1
|
False Data Injection Attack Detection in Smart Grid Using Energy Consumption Forecasting. ENERGIES 2022. [DOI: 10.3390/en15134877] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/27/2023]
Abstract
Supervisory Control and Data Acquisition (SCADA) systems are essential for reliable communication and control of smart grids. However, in the cyber-physical realm, it becomes highly vulnerable to cyber-attacks like False Data Injection (FDI) into the measurement signal which can circumvent the conventional detection methods and interfere with the normal operation of grids, which in turn could potentially lead to huge financial losses and can have a large impact on public safety. It is imperative to have an accurate state estimation of power consumption for further operational decision-making.This work presents novel forecasting-aided anomaly detection using an CNN-LSTM based auto-encoder sequence to sequence architecture to combat against false data injection attacks. We further present an adaptive optimal threshold based on the consumption patterns to identify abnormal behaviour. Evaluation is performed on real-time energy demand consumption data collected from the Australian Energy Market Operator. An extensive experiment shows that the proposed model outperforms other benchmark algorithms in not only improving the data injection attack (95.43%) but also significantly reducing the false positive rate.
Collapse
|
2
|
Risk Management Methodology for Transport Infrastructure Security. INFRASTRUCTURES 2022. [DOI: 10.3390/infrastructures7060081] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
Abstract
The development of transport infrastructure is associated with risks, expressed in the likelihood of harm to the road users’ health during road accidents and their consequences. The risk management process is aimed at reducing the influence of factors that contribute to the occurrence of an accident and increase the consequences’ severity after it. This article proposes a risk management methodology within five stages: identification, analysis and evaluation, processing, development of recommendations, and monitoring. For each step, we describe the methods and models that allow us to effectively solve the problem of risk management. We proposed a risk management algorithm based on feedback. We tested the adequacy of the methodology on a specific example: we conducted an analysis, an assessment, and proposed risk management measures in the field of ensuring road safety in a small town.
Collapse
|