65 research outputs found

    Security Analysis of Interdependent Critical Infrastructures: Power, Cyber and Gas

    Get PDF
    abstract: Our daily life is becoming more and more reliant on services provided by the infrastructures power, gas , communication networks. Ensuring the security of these infrastructures is of utmost importance. This task becomes ever more challenging as the inter-dependence among these infrastructures grows and a security breach in one infrastructure can spill over to the others. The implication is that the security practices/ analysis recommended for these infrastructures should be done in coordination. This thesis, focusing on the power grid, explores strategies to secure the system that look into the coupling of the power grid to the cyber infrastructure, used to manage and control it, and to the gas grid, that supplies an increasing amount of reserves to overcome contingencies. The first part (Part I) of the thesis, including chapters 2 through 4, focuses on the coupling of the power and the cyber infrastructure that is used for its control and operations. The goal is to detect malicious attacks gaining information about the operation of the power grid to later attack the system. In chapter 2, we propose a hierarchical architecture that correlates the analysis of high resolution Micro-Phasor Measurement Unit (microPMU) data and traffic analysis on the Supervisory Control and Data Acquisition (SCADA) packets, to infer the security status of the grid and detect the presence of possible intruders. An essential part of this architecture is tied to the analysis on the microPMU data. In chapter 3 we establish a set of anomaly detection rules on microPMU data that flag "abnormal behavior". A placement strategy of microPMU sensors is also proposed to maximize the sensitivity in detecting anomalies. In chapter 4, we focus on developing rules that can localize the source of an events using microPMU to further check whether a cyber attack is causing the anomaly, by correlating SCADA traffic with the microPMU data analysis results. The thread that unies the data analysis in this chapter is the fact that decision are made without fully estimating the state of the system; on the contrary, decisions are made using a set of physical measurements that falls short by orders of magnitude to meet the needs for observability. More specifically, in the first part of this chapter (sections 4.1- 4.2), using microPMU data in the substation, methodologies for online identification of the source Thevenin parameters are presented. This methodology is used to identify reconnaissance activity on the normally-open switches in the substation, initiated by attackers to gauge its controllability over the cyber network. The applications of this methodology in monitoring the voltage stability of the grid is also discussed. In the second part of this chapter (sections 4.3-4.5), we investigate the localization of faults. Since the number of PMU sensors available to carry out the inference is insufficient to ensure observability, the problem can be viewed as that of under-sampling a "graph signal"; the analysis leads to a PMU placement strategy that can achieve the highest resolution in localizing the fault, for a given number of sensors. In both cases, the results of the analysis are leveraged in the detection of cyber-physical attacks, where microPMU data and relevant SCADA network traffic information are compared to determine if a network breach has affected the integrity of the system information and/or operations. In second part of this thesis (Part II), the security analysis considers the adequacy and reliability of schedules for the gas and power network. The motivation for scheduling jointly supply in gas and power networks is motivated by the increasing reliance of power grids on natural gas generators (and, indirectly, on gas pipelines) as providing critical reserves. Chapter 5 focuses on unveiling the challenges and providing solution to this problem.Dissertation/ThesisDoctoral Dissertation Electrical Engineering 201

    Event Detection in Micro-PMU Data: A Generative Adversarial Network Scoring Method

    Full text link
    A new data-driven method is proposed to detect events in the data streams from distribution-level phasor measurement units, a.k.a., micro-PMUs. The proposed method is developed by constructing unsupervised deep learning anomaly detection models; thus, providing event detection algorithms that require no or minimal human knowledge. First, we develop the core components of our approach based on a Generative Adversarial Network (GAN) model. We refer to this method as the basic method. It uses the same features that are often used in the literature to detect events in micro-PMU data. Next, we propose a second method, which we refer to as the enhanced method, which is enforced with additional feature analysis. Both methods can detect point signatures on single features and also group signatures on multiple features. This capability can address the unbalanced nature of power distribution circuits. The proposed methods are evaluated using real-world micro-PMU data. We show that both methods highly outperform a state-of-the-art statistical method in terms of the event detection accuracy. The enhanced method also outperforms the basic method

    ΠœΠ΅Ρ‚ΠΎΠ΄ΠΈ ΠΏΠΎΡˆΡƒΠΊΡƒ Π°Π½ΠΎΠΌΠ°Π»Ρ–ΠΉ Π² Π΄Π°Π½ΠΈΡ… Π²ΠΈΠΌΡ–Ρ€ΡŽΠ²Π°Π½ΡŒ Ρ€Π΅ΠΆΠΈΠΌΠ½ΠΈΡ… ΠΏΠ°Ρ€Π°ΠΌΠ΅Ρ‚Ρ€Ρ–Π² Π΅Π»Π΅ΠΊΡ‚Ρ€ΠΈΡ‡Π½ΠΎΡ— ΠΌΠ΅Ρ€Π΅ΠΆΡ–

    Get PDF
    Π’ статті ΠΏΡ€ΠΎΠ²Π΅Π΄Π΅Π½ΠΎ Π°Π½Π°Π»Ρ–Π· ΠΏΡ€ΠΎΠ±Π»Π΅ΠΌ ΠΏΡ€ΠΈ Π·Π±ΠΎΡ€Ρ– Ρ‚Π° ΠΎΠ±Ρ€ΠΎΠ±Ρ†Ρ– Π΄Π°Π½ΠΈΡ… ΠΌΠΎΠ½Ρ–Ρ‚ΠΎΡ€ΠΈΠ½Π³Ρƒ Ρ€Π΅ΠΆΠΈΠΌΠ½ΠΈΡ… ΠΏΠ°Ρ€Π°ΠΌΠ΅Ρ‚Ρ€Ρ–Π² Π΅Π»Π΅ΠΊΡ‚Ρ€ΠΈΡ‡Π½ΠΎΡ— ΠΌΠ΅Ρ€Π΅ΠΆΡ– Ρ‚Π° розглянуто ΠΊΠ»Π°ΡΠΈΡ„Ρ–ΠΊΠ°Ρ†Ρ–ΡŽ Π°Π½ΠΎΠΌΠ°Π»Ρ–ΠΉ, ΠΏΡ€ΠΎΠ±Π»Π΅ΠΌΠΈ, особливості Ρ‚Π° ΠΌΠ΅Ρ‚ΠΎΠ΄ΠΈ Ρ—Ρ… ΠΏΠΎΡˆΡƒΠΊΡƒ Π² Π΄Π°Π½ΠΈΡ… синхронізованих Π²Π΅ΠΊΡ‚ΠΎΡ€Π½ΠΈΡ… Π²ΠΈΠΌΡ–Ρ€ΡŽΠ²Π°Π½ΡŒ Π΅Π»Π΅ΠΊΡ‚Ρ€ΠΎΠ΅Π½Π΅Ρ€Π³Π΅Ρ‚ΠΈΡ‡Π½ΠΈΡ… систСм.The materials of the article are an overview of the problems of development of electric power systems in the context of data collection and processing of mode parameters and analytical review of methods of search and detection of anomalies in data of synchronized vector measurements of mode parameters of electric network. The classification of anomalies, problems that arise during their search, classification of methods of search and detection of anomalies, as well as modern methods of finding anomalies in the data of synchronized vector measurements of power systems are considered

    PMU Tracker: A Visualization Platform for Epicentric Event Propagation Analysis in the Power Grid

    Full text link
    The electrical power grid is a critical infrastructure, with disruptions in transmission having severe repercussions on daily activities, across multiple sectors. To identify, prevent, and mitigate such events, power grids are being refurbished as 'smart' systems that include the widespread deployment of GPS-enabled phasor measurement units (PMUs). PMUs provide fast, precise, and time-synchronized measurements of voltage and current, enabling real-time wide-area monitoring and control. However, the potential benefits of PMUs, for analyzing grid events like abnormal power oscillations and load fluctuations, are hindered by the fact that these sensors produce large, concurrent volumes of noisy data. In this paper, we describe working with power grid engineers to investigate how this problem can be addressed from a visual analytics perspective. As a result, we have developed PMU Tracker, an event localization tool that supports power grid operators in visually analyzing and identifying power grid events and tracking their propagation through the power grid's network. As a part of the PMU Tracker interface, we develop a novel visualization technique which we term an epicentric cluster dendrogram, which allows operators to analyze the effects of an event as it propagates outwards from a source location. We robustly validate PMU Tracker with: (1) a usage scenario demonstrating how PMU Tracker can be used to analyze anomalous grid events, and (2) case studies with power grid operators using a real-world interconnection dataset. Our results indicate that PMU Tracker effectively supports the analysis of power grid events; we also demonstrate and discuss how PMU Tracker's visual analytics approach can be generalized to other domains composed of time-varying networks with epicentric event characteristics.Comment: 10 pages, 5 figures, IEEE VIS 2022 Paper to appear in IEEE TVCG; conference encourages arXiv submission for accessibilit

    Physics-Informed Machine Learning for Data Anomaly Detection, Classification, Localization, and Mitigation: A Review, Challenges, and Path Forward

    Full text link
    Advancements in digital automation for smart grids have led to the installation of measurement devices like phasor measurement units (PMUs), micro-PMUs (ΞΌ\mu-PMUs), and smart meters. However, a large amount of data collected by these devices brings several challenges as control room operators need to use this data with models to make confident decisions for reliable and resilient operation of the cyber-power systems. Machine-learning (ML) based tools can provide a reliable interpretation of the deluge of data obtained from the field. For the decision-makers to ensure reliable network operation under all operating conditions, these tools need to identify solutions that are feasible and satisfy the system constraints, while being efficient, trustworthy, and interpretable. This resulted in the increasing popularity of physics-informed machine learning (PIML) approaches, as these methods overcome challenges that model-based or data-driven ML methods face in silos. This work aims at the following: a) review existing strategies and techniques for incorporating underlying physical principles of the power grid into different types of ML approaches (supervised/semi-supervised learning, unsupervised learning, and reinforcement learning (RL)); b) explore the existing works on PIML methods for anomaly detection, classification, localization, and mitigation in power transmission and distribution systems, c) discuss improvements in existing methods through consideration of potential challenges while also addressing the limitations to make them suitable for real-world applications
    • …
    corecore