Adaptive Hierarchical Cyber Attack Detection and Localization in Active Distribution Systems
Adaptive Hierarchical Cyber Attack Detection and Localization in Active Distribution Systems
Abstract—Development of a cyber security strategy for the the inherent distributed energy resources (DER) and topology
active distribution systems is challenging due to the inclusion of complexities [1], [2]. Raw electrical waveforms, signals of
distributed renewable energy generations. This paper proposes electrical networks, together with those in cyber networks pro-
an adaptive hierarchical cyber attack detection and localization
framework for distributed active distribution systems via ana- vide great potentials in cyber attack detection [3]. For example,
lyzing electrical waveforms. Cyber attack detection is based on devices in power networks must leave clues of their operational
a sequential deep learning model, via which even minor cyber status and health (including faults or attacks) information in
attacks can be identified. The two-stage cyber attack localiza- the raw electrical waveform signals: a cyber-device in fault or
tion algorithm first estimates the cyber attack sub-region, and under attack will cause unusual energy consumption pattern in
then localize the specified cyber attack within the estimated sub-
region. We propose a modified spectral clustering-based network power networks [4]; a power electronics or electric machine in
partitioning method for the hierarchical cyber attack ‘coarse’ fault or under attack may cause unusual harmonics or energy
localization. Next, to further narrow down the cyber attack profile in electrical networks [5].
location, a normalized impact score based on waveform statisti- By analyzing the electrical waveform signals and their root
cal metrics is proposed to obtain a ‘fine’ cyber attack location cause, waveform analytics can present utilities with a com-
by characterizing different waveform properties. Finally, com-
pared with classical and state-of-art methods, a comprehensive plete picture of the health and status of their system, both
quantitative evaluation with two case studies shows promising during outages and normal operating conditions. It could also
estimation results of the proposed framework. provide a variety of operational benefits to system opera-
Index Terms—Cyber attack localization, adaptive, hierarchical, tors, asset management personnel, and repair crew. Electronic
online, distribution networks. sensors placed on power grids and distribution systems can
either measure the electricity properties, such as phasor mea-
surement unit (PMU) sensors [6], [7] or directly record the
I. I NTRODUCTION raw electrical waveform using waveform measurement unit
(WMU) [8]–[12], depending on the needed fidelity of moni-
YBER attack localization is important to protect smart
C distribution grids, but also a challenging task because of
toring applications. Thanks to developed network connectivity,
the streaming monitoring data flow can be obtained and
analyzed online and in real-time [13].
Manuscript received August 31, 2021; revised January 3, 2022; accepted
January 27, 2022. Date of publication February 1, 2022; date of current The network of the waveform sensors form an Internet of
version April 22, 2022. This work was supported in part by the National Things (IoT) system [4], [14], where the waveform sensors are
Key Research and Development Project under Grant 2018YFC1900800 and viewed as networked IoT sensing devices. Therefore, we can
Grant 2018YFC1900805; in part by the National Science Foundation of
China under Grant 61890930-5, Grant 61903010, Grant 62021003, and Grant potentially use the information embedded in electrical signals
62125301; in part by the Beijing Outstanding Young Scientist Program under to enable security monitoring, diagnosis, and prognosis in the
Grant BJJWZYJH01201910005020; in part by the Beijing Natural Science power networks. The possibility may be well beyond what we
Foundation under Grant KZ202110005009; in part by the U.S. Department
of Energy’s Solar Energy Technology Office under Award DE-EE0009026; can imagine now. It broadly applies to many cyber-physical
in part by the U.S. National Science Foundation under Grant NSF-ECCS- systems (CPS) and applications, such as power distribution
1946057; and in part by Southern Company. Paper no. TSG-01400-2021. networks, multi-stage manufacturing systems, electric vehi-
(Corresponding author: Fangyu Li.)
Qi Li, Jinan Zhang, Jin Ye, and Wenzhan Song are with the cles, and so on [15]–[17]. Cyber attacks towards connected
Center for Cyber-Physical Systems, University of Georgia, Athens, GA IoT devices trigger anomalies in system statistics, energy con-
30602 USA (e-mail: [email protected]; [email protected]; [email protected]; sumption, as well as electrical waveforms [4], [14], [18], [19].
[email protected]).
Junbo Zhao is with the Department of Electrical and Computer Engineering, Thus, recorded waveform which carries high fidelity cur-
University of Connecticut, Storrs, CT 06269 USA (e-mail: [email protected]). rent and voltage information should be adequate for cyber
Fangyu Li is with the Faculty of Information Technology, Beijing Key attack characterization. Furthermore, the transmission of the
Laboratory of Computational Intelligence and Intelligent System, Engineering
Research Center of Digital Community, Ministry of Education, and Beijing high-frequency waveform data is feasible in practice [20]–[22].
Artificial Intelligence Institute, Beijing University of Technology, Beijing Data-driven methods have been widely adopted for event
100124, China (e-mail: [email protected]). localization in power electronics networks and active distri-
Color versions of one or more figures in this article are available at
https://doi.org/10.1109/TSG.2022.3148233. bution systems. Rule-based data-driven analytics [23], signal
Digital Object Identifier 10.1109/TSG.2022.3148233 property-based approach [24], and neural networks (NN) based
1949-3053
c 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: Chiba University. Downloaded on April 10,2025 at 05:54:56 UTC from IEEE Xplore. Restrictions apply.
2370 IEEE TRANSACTIONS ON SMART GRID, VOL. 13, NO. 3, MAY 2022
Fig. 2. The adopted cyber attack model of the studied active distribution
systems. The vulnerability of the smart inverter due to FDI attacks is shown.
Fig. 1. The proposed adaptive hierarchical online cyber attack localization
workflow. The details are discussed in Section III.
of power electronics converters. Specifically, PV embedded
active distribution system is one of the most representative
algorithms, such as autoencoders [25], convolutional neu-
examples. For smart inverters in the distribution systems, false
ral network (CNN) [26], have been developed. However,
data integrity (FDI) attack is one of the common cyber-attacks
NN-based algorithms typically require a large amount of
when an enormous amount of DERs are connected to the
training data to capture the sophisticated features, which can-
power system [28], [29]. Besides the high order abnormal
not be fully simulated or acquired from real applications.
harmonics caused by the cyber attacks towards the power
Thus, combining the rule-based signal processing methods and
electronics devices in the power system, FDI attack could
machine learning methods could lead to a solution tackling the
also manipulate the critical threshold in relays [30] and trans-
challenging problem using an affordable data size.
formers [31] to induce the short circuit faults. In addition,
There have been numerous works targeting the event and
the research on FDI attacks against distribution system SE
cyber attack localization problem [1], [2], [27]. Dynamic
(DSSE) is an interesting open area. In [32], the vulnerability
data analytics based localization is always a major branch
of distribution system SE (DSSE) to FDI attack was investi-
for the distribution networks [1], DC microgrid [2], islanded
gated. The work in [33] provides a basis to study the attack
microgrid [27]. This paper proposes a new adaptive hierarchi-
behaviors in distribution systems and a theoretical guide to
cal framework for efficient and accurate cyber attack detection
develop protective countermeasures. Authors in [34] attempt
and localization by taking advantage of the electrical wave-
to optimize the effectiveness and hiddenness of Moving Target
forms (Fig. 1). The proposed approach has a hierarchical
Defense (MTD) while considering voltage stability. MTD is a
architecture that divides the whole network into sub-groups
new technology to defend against the FDI attack on DSSE.
and then locates the cyber attack within one local cluster.
In this paper, to simulate cyber attacks that occurred in the
Based on a modified unsupervised clustering and an deep
active distribution grid, FDI attack is modeled here, which
learning based anomaly detection method, cyber attacks in
is assumed to falsify the sensor measurements and degrade
the active distribution systems can be adaptively detected and
controller performance. FDI attack is defined as
located. The performance of the proposed approach has been
tested by multiple cyber attack scenarios in two representative Y = α Yf + β Y0 , (1)
case studies.
Our contributions are summarized as follows: where Y is the falsified data vector that is eventually used by
• We propose an adaptive hierarchical cyber attack detec- the controller, Y0 is the original measurement, Yf is a fake data
tion and localization framework for active distribution vector which can be independent or determined by Y0 , α is a
systems with DERs using the electrical waveform; coefficient that determines the weight of the attack vector, β
• High fidelity models of DER and cyber attacks are built is a coefficient that defines the weight of the measurement.
to analyze the impacts of cyber attacks towards the In the PV (photovotaic) converter controller in the Fig. 2,
distribution networks; Y0 is shown as
• Extensive experiments are utilized to evaluate the
T
Y0 = Upv , Ipv , Udc , If , Uc , Ig . (2)
proposed approach performances with quantitative ana-
lytics; where Upv , Ipv are the PV array voltage and current, respec-
The remainder of this paper is organized as follows. In tively. Udc is DC link voltage, If is the inverter-side current
Section II, the cyber attack model of active distribution in LCL filter, Uf is the capacitor voltage in LCL filter, Ig is
systems is discussed. In Section III, we describe the proposed the grid-side current in LCL filter. As for the phase voltage
approaches with the details of each key component, which source inverter (VSI), Y0 only includes If , Uc and Ig . Both
are cyber attack detection, network partition and cyber attack Fig. 2 and Fig. A.1 show the vulnerability of the inverter due
localization. Experiments and evaluations can be found in to FDI attacks. More detailed model of DERs in this paper is
Section IV. In the end, a conclusion is drawn in Section V. illustrated in the Appendix.
Authorized licensed use limited to: Chiba University. Downloaded on April 10,2025 at 05:54:56 UTC from IEEE Xplore. Restrictions apply.
LI et al.: ADAPTIVE HIERARCHICAL CYBER ATTACK DETECTION AND LOCALIZATION IN ACTIVE DISTRIBUTION SYSTEMS 2371
online processing procedures, such as cyber attack detec- Algorithm 1 Modified Spectral Clustering
tion, network partitioning, sub-region determination, and cyber 1: Input: Adjacency matrix A, data matrix X and cluster
attack localization. In this section, we introduce the method- number K.
ologies in detail with thorough discussions. Note that we 2: Compute the Affinity matrix S based on the data matrix.
assume the optimal sensor placement (OSP) has been done 3: Compute the modified Laplacian matrix L = (D − S) +
offline. The purpose of OSP to achieve the observability of μ(D − A).
the whole distribution system with the minimum number of 4: For K clusters, compute the first K eigenvectors
waveform sensors [35]. [v1 , v2 , . . . , vK ].
5: Stack the vectors to form a matrix with the vectors as
A. Cyber Attack Detection columns.
6: Represent every node by the corresponding row of the
Distribution power systems typically operate under
steady-state. Therefore, the cyber attack can be detected stacked matrix, which forms the feature matrix.
7: Use K-means clustering to cluster data samples into K
based on the deviation of the monitoring metrics from
steady-state, which, in our study, is an anomaly detection clusters {C1 , C2 , . . . , CK }.
problem. For time-series sensor streaming data, statistical
analysis is typically used for cyber attack detection [13], [14].
Our previous studies [13], [15] utilizing the data-driven meth- models, it should be pointed out that we use the average of
ods have shown remarkable performance regarding the three-phase current and voltage to calculate the measurement
electrical waveform data. By applying the cyber attack correlation.
detection algorithm on streaming waveform measurement The modified Laplacian matrix L can be defined as
unit (WMU) data, we can determine if there is a cyber attack
L = (D − S) + μ(D − A), (4)
in real time. In this case, cyber attack detection is treated
as a one-class classification problem. A Multi-layer Long where μ is a penalty term, without losing generality, to bal-
Short-Term Memory Network (MLSTM) from our previous ance the influences on grid partition result from static topology
work has been applied, which not only remembers sequential and dynamic data structure. Then, the eigenstructure of the
information but also carries out a more rigorous screening Laplacian matrix L is analyzed to decide which cluster the
of time information. So, we can generalize the behavior nodes belong to. The details of the modified spectral clustering
complexity of the active distribution systems without a huge can be found in Algorithm 1.
dataset. Besides, detectors such as CUSUM, DBSCAN, and
our MLSTM, are compared. C. Cyber Attack Localization Within Sub-Regions
B. Network Partition Based on Modified Spectral Clustering Combining our proposed cyber attack detection and modi-
fied spectral clustering, the cyber attack can be located into a
To efficiently locate the cyber attacks, we propose to first sub-region of the large-scale networks. Furthermore, we need
partition the active distribution systems into several sub- to locate the cyber attack within the sub-regions. Following
regions. It is similar to divide a centralized problem into the assumption that the affected waveform signals show dif-
smaller problems and solving them in a distributed manner. ferent influences according to the distances between the sensor
Spectral clustering is a classic unsupervised learning method locations and the cyber attack location, we propose a signal
based on the graph theory to partition a graph into several anomaly strength-based approach to detect the exact loca-
sub-graphs [36], [37], which is easy to implement and per- tion of the cyber attack. The location of WMU’s placement
forms well. Therefore it is suitable for the active distribution plays a vital role in better observability and localization of
system partition in our study. We propose a modified spectral cyber attacks. Note that, in our study, we assume the topol-
clustering to search for the optimal partition results. ogy is known beforehand. Comparing the abnormal scales, the
Let A ∈ RN×N be the adjacency matrix of our WMU sensor relative distances can be determined. Therefore, the relative
topology and its entry is defined as locations in the topology can be inferred. However, some-
1
, if node i and j are connected. times, this approach may provide a range instead of a node
Aij = Zij (3) point, which is already an improvement using limited sensors.
0, otherwise.
The disturbance at the point of impact of stone is stronger,
where Zij is the impedance between vertex i and vertex j. but it fades out soon, and at the other end of the lake, no
In this case, Aij = Z1ij if vertex i and vertex j are con- such disturbance can be visibly detected. Similarly, the WMU
nected in the original active distribution system topology and can detect the cyber attacks if they are near the cyber attack
Aij = 0 if vertex i and vertex j are not connected directly. Let location, and in some cases, multiple WMU can detect the
D = diag(A1n ) be the diagonal
matrix where Dii is the degree cyber attacks. Cyber attacks which have a more significant
di of node i, i.e., di = Nj=1 ij In addition, let S ∈ R
A . N×N be impact will generate obvious signatures and can be detected in
the affinity matrix calculated based on the measurement cor- multiple WMU. However, some minor cyber attacks or cyber
relations. This measurement correlation could be customized attacks are local, and their signatures are not strong enough
as long as it could represent the electrical distance among to be picked up by WMUs far in the electrical distance in the
nodes. Since we have considered three-phase unbalance in our network. Therefore, we compute statistical parameters and get
Authorized licensed use limited to: Chiba University. Downloaded on April 10,2025 at 05:54:56 UTC from IEEE Xplore. Restrictions apply.
2372 IEEE TRANSACTIONS ON SMART GRID, VOL. 13, NO. 3, MAY 2022
a normalized score to determine the WMU with the strongest Algorithm 2 Subgraph Scanning and Localization
signal for a particular. This method helps extract information Input clustering result matrix, cyber attack detection result.
based on WMU data. Output Subgraph, Cyber Attack location
1) Impact Scores of WMUs: To characterize the pattern 1: From the proposed spectral clustering result, select the
of the waveform data, we proposed the following four (4) cluster which comprises the cyber attack nodes based on
statistical measures: the detection result.
• Standard Deviation σ : σ is suitable for measuring the 2: Subgraph = selected cluster
data distribution and in our case the disturbance caused 3: Compute the Normalized Impact Score [Eq. (9)] for each
by the attack in waveform data. σ can be calculated as: element in subgraph.
4: CyberAttackLocation = WMU with highest IS
1 N
σ =
5: if Cyber attack location is not on the WMU bus then
(Xi − μ)2 , (5)
N 6: Pick the WMU with 2nd highest IS
i=1
7: CyberAttackLocation is in between the 1st highest IS
where ‘X’ is the stream data, ‘i’ is the index of the WMU and 2nd highest IS WMU
stream data window length ‘N’, and μ is the mean of return SubGraph, CyberAttackLocation
data window.
• Range: Range measures the pattern variation of WMU TABLE I
data during the cyber attack. It can be expressed as: D ETAILS A BOUT FDI ATTACKS T OWARDS THE P OWER G RID
Authorized licensed use limited to: Chiba University. Downloaded on April 10,2025 at 05:54:56 UTC from IEEE Xplore. Restrictions apply.
LI et al.: ADAPTIVE HIERARCHICAL CYBER ATTACK DETECTION AND LOCALIZATION IN ACTIVE DISTRIBUTION SYSTEMS 2373
TABLE II
Fig. 3. A smart grid example with solar farms, which is based on the IEEE
P ERFORMANCE OF D IFFERENT D ETECTORS
37 node model. And the sensor locations from OSP are indicated by the black
filled circles.
Fig. 6. Power grid partitioning result based on the traditional spectral cluster- Fig. 8. Network partitioning result based on the traditional spectral clustering
ing method in the IEEE 37-node model. Clustered grid nodes are in different when a FDI attack occurs at node 727.
colors.
Authorized licensed use limited to: Chiba University. Downloaded on April 10,2025 at 05:54:56 UTC from IEEE Xplore. Restrictions apply.
LI et al.: ADAPTIVE HIERARCHICAL CYBER ATTACK DETECTION AND LOCALIZATION IN ACTIVE DISTRIBUTION SYSTEMS 2375
TABLE III
S ILHOUETTE S CORE TABLE FOR IEEE 37-N ODE M ODEL
Fig. 12. IS scores for attack on node 727: (a) the whole topology and (b) the
subgraph. In both figures, node 727 obviously has the highest IS.
Fig. 13. Sub-regions (a) with the cyber attack and (b) without the cyber
attack in Fig. 11.
For the FDI attack case, combined with detection result and
clustering results, we located the target locations to node 709,
744, 727 as shown Fig. 9. There IS results are shown in the
right-side figure in Fig. 12, which shows that node 727’s IS is
the highest when the attack is happening, indicating the cyber
attack should be located in there, and it is actually correct. The
left figure shows the IS scores for all the nodes in our power
Fig. 11. Network partitioning result based on the proposed modified spectral network. Among all the nodes, the node 727’s IS is still the
clustering when a FDI attack occurs at node 706.
highest. It could capture some global topology information
but not exactly. Moreover, calculating global IS would cost
Algorithm 2. The statistical IS (impact score) of every poten- much more time than just calculating the nodes in the
tial cyber attack location would be calculated, and the node sub-graph.
getting highest IS score would be considered as the cyber For the cyber attack case at node 706, combined with
attack location or the place nearest to the cyber attack loca- detection result and clustering results, we located the target
tion. Taking the FDI attack case at node 727 (Fig. 9) and fault locations to node 707, 714, 725 as shown Fig. 11. Fig. 13
case at node 706 (Fig. 11) as the examples, we calculate the shows two sub-regions with cyber attack (Fig. 13(a)) and
IS score to determine the cyber attack location. without cyber attack (Fig. 13(b)).
Authorized licensed use limited to: Chiba University. Downloaded on April 10,2025 at 05:54:56 UTC from IEEE Xplore. Restrictions apply.
2376 IEEE TRANSACTIONS ON SMART GRID, VOL. 13, NO. 3, MAY 2022
Fig. 14. (a) IS score for FDI induced three phase short circuit fault on
node 706. (b) zoom in version of (a). From both figures, node 725 obviously
has the highest IS, which is nearest to the cyber attack location.
Fig. 15. NS score results: (a) FDI attack case and (b) FDI attack induced
fault case.
Their IS results are shown in Fig. 14. It shows that node TABLE IV
725’s IS is the highest when the fault is happening, but in P ERFORMANCE W ITH D IFFERENT L EVELS OF G AUSSIAN W HITE
this case, it’s not the same node; otherwise, the difference N OISE (C YBER ATTACK ON THE N ODE 744)
between each node should be more significant.Therefore, the
cyber attack location should be node 706, which is correct.
We evaluate our localization performance by comparing
with the NS (Normalized Score) in the reference [41], which
is calculated to locate the cyber attack location in the network
using micro-PMU data. Fig. 15 shows the NS results for the
nodes of the subgraph in both FDI attack cases. From the fig-
ure, we can see that the NS score works well in the ground TABLE V
P ERFORMANCE W ITH D IFFERENT L EVELS OF L APLACE
fault case. However, for the attack on node 727, the result N OISE (C YBER ATTACK ON THE N ODE 744)
leads us to the wrong location. The NS scores of Node 744
and 727 are higher than the cyber attack location node 725,
and they are not distinguishable, which means ours IS score
is more robust in terms of the waveform data.
Fig. 16. IEEE 123-bus distribution system. The WMU sensors are marked Fig. 18. Power grid partitioning result based on the traditional spectral
in yellow. clustering method in the IEEE 123-bus model. Clustered grid nodes are in
different colors.
TABLE VI
WMU S ENSORS IN IEEE 123-BUS S YSTEM TABLE VII
S ILHOUETTE S CORE TABLE FOR IEEE 123-B US M ODEL
cases are shown in Table VII. The proposed approach not only
works in this larger grid, but also generates superior results
compared to other methods.
Authorized licensed use limited to: Chiba University. Downloaded on April 10,2025 at 05:54:56 UTC from IEEE Xplore. Restrictions apply.
2378 IEEE TRANSACTIONS ON SMART GRID, VOL. 13, NO. 3, MAY 2022
A PPENDIX
M ODELING D ISTRIBUTED E NERGY R ESOURCES Fig. A.1. Voltage source inverter (VSI) DER model.
With more and more DERs integrated into power system,
a growing number of security problems are being exposed
constantly. Also, the cyber-phyiscal security becomes prior- As shown in Fig. A.1, a DER model based on voltage source
ity especially considering the evolution of smart inverters in inverter is built. DC capacitor voltage represents the renewable
DERs. Here, FDI attacks on PV converter and voltage source energy, e.g., wind turbine, battery, etc. The droop control loop
inverter are modeled. is constructed in the controller, which can be expressed as,
ω = ωn − mp P,
A. Two-Stage Two-Level PV Converter Model
As shown in the Fig. 2, two-stage PV converters are θ = ωn t − mp Pdt,
constructed. The first stage includes PV array and DC/DC v∗d = Vn − nq Q, v∗q = 0, (A.3)
converter. The PV array voltage Upv and current Ipv are the
input of DC/DC controller. The MPPT algorithm is applied in where ωn is the rated frequency, mp is active power droop
DC/DC controller so that PV array generates maximum power coefficient, nq is active power droop coefficient, P and Q are
to inverter. And the second stage comprises DC/AC inverter power reference. Also, the voltage and current control loop is
and LCL filter. In the DC/AC controller, voltage control loop modeled in the controller. Both of two control loop is achieved
is used to maintain DC link voltage and generate the current with a standard PI controller. The current control loop in the
∗ for the current control loop. The reactive power
reference Ifd VSI is same as in the PV converter. Thus, the model of voltage
control loop is built in the controller and determines the Ifq . control loop is only introduced as follow,
The current loop can be expressed as, ∗ −U
∗ ∗
kiv Ucd cd
∗ −I Ifd = kpv Ucd − Ucd + − ωCf Ucq ,
ki Ifd fd s
∗ ∗
Uid = kp Ifd − Ifd + − ωLf Ifq , ∗ −U
kiv Ucd cd
s ∗ ∗
Ifq = kpv Ucd − Ucd + + ωCf Ucd , (A.4)
∗ s
ki Ifd − Ifd
∗ ∗ ∗
Uiq = kp Ifd − Ifd + + ωLf Ifd , (A.1) where, Ifd,q is current reference for current control loop, and
s Cf is the capacitor in LCL filter, kpv , kiv are the PI parameters,
where, Ifd,q is inverter side current in the LCL filter, and Lf is ∗
Ucd,q is voltage reference for voltage control loop, Ucd,q is the
∗
the inductance in LCL filter, kp , ki are the PI parameters, Uid,q capacitor voltage in d,q framework.
is the control signal to PWM. The inverter and LCL filter can
be modeled as follow,
R EFERENCES
1
I˙fd = (Uid − Ucd ) + ωIfq , [1] I. Džafić, R. A. Jabr, S. Henselmeyer, and T. Ðonlagić, “Fault location in
Lf distribution networks through graph marking,” IEEE Trans. Smart Grid,
1 vol. 9, no. 2, pp. 1345–1353, Mar. 2018.
I˙fq = Uiq − Ucq − ωIfd , [2] R. Bhargav, B. R. Bhalja, and C. P. Gupta, “Novel fault detection and
Lf localization algorithm for low-voltage DC microgrid,” IEEE Trans. Ind.
1 Informat., vol. 16, no. 7, pp. 4498–4511, Jul. 2020.
U˙cd = Ifd − Igd + ωUcq , [3] G. Wu, G. Wang, J. Sun, and J. Chen, “Optimal partial feedback attacks
Cf in cyber-physical power systems,” IEEE Trans. Autom. Control, vol. 65,
1 no. 9, pp. 3919–3926, Sep. 2020.
U˙cq = Ifq − Igq − ωUcd , [4] F. Li, Y. Shi, A. Shinde, J. Ye, and W.-Z. Song, “Enhanced cyber-
Cf physical security in Internet of Things through energy auditing,” IEEE
1 Internet Things J., vol. 6, no. 3, pp. 5224–5231, Jun. 2019.
˙ =
Igd Ucd − Ugd + ωIgq , [5] A. J. Wilson, D. R. Reising, R. W. Hay, R. C. Johnson, A. A. Karrar,
Lg and T. D. Loveless, “Automated identification of electrical disturbance
1 waveforms within an operational smart power grid,” IEEE Trans. Smart
˙ =
Igq Ucq − Ugq − ωIgd . (A.2) Grid, vol. 11, no. 5, pp. 4380–4389, Sep. 2020.
Lg [6] P. Dutta, A. Esmaeilian, and M. Kezunovic, “Transmission-line fault
analysis using synchronized sampling,” IEEE Trans. Power Del., vol. 29,
no. 2, pp. 942–950, Apr. 2014.
B. Model of DER Based on Voltage Source Inverter (VSI) [7] I. Sadeghkhani, M. E. H. Golshan, A. Mehrizi-Sani, J. M. Guerrero,
and A. Ketabi, “Transient monitoring function–based fault detection for
Besides the PV farm, some DERs do not only offer power inverter-interfaced microgrids,” IEEE Trans. Smart Grid, vol. 9, no. 3,
to the grid but also maintain stability of frequency and voltage. pp. 2097–2107, May 2018.
Authorized licensed use limited to: Chiba University. Downloaded on April 10,2025 at 05:54:56 UTC from IEEE Xplore. Restrictions apply.
LI et al.: ADAPTIVE HIERARCHICAL CYBER ATTACK DETECTION AND LOCALIZATION IN ACTIVE DISTRIBUTION SYSTEMS 2379
[8] A. F. Bastos, S. Santoso, W. Freitas, and W. Xu, “SynchroWaveform [30] B. M. R. Amin, S. Taghizadeh, M. S. Rahman, M. J. Hossain,
measurement units and applications,” in Proc. IEEE Power Energy Soc. V. Varadharajan, and Z. Chen, “Cyber attacks in smart grid–dynamic
Gen. Meeting (PESGM), Atlanta, GA, USA, 2019, pp. 1–5. impacts, analyses and recommendations,” IET Cyber-Phys. Syst. Theory
[9] (Schweitzer Eng. Lab., Pullman, WA, USA). SEL-T400L Time Appl., vol. 5, no. 4, pp. 321–329, 2020.
Domain Line Protection. Accessed: Jul. 31, 2020. [Online]. Available: [31] M. Stănculescu, S. Deleanu, P. C. Andrei, and H. Andrei, “A case study
https://selinc.com/ products/T400L/ of an industrial power plant under cyberattack: Simulation and analysis,”
[10] (Candura Instrum., Oakville, ON, Canada). iPSR Intelligent Power Energies, vol. 14, no. 9, p. 2568, 2021.
System Recorder. Accessed: Jul. 31, 2020. [Online]. Available: [32] P. Zhuang, R. Deng, and H. Liang, “False data injection attacks
https://www.candura.com/products/ipsr.html against state estimation in multiphase and unbalanced smart distribu-
[11] D. Borkowski, A. Wetula, and A. Bień, “Contactless measurement of tion systems,” IEEE Trans. Smart Grid, vol. 10, no. 6, pp. 6000–6013,
substation busbars voltages and waveforms reconstruction using electric Nov. 2019.
field sensors and artificial neural network,” IEEE Trans. Smart Grid, [33] R. Deng, P. Zhuang, and H. Liang, “False data injection attacks against
vol. 6, no. 3, pp. 1560–1569, May 2015. state estimation in power distribution systems,” IEEE Trans. Smart Grid,
[12] B. Gao, R. Torquato, W. Xu, and W. Freitas, “Waveform-based method vol. 10, no. 3, pp. 2871–2881, May 2018.
for fast and accurate identification of subsynchronous resonance events,” [34] M. Liu, C. Zhao, Z. Zhang, R. Deng, and P. Cheng, “Analysis of moving
IEEE Trans. Power Syst., vol. 34, no. 5, pp. 3626–3636, Sep. 2019. target defense in unbalanced and multiphase distribution systems con-
[13] F. Li et al., “Online distributed IoT security monitoring with sidering voltage stability,” in Proc. IEEE Int. Conf. Commun. Control
multidimensional streaming big data,” IEEE Internet Things J., vol. 7, Comput. Technol. Smart Grids (SmartGridComm), Aachen, Germany,
no. 5, pp. 4387–4394, May 2020. 2021, pp. 207–213.
[14] F. Li, A. Shinde, Y. Shi, J. Ye, X.-Y. Li, and W.-Z. Song, “System [35] M. Jamei et al., “Phasor measurement units optimal placement and
statistics learning-based IoT security: Feasibility and suitability,” IEEE performance limits for fault localization,” IEEE J. Sel. Areas Commun.,
Internet Things J., vol. 6, no. 4, pp. 6396–6403, Aug. 2019. vol. 38, no. 1, pp. 180–192, Jan. 2020.
[15] F. Li et al., “Detection and diagnosis of data integrity attacks in solar [36] J. Shi and J. Malik, “Normalized cuts and image segmentation,”
farms based on multilayer long short-term memory network,” IEEE IEEE Trans. Pattern Anal. Mach. Intell., vol. 22, no. 8, pp. 888–905,
Trans. Power Electron., vol. 36, no. 3, pp. 2495–2498, Mar. 2021. Aug. 2000.
[16] A. Wang and J. Shi, “Holistic modeling and analysis of multistage [37] U. Von Luxburg, “A tutorial on spectral clustering,” Stat. Comput.,
manufacturing processes with sparse effective inputs and mixed profile vol. 17, no. 4, pp. 395–416, 2007.
outputs,” IISE Trans., vol. 53, no. 5, pp. 582–596, 2021. [38] J. D. Healy, “A note on multivariate CUSUM procedures,”
[17] J. Ye et al., “Cyber–physical security of powertrain systems in modern Technometrics, vol. 29, no. 4, pp. 409–412, 1987.
electric vehicles: Vulnerabilities, challenges, and future visions,” IEEE [39] E. Schubert, J. Sander, M. Ester, H. P. Kriegel, and X. Xu, “DBSCAN
J. Emerg. Sel. Topics Power Electron., vol. 9, no. 4, pp. 4639–4657, revisited, revisited: Why and how you should (still) use DBSCAN,”
Aug. 2021. ACM Trans. Database Syst., vol. 42, no. 3, pp. 1–21, 2017.
[40] R. Xu and D. Wunsch, “Survey of clustering algorithms,” IEEE Trans.
[18] F. Li et al., “Detection and identification of cyber and physical
Neural Netw., vol. 16, no. 3, pp. 645–678, May 2005.
attacks on distribution power grids with PVs: An online high-
[41] S. Pandey, A. K. Srivastava, and B. G. Amidan, “A real time event detec-
dimensional data-driven approach,” IEEE J. Emerg. Sel. Topics
tion, classification and localization using synchrophasor data,” IEEE
Power Electron., vol. 10, no. 1, pp. 1282–1291, Feb. 2022,
Trans. Power Syst., vol. 35, no. 6, pp. 4421–4431, Nov. 2020.
[Online]. Available: https://ieeexplore.ieee.org/document/8847621,
[42] H. Jiang and Y. Zhang, “Short-term distribution system state forecast
doi: 10.1109/JESTPE.2019.2943449.
based on optimal synchrophasor sensor placement and extreme learning
[19] J. Zhang, S. Sahoo, J. C.-H. Peng, and F. G. Blaabjerg, “Mitigating
machine,” in Proc. IEEE Power Energy Soc. Gen. Meeting (PESGM),
concurrent false data injection attacks in cooperative dc microgrids,”
Boston, MA, USA, 2016, pp. 1–5.
IEEE Trans. Power Electron., vol. 36, no. 8, pp. 9637–9647, Aug. 2021.
[43] M. Izadi and H. Mohsenian-Rad, “Synchronous waveform measure-
[20] M. P. Tcheou et al., “The compression of electric signal waveforms for ments to locate transient events and incipient faults in power distribution
smart grids: State of the art and future trends,” IEEE Trans. Smart Grid, networks,” IEEE Trans. Smart Grid, vol. 12, no. 5, pp. 4295–4307,
vol. 5, no. 1, pp. 291–302, Jan. 2014. Sep. 2021.
[21] Y.-C. Chang and T.-C. Huang, “An interactive smart grid communi- [44] M. Izadi and H. Mohsenian-Rad, “Event location identification in dis-
cation approach for big data traffic,” Comput. Electr. Eng., vol. 67, tribution networks using waveform measurement units,” in Proc. IEEE
pp. 170–181, Apr. 2018. PES Innov. Smart Grid Technol. Eur. (ISGT-Europe), 2020, pp. 924–928.
[22] H. Maaß et al., “Data processing of high-rate low-voltage dis- [45] “iPSRTM Intelligent Power System Recorder.” Candura Instruments.
tribution grid recordings for smart grid monitoring and analysis,” [Online]. Available: https://www.candura.com/products/ipsr.html
EURASIP J. Adv. Signal Process., p. 14, 2015. [Online]. Available: (accessed Jul. 1, 2021).
https://doi.org/10.1186/s13634-015-0203-4
[23] X. Liang, S. A. Wallace, and D. Nguyen, “Rule-based data-driven analyt-
ics for wide-area fault detection using synchrophasor data,” IEEE Trans.
Ind. Appl., vol. 53, no. 3, pp. 1789–1798, May/Jun. 2017. Qi Li (Graduate Student Member, IEEE) received
[24] B. Wang, H. Wang, L. Zhang, D. Zhu, D. Lin, and S. Wan, “A the B.S. degree in optoelectric information science
data-driven method to detect and localize the single-phase grounding and engineering from Chongqing University in 2014,
fault in distribution network based on synchronized phasor measure- and the M.S. degree in computer engineering from
ment,” EURASIP J. Wireless Commun. Netw., pp. 1–13, 2019. [Online]. Chongqing University, Chongqing, China, in 2019.
Available: https://doi.org/10.1186/s13638-019-1521-2 He is currently pursuing the Ph.D. degree with the
[25] I. Niazazari and H. Livani, “A PMU-data-driven disruptive event clas- University of Georgia, Athens, GA, USA, where he
sification in distribution systems,” Electr. Power Syst. Res., vol. 157, is also a Research Assistant. His current research
pp. 251–260, Apr. 2018. focuses on cyber–physical systems and distributed
[26] I. Niazazari, R. J. Hamidi, H. Livani, and R. Arghandeh, “Cause system.
identification of electromagnetic transient events using spatiotemporal
feature learning,” Int. J. Electr. Power Energy Syst., vol. 123, Dec. 2020,
Art. no. 106255.
[27] S. F. Zarei, H. Mokhtari, and F. Blaabjerg, “Fault detection and pro- Jinan Zhang (Graduate Student Member, IEEE)
tection strategy for islanded inverter-based microgrids,” IEEE J. Emerg. received the B.S. degree from North China Electric
Sel. Topics Power Electron., vol. 9, no. 1, pp. 472–484, Feb. 2021. Power University in 2012, and the M.S. degree
[28] Y. He, G. J. Mendis, and J. Wei, “Real-time detection of false data injec- in electrical engineering from Tianjin University,
tion attacks in smart grid: A deep learning-based intelligent mechanism,” Tianjin, China, in 2015. He is currently pursuing the
IEEE Trans. Smart Grid, vol. 8, no. 5, pp. 2505–2516, Sep. 2017. Ph.D. degree with the University of Georgia, Athens,
[29] S. Wang, S. Bi, and Y.-J. A. Zhang, “Locational detection of the GA, USA, where he is also a Research Assistant. His
false data injection attack in a smart grid: A multilabel classifica- current research focuses on security and resilience in
tion approach,” IEEE Internet Things J., vol. 7, no. 9, pp. 8218–8227, power-electronics-based power systems.
Sep. 2020.
Authorized licensed use limited to: Chiba University. Downloaded on April 10,2025 at 05:54:56 UTC from IEEE Xplore. Restrictions apply.
2380 IEEE TRANSACTIONS ON SMART GRID, VOL. 13, NO. 3, MAY 2022
Junbo Zhao (Senior Member, IEEE) received the Wenzhan Song (Senior Member, IEEE) received the
Ph.D. degree from the Bradley Department of Ph.D. degree in computer science from the Illinois
Electrical and Computer Engineering, Virginia Tech Institute of Technology in 2005, the B.S. and M.S.
in 2018. He is an Assistant Professor with the degrees from the Nanjing University of Science
Department of Electrical and Computer Engineering, and Technology in 1997 and 1999, respectively. He
University of Connecticut. He was an Assistant is a Chair Professor of Electrical and Computer
Professor and a Research Assistant Professor with Engineering with the University of Georgia. His
Mississippi State University and Virginia Tech from research focuses on cyber-physical systems and their
2019 to 2021 and from 2018 to 2019, respec- applications in energy, environment, food, and health
tively. He did the summer internship with Pacific sectors. He received NSF CAREER award in 2010.
Northwest National Laboratory in 2017. He is the
Principal Investigator for a multitude of projects funded by the National
Science Foundation, the Department of Energy, National Laboratories, and
Eversource Energy. He has published three book chapters and more than
100 peer-reviewed journal and conference papers. His research interests are
cyber-physical power system modeling, monitoring, uncertainty quantifica-
tion, learning, dynamics, stability control, and cyber security with DERs. He
has been listed as the 2020 and 2021 World’s Top 2% Scientists released
by Stanford University in both Single-Year and Career tracks. He is the
receipt of the best paper awards of the 2020 and 2021 IEEE PES General
Meeting (3 papers), IEEE I&CPS Asia 2021, and the 2020 Journal of
Modern Power Systems and Clean Energy, Top 3 Associate Editor Award of
IEEE T RANSACTIONS S MART G RID in 2020, the 2020 IEEE PES Chapter
Outstanding Engineer Award, and the 2021 IEEE PES Chapter Outstanding
Volunteer Award. He is currently the Chair of the IEEE Task Force on Power
System Dynamic State and Parameter Estimation and IEEE Task Force on
Cyber–Physical Interdependency for Power System Operation and Control, the
Co-Chair of the IEEE Working Group on Power System Static and Dynamic
State Estimation, the Secretary of IEEE PES Bulk Power System Operation
Subcommittee and IEEE Task Force on Synchrophasor Applications in Power
System Operation and Control. He serves as an Associate Editor of IEEE
T RANSACTIONS ON P OWER S YSTEMS, IEEE T RANSACTIONS ON S MART
G RID, International Journal of Electrical Power & Energy Systems, the North
America Regional Editor of the IET Renewable Power Generation, and a
Subject Editor of IET Generation, Transmission & Distribution.
Authorized licensed use limited to: Chiba University. Downloaded on April 10,2025 at 05:54:56 UTC from IEEE Xplore. Restrictions apply.