Machine learning for power system disturbance and cyber-attack discrimination

Raymond C. Borges Hink, Justin M. Beaver, Mark A. Buckner, Tommy Morris, Uttam Adhikari, Shengyi Pan

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

264 Scopus citations

Abstract

Power system disturbances are inherently complex and can be attributed to a wide range of sources, including both natural and man-made events. Currently, the power system operators are heavily relied on to make decisions regarding the causes of experienced disturbances and the appropriate course of action as a response. In the case of cyber-attacks against a power system, human judgment is less certain since there is an overt attempt to disguise the attack and deceive the operators as to the true state of the system. To enable the human decision maker, we explore the viability of machine learning as a means for discriminating types of power system disturbances, and focus specifically on detecting cyber-attacks where deception is a core tenet of the event. We evaluate various machine learning methods as disturbance discriminators and discuss the practical implications for deploying machine learning systems as an enhancement to existing power system architectures.

Original languageEnglish
Title of host publication7th International Symposium on Resilient Control Systems, ISRCS 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781479941872
DOIs
StatePublished - Sep 16 2014
Event7th International Symposium on Resilient Control Systems, ISRCS 2014 - Denver, United States
Duration: Aug 19 2014Aug 21 2014

Publication series

Name7th International Symposium on Resilient Control Systems, ISRCS 2014

Conference

Conference7th International Symposium on Resilient Control Systems, ISRCS 2014
Country/TerritoryUnited States
CityDenver
Period08/19/1408/21/14

Keywords

  • SCADA
  • Smart grid
  • cyber-attack
  • machine learning

Fingerprint

Dive into the research topics of 'Machine learning for power system disturbance and cyber-attack discrimination'. Together they form a unique fingerprint.

Cite this