Contextual anomaly detection for cyber-physical security in Smart Grids based on an artificial neural network model

Anna Magdalena Kosek

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    Abstract

    This paper presents a contextual anomaly detection method and its use in the discovery of malicious voltage control actions in the low voltage distribution grid. The model-based anomaly detection uses an artificial neural network model to identify a distributed energy resource’s behaviour under control. An intrusion detection system observes distributed energy resource’s behaviour, control actions and the power system impact, and is tested together with an ongoing voltage control attack in a co-simulation set-up. The simulation results obtained with a real photovoltaic rooftop power plant data show that the contextual anomaly detection performs on average 55% better in the control detection and over 56% better in the malicious control detection over the point anomaly detection.
    Original languageEnglish
    Title of host publication2016 Joint Workshop on Cyber-Physical Security and Resilience in Smart Grids
    Number of pages6
    PublisherIEEE
    Publication date2016
    ISBN (Print)978-1-5090-1164-3
    DOIs
    Publication statusPublished - 2016
    Event2016 Joint Workshop on Cyber-Physical Security and Resilience in Smart Grids - CPSweek2016, Vienna, Austria
    Duration: 12 Apr 201612 Apr 2016

    Workshop

    Workshop2016 Joint Workshop on Cyber-Physical Security and Resilience in Smart Grids
    LocationCPSweek2016
    Country/TerritoryAustria
    CityVienna
    Period12/04/201612/04/2016

    Keywords

    • Anomaly detection
    • Intrusion Detection Systems
    • Smart grid
    • Data analysis
    • Cyber-physical security

    Fingerprint

    Dive into the research topics of 'Contextual anomaly detection for cyber-physical security in Smart Grids based on an artificial neural network model'. Together they form a unique fingerprint.

    Cite this