Detecting replay attacks in power systems: A data-driven approach

8Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Detecting replay attacks in power systems is quite challenging, since the attackers can mimic normal power states and do not make direct damages to the system. Existing works are mostly model-based, which may either suffer from a low detection performance or induce negative side effects to power control. In this paper, we explore purely data-driven approach for good detection performance without side effects. Our basic idea is to learn a classifier using a set of labelled data (i.e., power state) samples to detect the replayed states from normal ones. We choose the Support Vector Machine (SVM) as our classifier, and a self-correlation coefficient as the data feature for detection. We evaluate and confirm the effectiveness of our approach on IEEE bus systems.

Cite

CITATION STYLE

APA

Ma, M., Zhou, P., Du, D., Peng, C., Fei, M., & AlBuflasa, H. M. (2017). Detecting replay attacks in power systems: A data-driven approach. In Communications in Computer and Information Science (Vol. 763, pp. 450–457). Springer Verlag. https://doi.org/10.1007/978-981-10-6364-0_45

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free