.A.; Kim, T.; Liu, J.; Chen, B.; Seo, G.-S.; et al. A Review of
Cyber–Physical Security for Photovoltaic Systems. IEEE J. Emerg. Sel. Top. Power Electron. 2022, 10, 4879–4901. [CrossRef]
37. Hussain, S.M.S.; Ustun, T.S.; Kalam, A. A Review of IEC 62351 Security Mechanisms for IEC 61850 Message Exchanges. IEEE
Trans. Ind. Inform. 2020, 16, 5643–5654. [CrossRef]
38. Khoei, T.T.; Slimane, H.O.; Kaabouch, N. A Comprehensive Survey on the Cyber-Security of Smart Grids: Cyber-Attacks,
Detection, Countermeasure Techniques, and Future Directions. In Cryptography and Security; Artificial Intelligence; Cornell
University: Ithaca, NY, USA, 2022.
39. Gaggero, G.B.; Girdinio, P.; Marchese, M. Advancements and Research Trends in Microgrids Cybersecurity. Appl. Sci. 2021,
11, 7363. [CrossRef]
40. Villalón, A.; Rivera, M.; Salgueiro, Y.; Muñoz, J.; Dragičević, T.; Blaabjerg, F. Predictive Control for Microgrid Applications: A
Review Study. Energies 2020, 13, 2454. [CrossRef]
41. Sayed, K.; Gabbar, H.A. SCADA and Smart Energy Grid Control Automation. Smart Energy Grid Eng. 2017, 18, 481–514. [CrossRef]
42. Ferrag, M.A.; Babaghayou, M.; Yazici, M.A. Cyber Security for Fog-based Smart Grid SCADA Systems: Solutions and Challenges.
J. Inf. Secur. Appl. 2020, 52, 102500. [CrossRef]
43. Huitsing, P.; Chandia, R.; Papa, M.; Shenoi, S. Attack Taxonomies for the Modbus Protocols. Int. J. Crit. Infrastruct. Prot. 2008,
1, 37–44. [CrossRef]
44. Kuzlu, M.; Pipattanasompom, M.; Rahman, S. A Comprehensive Review of Smart Grid Related Standards and Protocols. In Pro-
ceedings of the 2017 5th International Istanbul Smart Grid and Cities Congress and Fair (ICSG), Istanbul, Turkey, 12–16 April 2017.
45. Mackiewicz, R.E. Overview of IEC 61850 and Benefits. In Proceedings of the 2006 IEEE PES Power Systems Conference and
Exposition, Atlanta, GA, USA, 29 October–1 November 2006.
46. Gungor, V.C.; Sahin, D.; Kocak, T.; Ergut, S.; Buccella, C.; Cecati, C.; Hancke, G.P. A Survey on Smart Grid Potential Applications
and Communication Requirements. IEEE Trans. Ind. Inform. 2013, 9, 28–42. [CrossRef]
47. Burg, A.; Chattopadhyay, A.; Lam, K.-Y. Wireless Communication and Security Issues for Cyber-Physical Systems and the
Internet-of-things. Proc. IEEE 2018, 106, 38–60. [CrossRef]
Energies 2023, 16, 1651 23 of 24
48. Ahmed, S.; Gondal, T.M.; Adil, M.; Malik, S.A.; Qureshi, R. A Survey on Communication Technologies in Smart Grid. In
Proceedings of the 2019 IEEE PES GTD Grand International Conference and Exposition Asia (GTD Asia), Bangkok, Thailand,
19–23 March 2019; pp. 7–12.
49. Gungor, V.C.; Sahin, D.; Kocak, T.; Ergut, S.; Buccella, C.; Cecati, C.; Hancke, G.P. Smart Grid Technologies: Communication
Technologies and Standards. IEEE Trans. Ind. Inform. 2011, 7, 529–539. [CrossRef]
50. Sengupta, J.; Ruj, S.; Bit, S.D. A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT.
J. Netw. Comput. Appl. 2020, 149, 102481. [CrossRef]
51. Lopez, C.; Sargolzaei, A.; Santana, H.; Huerta, C. Smart Grid Cyber Security: An Overview of Threats and Countermeasures.
J. Energy Power Eng. 2015, 9, 632–647.
52. Musleh, A.S.; Chen, G.; Dong, Z.Y. A Survey on the Detection Algorithms for False Data Injection Attacks in Smart Grids. IEEE
Trans. Smart Grid 2020, 11, 2218–2234. [CrossRef]
53. Zhang, Y.; Wang, J.; Chen, B. Detecting False Data Injection Attacks in Smart Grids: A Semi-Supervised Deep Learning Approach.
IEEE Trans. Smart Grid 2021, 12, 623–634. [CrossRef]
54. Hong, J.; Nuqui, R.F.; Kondabathini, A.; Ishchenko, D.; Martin, A. Cyber Attack Resilient Distance Protection and Circuit Breaker
Control for Digital Substations. IEEE Trans. Ind. Inform. 2019, 15, 4332–4341. [CrossRef]
55. Qu, Z.; Dong, Y.; Qu, N.; Li, H.; Cui, M.; Bo, X.; Wu, Y.; Mugemanyi, S. False Data Injection Attack Detection in Power Systems
Based on Cyber-Physical Attack Genes. Front. Energy Res. 2021, 9, 644489. [CrossRef]
56. Kleinmann, A.; Amichay, O.; Wool, A.; Tenenbaum, D.; Bar, O.; Lev, L. Stealthy Deception Attacks Against SCADA Systems,
Computer Security. SECURE CyberICPS 2017. In Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2018;
p. 10683.
57. Rajesh, L.; Satyanarayana, P. Detection and Blocking of Replay, False Command, and False Access Injection Commands in SCADA
Systems with Modbus Protocol. Secur. Commun. Netw. 2021, 4, 8887666.
58. Aeiad, F.; Gao, W.; Momoh, J. Bad Data Detection for Smart Grid State Estimation. In Proceedings of the 2016 North American
Power Symposium (NAPS), Denver, CO, USA, 18–20 September 2016; pp. 1–6.
59. Xu, R.; Wang, R.; Guan, Z.; Wu, L.; Wu, J.; Du, X. Achieving Efficient Detection Against False Data Injection Attacks in Smart Grid.
IEEE Access 2017, 5, 13787–13798. [CrossRef]
60. Esmalifalak, M.; Liu, L.; Nguyen, N.; Zheng, R.; Han, Z. Detecting Stealthy False Data Injection using Machine Learning in Smart
Grid. IEEE Syst. J. 2017, 11, 1644–1652. [CrossRef]
61. Chaojun, G.; Jirutitijaroen, P.; Motani, M. Detecting False Data Injection Attacks in AC state estimation. IEEE Trans. Smart Grid
2015, 6, 2476–2483. [CrossRef]
62. He, Y.; Mendis, G.J.; Wei, J. Real-Time Detection of False Data Injection Attacks in Smart Grid: A Deep Learning based Intelligent
Mechanism. IEEE Trans. Smart Grid 2017, 8, 2505–2516. [CrossRef]
63. Ashok, A.; Govindarasu, M.; Ajjarapu, V. Online Detection of Stealthy False Data Injection Attacks in Power System State
Estimation. IEEE Trans. Smart Grid 2018, 9, 1636–1646. [CrossRef]
64. Zhuang, P.; Deng, R.; Liang, H. False Data Injection Attacks Against State Estimation in Multiphase and Unbalanced Smart
Distribution Systems. IEEE Trans. Smart Grid 2019, 10, 6000–6013. [CrossRef]
65. Aboelwafa, M.M.N.; Seddik, K.G.; Eldefrawy, M.H.; Gadallah, Y.; Gidlund, M. A Machine-Learning-Based Technique for False
Data Injection Attacks Detection in Industrial IoT. IEEE Internet Things J. 2020, 7, 8462–8471. [CrossRef]
66. Vincent, P.; Larochelle, H.; Lajoie, I.; Bengio, Y.; Manzagol, P.-A. Stacked Denoising Autoencoders: Learning Useful Representa-
tions in a Deep Network with a Local Denoising Criterion. J. Mach. Learn. Res. 2010, 11, 3371–3408.
67. Yao, L.; Ge, Z. Scalable Semi-Supervised GMM for Big Data Quality Prediction in Multimode Processes. IEEE Trans. Ind. Electron.
2019, 66, 3681–3692. [CrossRef]
68. Bennett, K.P.; Demiriz, A. Semi-Supervised Support Vector Machines, in NIPS; The MIT Press: Cambridge, MA, USA, 1998;
pp. 368–374.
69. Wilson, D.; Tang, Y.; Yan, J.; Lu, Z. Deep Learning-Aided Cyber-Attack Detection in Power Transmission Systems. In Proceedings
of the IEEE Power Energy Soc General Meet PESGM, Portland, OR, USA, 5–10 August 2018.
70. Ju, C.; Bao, F.; Xu, C.; Fu, X. A Novel Method of Interestingness Measures for Association Rules Mining Based on Profit. Discret.
Dyn. Nat. Soc. 2015, 2, 868634. [CrossRef]
71. Abu, M.S.; Selamat, S.R.; Yusof, R.; Ariffin, A. An Attribution of Cyberattack using Association Rule Mining (ARM). Int. J. Adv.
Comput. Sci. Appl. (IJACSA) 2020, 11, 2. [CrossRef]
72. Lou, P.; Lu, G.; Jiang, X.; Jiang, Z.; Hu, J.; Yan, J. Cyber Intrusion Detection through Association Rule Mining on Multi-Source
Logs. Appl. Intell. 2021, 51, 4043–4057. [CrossRef]
73. Wu, X.; Zhang, C.; Zhang, S. Efficient Mining of both Positive and Negative Association Rules. ACM Trans. Inf. Syst. 2004, 22,
381–405. [CrossRef]
74. Prakash, S.; Vijayakumar, M. An Effective Network Traffic Data Control Using Improved Apriori Rule Mining. Circuits Syst. 2016,
7, 3162–3173. [CrossRef]
75. Rosyid, N.R.; Ohrui, M.; Kikuchi, H.; Sooraksa, P.; Terada, M. A Discovery of Sequential Attack Patterns of Malware in Botnets. In
Proceedings of the 2010 IEEE International Conference on Systems, Istanbul, Turkey, 10–13 October 2010; Man and Cybernetics,
pp. 2564–2570.
Energies 2023, 16, 1651 24 of 24
76. Isam, K.T.; Osman, N.U.; Bayat, O.; Alsaedi, K.H. Improving IDSs Alerts to Improve High-Quality Network Security by using
Data Mining Techniques. Aurum J. Eng. Syst. Archit. 2017, 1, 17–29.
77. Ohrui, M.; Kikuchi, H.; Rosyid, N.R.; Terada, M. Mining Botnet Coordinated Attacks using an Apriori-Prefix Span Hybrid
Algorithm. J. Inf. Process. J. Inf. Process. 2013, 21, 607–616.
78. Nugroho, E.P.; Megasari, R.; Junaeti, E.; Pribadi, S.R. Implementation of CM-SPADE Algorithm in Building Denial of Service
Detection System Model Using Snort. In Proceedings of the 7th Mathematics, Science, and Computer Science Education
International Seminar, MSCEIS 2019, Bandung, West Java, Indonesia, 12 October 2019.
79. Agrawal, R.; Srikant, R. Mining sequential patterns. In Proceedings of the Eleventh International Conference on Data Engineering,
Taipei, Taiwan, 6–10 March 1995; pp. 3–14.
80. Silva, C.; Faria, P.; Vale, Z. Clustering Support for an Aggregator in a Smart Grid Context. In Hybrid Intelligent Systems;
Madureira, A., Abraham, A., Gandhi, N., Varela, M., Eds.; HIS 2018; Advances in Intelligent Systems and Computing; Springer:
Berlin/Heidelberg, Germany, 2020; Volume 923.
81. Saddam, A.; Muhammad, I.; Ahmed, H.S.; Wu, J.; Nan, D.D.; Ahmad, S. Protection of a Smart Grid with the Detection of
Cyber-Malware Attacks using Efficient and Novel Machine Learning Models. Front. Energy Res. 2022, 10, 1102.
82. Lei, W.; Xu, P.; Qu, Z.; Bo, X.; Dong, Y.; Zhang, Z.; Li, Y. Coordinated Cyber-Attack Detection Model of Cyber-Physical Power
System Based on the Operating State Data Link. Front. Energy Res. 2021, 9, 666130.
83. Hussain, T.; Saeed, M.I.; Khan, I.U.; Aslam, N.; Aljameel, S.S. Implementation of a Clustering Based DDoS Detection Method.
Electronics 2022, 11, 2804. [CrossRef]
84. Bohara, B.; Bhuyan, J.; Wu, F.; Ding, J. A Survey on the Use of Data Clustering for Intrusion Detection System in Cyber Security.
Int. J. Netw. Secur. Appl. 2020, 12, 1–18. [PubMed]
85. Faisal, M.A.; Aung, Z.; Williams, J.R.; Sanchez, A. Data-Stream based Intrusion Detection System for Advanced Metering
Infrastructure in Smart Grid: A feasibility study. IEEE Syst. J. 2015, 9, 31–44. [CrossRef]
86. Pena, J.; Lozano, J.; Larranaga, P. An Empirical Comparison of Four Initialization Methods for the k-Means Algorithm. Pattern
Recognit. Lett. 1999, 20, 1027–1040. [CrossRef]
87. Jin, X.; Han, J. K-Medoids Clustering. In Encyclopedia of Machine Learning; Sammut, C., Webb, G.I., Eds.; Springer:
Berlin/Heidelberg, Germany, 2011.
88. Sreenivasulu, V.; Prasad, R.S. A Methodology for Cybercrime Identification using Email Corpus based on the Gaussian Mixture
Model. Int. J. Comput. Appl. 2015, 117, 29–32.
89. Farrokhifard, M.M.; Hatami, M.; Venkatasubramanian, V.M.; Torresan, G.; Panciatici, P.; Xavier, F. Clustering of Power System
Oscillatory Modes using Dbscan Technique. In Proceedings of the 2019 North American Power Symposium (NAPS), Wichita, KS,
USA, 13–15 October 2019; pp. 1–6.
90. Anwar, A.; Mahmood, A.N.; Zahir, T. Identification of Vulnerable Node Clusters against False Data Injection Attack in an
AMI-based Smart Grid. Inf. Syst. 2015, 53, 201–212. [CrossRef]
91. Gallardo, J.L.; Ahmed, M.A.; Jara, N. Clustering Algorithm-Based Network Planning for Advanced Metering Infrastructure in
Smart Grid. IEEE Access 2021, 9, 48992–49006. [CrossRef]
92. Abazari, A.; Zadsar, M.; Ghafouri, M.; Atallah, R.; Assi, C. A Data Mining/ANFIS and Adaptive Control for Detection and
Mitigation of Attacks on DC MGs. IEEE Trans. Smart Grid, 2022; (Early access). [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.