Review of Cybersecurity Analysis in Smart Distribution Systems and Future Directions for Using Unsupervised Learning Methods for Cyber Detection
Abstract
:1. Introduction
2. Review Methodology
- We have provided the overview of a cyber-attack on smart energy systems, a thorough description of the features, conceptual model, sensor and communication components, network protocols, and various cyber-attack types.
- The preceding study review models are summarized by using complex network theory, power network equations, system state equations, and data-driven methodologies taking into account the factual context of the CPSs link and the mismatch between research goals and quantitative indicators. They may describe the operational state of the energy grid, analyze load or line overload conditions, describe the fault mechanism, and predict/identify abnormal conditions. Moreover, this classification provides the network architecture and how to enhance the system’s cyber-physical security. Considering these key points, suggestions from the previous review papers and we continued the survey in cyber-attack detection and mitigation.
- The primary contribution of this survey to the existing literature is that it attempts to investigate FDIA in smart grids and detect it by using unsupervised learning techniques. To realize the detection of cyber-attacks in the smart grid, first, we should understand the overview of the smart grid’s architecture and the key points of grid attacks. Therefore, we have considered the literature on network architecture, FDIA attacks, types of detection, etc. We looked at a variety of cyberattack detection techniques such as replay, DOS, stealthy, and FDIA and concluded that unsupervised learning algorithms are better at spotting FDIA in smart grids for huge unlabeled data. We reviewed FDIA from a system-theoretic perspective, which more clearly demonstrates conceptual parallels and common operating principles. For example, we have shown how concepts gained from analyzing specific attacks that target different parts of the network, or how attack schemes can be combined to develop more malicious activities.
- For reliable and quick detection of stealthy FDIA in smart grids without the requirement for knowledge of network parameters or measurement distributions, we offer an unsupervised data mining approach. The algorithm is developed online after being offline-trained. This algorithm identifies a cyber-attack even when there is a significant amount of class mismatch, a sudden increase in data transfer in the network, and abnormalities in the system. This method can still operate well without experiencing any performance reduction because they do not have any set pattern or context. To the best of our knowledge, and in contrast to the aforementioned surveys, our work is the first to examine the features of smart grid security using unsupervised ML approaches and security metrics.
- Finally, the prospects and challenges of cyber-physical smart grids in the future are examined, which may help to clarify the cyber-physical security concerns that the next-generation smart grid must resolve.
3. Network Architecture under Cyber-Attacks in Smart Grids
4. FDIA Attack on Smart Grids
- Deletion of data from the original dataset,
- Change of the data in the original dataset,
- Addition of fake data to the original dataset,
5. Detection Techniques of Cyber Attacks in Smart Grid
5.1. Association Rule Mining (ARM)
5.2. Clustering
6. Challenges and Future Generation
7. Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Abrahamsen, F.E.; Ai, Y.; Cheffena, M. Communication Technologies for Smart Grid: A Comprehensive Survey. Sensors 2021, 21, 8087. [Google Scholar] [CrossRef]
- Pinto, S.J.; Panda, G. Improved Decoupled Control and Islanding Detection of Inverter-based Distribution in Multibus Microgrid Systems. J. Power Electron. 2016, 4, 1526–1540. [Google Scholar] [CrossRef]
- Yan, Y.; Qian, Y.; Sharif, H.; Tipper, D. A Survey on Smart Grid Communication Infrastructures: Motivations, Requirements, and Challenges. IEEE Commun. Surv. 2013, 15, 5–20. [Google Scholar] [CrossRef]
- Alanazi, M.A.; Mahmood, A.; Chowdhury, M.J.M. SCADA Vulnerabilities and Attacks: A Review of the State-of-the-Art and Open Issues. Comput. Secur. 2023, 125, 103028. [Google Scholar] [CrossRef]
- Shi, L.; Dai, Q.; Ni, Y. Cyber-Physical Interactions in Power Systems: A Review of Models, Methods, and Applications. Electr. Power Syst. Res. 2018, 163, 396–412. [Google Scholar] [CrossRef]
- Mohammadi, Z.; Pinto, S.J.; Panda, G.; Thokchom, S. A Survey of Cyber Security in Smart Microgrid. In Sustainable Energy, and Technological Advancements; Panda, G., Naayagi, R.T., Mishra, S., Eds.; Advances in Sustainability Science and Technology; Springer: Singapore, 2022. [Google Scholar]
- Bo, X.; Qu, Z.; Wang, L.; Dong, Y.; Zhang, Z.; Wang, D. Active Defense Research against False Data Injection Attacks of Power CPS Based on Data-Driven Algorithms. Energies 2022, 15, 7432. [Google Scholar] [CrossRef]
- Lai, S.; Chen, B.; Li, T.; Yu, L. Packet-Based State Feedback Control under DOS Attacks in Cyber-Physical Systems. IEEE Trans. Circuits Syst. II Express Briefs 2019, 66, 1421–1425. [Google Scholar] [CrossRef]
- Kim, J.; Tong, L. On Topology Attack of a Smart Grid. In Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference (ISGT), Washington, DC, USA, 24–27 February 2013. [Google Scholar]
- Antoniadis, N.; Cordy, M.; Sifaleras, A.; Le Traon, Y. Preventing Overloading Incidents on Smart grids: A Multi-Objective Combinatorial Optimization Approach. In Optimization and Learning OLA; Springer: Cham, Switzerland, 2020; Volume 1173, pp. 269–281. [Google Scholar]
- Wu, Y.; Wei, Z.; Weng, J.; Li, X.; Deng, R.H. Resonance Attacks on Load Frequency Control of Smart Grids. IEEE Trans. Smart Grid 2018, 9, 4490–4502. [Google Scholar] [CrossRef]
- Du, M.; Pierrou, G.; Wang, X.; Kassouf, M. Targeted False Data Injection Attacks against AC State Estimation without Network Parameters. IEEE Trans. Smart Grid 2021, 12, 349–5361. [Google Scholar] [CrossRef]
- Costilla-Enriquez, N.; Weng, Y. Attack Power System State Estimation by Implicitly Learning the Underlying Models. IEEE Trans. Smart Grid 2022, 14, 649–662. [Google Scholar] [CrossRef]
- Liu, Y.; Ning, P.; Reiter, M.K. False Data Injection Attacks against State Estimation in Electric Power Grids. ACM Trans. Inf. Syst. Secur. 2011, 14, 33. [Google Scholar] [CrossRef]
- Heming, H.; Fei, L.; Tinghui, O.; Xiaoming, Z. Sequential Detection of Microgrid Bad Data via a Data-Driven Approach Combining Online Machine Learning with Statistical Analysis. Front. Energy Res. 2022, 10, 861563. [Google Scholar]
- El Mrabet, Z.; Kaabouch, N.; El Ghazi, H.; El Ghazi, H. Cyber-Security in Smart Grid: Survey and Challenges. Comput. Electr. Eng. 2018, 67, 469–482. [Google Scholar] [CrossRef]
- Hasan, M.K.; Habib, A.; Shukur, Z.; Ibrahim, F.; Islam, S.; Razzaque, M.A. Review on Cyber-Physical and Cyber-Security System in Smart Grid: Standards, Protocols, Constraints, and Recommendations. J. Netw. Comput. Appl. 2023, 209, 103540. [Google Scholar] [CrossRef]
- Tufail, S.; Parvez, I.; Batool, S.; Sarwat, A. A Survey on Cybersecurity Challenges, Detection, and Mitigation Techniques for the Smart Grid. Energies 2021, 14, 5894. [Google Scholar] [CrossRef]
- Amin, M.; El-Sousy, F.F.M.; Aziz, G.A.A.; Gaber, K.; Mohammed, O.A. CPS Attacks Mitigation Approaches on Power Electronic Systems with Security Challenges for Smart Grid Applications: A Review. IEEE Access 2021, 9, 38571–38601. [Google Scholar] [CrossRef]
- Liu, Q.; Hagemeyer, V.; Keller, H.B. A Review of Rule Learning-Based Intrusion Detection Systems and their Prospects in Smart Grids. IEEE Access 2021, 9, 57542–57564. [Google Scholar] [CrossRef]
- Abir, S.M.A.A.; Anwar, A.; Choi, J.; Kayes, A.S.M. IoT-Enabled Smart Energy Grid: Applications and Challenges. IEEE Access 2021, 9, 50961–50981. [Google Scholar] [CrossRef]
- Nafees, M.N.; Saxena, N.; Cardenas, A.; Grijalva, S.; Burnap, P. Smart Grid Cyber-Physical Situational Awareness of Complex Operational Technology Attacks: A Review. ACM Comput. Surv. 2022, 55, 215. [Google Scholar] [CrossRef]
- Ding, J.; Qammar, A.; Zhang, Z.; Karim, A.; Ning, H. Cyber Threats to Smart Grids: Review, Taxonomy, Potential Solutions, and Future Directions. Energies 2022, 15, 6799. [Google Scholar] [CrossRef]
- Tuyen, N.D.; Quan, N.S.; Linh, V.B.; Van Tuyen, V.; Fujita, G. A Comprehensive Review of Cybersecurity in Inverter-Based Smart Power System Amid the Boom of Renewable Energy. IEEE Access 2022, 10, 35846–35875. [Google Scholar] [CrossRef]
- Xu, Y. A Review of Cyber Security Risks of Power Systems: From Static to Dynamic False Data Attacks. Prot. Control. Mod. Power Syst. 2020, 5, 19. [Google Scholar] [CrossRef]
- Faquir, D.; Chouliaras, N.; Sofia, V.; Olga, K.; Maglaras, L. Cybersecurity in Smart Grids, Challenges, and Solutions. AIMS Electron. Electr. Eng. 2021, 5, 24–37. [Google Scholar]
- Liberati, F.; Garone, E.; Di Giorgio, A. Review of Cyber-Physical Attacks in Smart Grids: A System-Theoretic Perspective. Electronics 2021, 10, 1153. [Google Scholar] [CrossRef]
- Alsuwian, T.; Butt, S.A.; Amin, A.A. Smart Grid Cyber Security Enhancement: Challenges and Solutions—A Review. Sustainability 2022, 14, 14226. [Google Scholar] [CrossRef]
- Mohammadi, F. Emerging Challenges in Smart Grid Cybersecurity Enhancement: A Review. Energies 2021, 14, 1380. [Google Scholar] [CrossRef]
- Yohanandhan, R.V.; Elavarasan, R.M.; Manoharan, P.; Mihet-Popa, L. Cyber-Physical Power System (CPPS): A Review on Modeling, Simulation, and Analysis with Cyber Security Applications. IEEE Access 2020, 8, 151019–151064. [Google Scholar] [CrossRef]
- Zhang, H.; Liu, B.; Wu, H. Smart Grid Cyber-Physical Attack and Defense: A Review. IEEE Access 2021, 9, 29641–29659. [Google Scholar] [CrossRef]
- Sridhar, S.; Hahn, A.; Govindarasu, M. Cyber-Physical System Security for the Electric Power Grid. Proc. IEEE 2012, 100, 210–224. [Google Scholar] [CrossRef]
- Liang, G.; Zhao, J.; Luo, F.; Weller, S.R.; Dong, Z.Y. A Review of False Data Injection Attacks Against Modern Power Systems. IEEE Trans. Smart Grid 2017, 8, 1630–1638. [Google Scholar] [CrossRef]
- Humayed, A.; Lin, J.; Li, F.; Luo, B. Cyber-Physical Systems Security—A Survey. IEEE Internet Things J. 2017, 4, 1802–1831. [Google Scholar] [CrossRef]
- Hossain, E.; Khan, I.; Un-Noor, F.; Sikander, S.S.; Sunny, M.S.H. Application of Big Data and Machine Learning in Smart Grid, and Associated Security Concerns: A Review. IEEE Access 2019, 7, 13960–13988. [Google Scholar] [CrossRef]
- Ye, J.; Giani, A.; Elasser, A.; Mazumder, S.K.; Farnell, F.; Mantooth, H.A.; Kim, T.; Liu, J.; Chen, B.; Seo, G.-S.; et al. A Review of Cyber–Physical Security for Photovoltaic Systems. IEEE J. Emerg. Sel. Top. Power Electron. 2022, 10, 4879–4901. [Google Scholar] [CrossRef]
- Hussain, S.M.S.; Ustun, T.S.; Kalam, A. A Review of IEC 62351 Security Mechanisms for IEC 61850 Message Exchanges. IEEE Trans. Ind. Inform. 2020, 16, 5643–5654. [Google Scholar] [CrossRef]
- Khoei, T.T.; Slimane, H.O.; Kaabouch, N. A Comprehensive Survey on the Cyber-Security of Smart Grids: Cyber-Attacks, Detection, Countermeasure Techniques, and Future Directions. In Cryptography and Security; Artificial Intelligence; Cornell University: Ithaca, NY, USA, 2022. [Google Scholar]
- Gaggero, G.B.; Girdinio, P.; Marchese, M. Advancements and Research Trends in Microgrids Cybersecurity. Appl. Sci. 2021, 11, 7363. [Google Scholar] [CrossRef]
- Villalón, A.; Rivera, M.; Salgueiro, Y.; Muñoz, J.; Dragičević, T.; Blaabjerg, F. Predictive Control for Microgrid Applications: A Review Study. Energies 2020, 13, 2454. [Google Scholar] [CrossRef]
- Sayed, K.; Gabbar, H.A. SCADA and Smart Energy Grid Control Automation. Smart Energy Grid Eng. 2017, 18, 481–514. [Google Scholar] [CrossRef]
- Ferrag, M.A.; Babaghayou, M.; Yazici, M.A. Cyber Security for Fog-based Smart Grid SCADA Systems: Solutions and Challenges. J. Inf. Secur. Appl. 2020, 52, 102500. [Google Scholar] [CrossRef]
- Huitsing, P.; Chandia, R.; Papa, M.; Shenoi, S. Attack Taxonomies for the Modbus Protocols. Int. J. Crit. Infrastruct. Prot. 2008, 1, 37–44. [Google Scholar] [CrossRef]
- Kuzlu, M.; Pipattanasompom, M.; Rahman, S. A Comprehensive Review of Smart Grid Related Standards and Protocols. In Proceedings of the 2017 5th International Istanbul Smart Grid and Cities Congress and Fair (ICSG), Istanbul, Turkey, 12–16 April 2017. [Google Scholar]
- Mackiewicz, R.E. Overview of IEC 61850 and Benefits. In Proceedings of the 2006 IEEE PES Power Systems Conference and Exposition, Atlanta, GA, USA, 29 October–1 November 2006. [Google Scholar]
- Gungor, V.C.; Sahin, D.; Kocak, T.; Ergut, S.; Buccella, C.; Cecati, C.; Hancke, G.P. A Survey on Smart Grid Potential Applications and Communication Requirements. IEEE Trans. Ind. Inform. 2013, 9, 28–42. [Google Scholar] [CrossRef]
- Burg, A.; Chattopadhyay, A.; Lam, K.-Y. Wireless Communication and Security Issues for Cyber-Physical Systems and the Internet-of-things. Proc. IEEE 2018, 106, 38–60. [Google Scholar] [CrossRef]
- Ahmed, S.; Gondal, T.M.; Adil, M.; Malik, S.A.; Qureshi, R. A Survey on Communication Technologies in Smart Grid. In Proceedings of the 2019 IEEE PES GTD Grand International Conference and Exposition Asia (GTD Asia), Bangkok, Thailand, 19–23 March 2019; pp. 7–12. [Google Scholar]
- Gungor, V.C.; Sahin, D.; Kocak, T.; Ergut, S.; Buccella, C.; Cecati, C.; Hancke, G.P. Smart Grid Technologies: Communication Technologies and Standards. IEEE Trans. Ind. Inform. 2011, 7, 529–539. [Google Scholar] [CrossRef] [Green Version]
- Sengupta, J.; Ruj, S.; Bit, S.D. A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT. J. Netw. Comput. Appl. 2020, 149, 102481. [Google Scholar] [CrossRef]
- Lopez, C.; Sargolzaei, A.; Santana, H.; Huerta, C. Smart Grid Cyber Security: An Overview of Threats and Countermeasures. J. Energy Power Eng. 2015, 9, 632–647. [Google Scholar]
- Musleh, A.S.; Chen, G.; Dong, Z.Y. A Survey on the Detection Algorithms for False Data Injection Attacks in Smart Grids. IEEE Trans. Smart Grid 2020, 11, 2218–2234. [Google Scholar] [CrossRef]
- Zhang, Y.; Wang, J.; Chen, B. Detecting False Data Injection Attacks in Smart Grids: A Semi-Supervised Deep Learning Approach. IEEE Trans. Smart Grid 2021, 12, 623–634. [Google Scholar] [CrossRef]
- Hong, J.; Nuqui, R.F.; Kondabathini, A.; Ishchenko, D.; Martin, A. Cyber Attack Resilient Distance Protection and Circuit Breaker Control for Digital Substations. IEEE Trans. Ind. Inform. 2019, 15, 4332–4341. [Google Scholar] [CrossRef]
- Qu, Z.; Dong, Y.; Qu, N.; Li, H.; Cui, M.; Bo, X.; Wu, Y.; Mugemanyi, S. False Data Injection Attack Detection in Power Systems Based on Cyber-Physical Attack Genes. Front. Energy Res. 2021, 9, 644489. [Google Scholar] [CrossRef]
- Kleinmann, A.; Amichay, O.; Wool, A.; Tenenbaum, D.; Bar, O.; Lev, L. Stealthy Deception Attacks Against SCADA Systems, Computer Security. SECURE CyberICPS 2017. In Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2018; p. 10683. [Google Scholar]
- Rajesh, L.; Satyanarayana, P. Detection and Blocking of Replay, False Command, and False Access Injection Commands in SCADA Systems with Modbus Protocol. Secur. Commun. Netw. 2021, 4, 8887666. [Google Scholar]
- Aeiad, F.; Gao, W.; Momoh, J. Bad Data Detection for Smart Grid State Estimation. In Proceedings of the 2016 North American Power Symposium (NAPS), Denver, CO, USA, 18–20 September 2016; pp. 1–6. [Google Scholar]
- Xu, R.; Wang, R.; Guan, Z.; Wu, L.; Wu, J.; Du, X. Achieving Efficient Detection Against False Data Injection Attacks in Smart Grid. IEEE Access 2017, 5, 13787–13798. [Google Scholar] [CrossRef]
- Esmalifalak, M.; Liu, L.; Nguyen, N.; Zheng, R.; Han, Z. Detecting Stealthy False Data Injection using Machine Learning in Smart Grid. IEEE Syst. J. 2017, 11, 1644–1652. [Google Scholar] [CrossRef]
- Chaojun, G.; Jirutitijaroen, P.; Motani, M. Detecting False Data Injection Attacks in AC state estimation. IEEE Trans. Smart Grid 2015, 6, 2476–2483. [Google Scholar] [CrossRef]
- He, Y.; Mendis, G.J.; Wei, J. Real-Time Detection of False Data Injection Attacks in Smart Grid: A Deep Learning based Intelligent Mechanism. IEEE Trans. Smart Grid 2017, 8, 2505–2516. [Google Scholar] [CrossRef]
- Ashok, A.; Govindarasu, M.; Ajjarapu, V. Online Detection of Stealthy False Data Injection Attacks in Power System State Estimation. IEEE Trans. Smart Grid 2018, 9, 1636–1646. [Google Scholar] [CrossRef]
- Zhuang, P.; Deng, R.; Liang, H. False Data Injection Attacks Against State Estimation in Multiphase and Unbalanced Smart Distribution Systems. IEEE Trans. Smart Grid 2019, 10, 6000–6013. [Google Scholar] [CrossRef]
- Aboelwafa, M.M.N.; Seddik, K.G.; Eldefrawy, M.H.; Gadallah, Y.; Gidlund, M. A Machine-Learning-Based Technique for False Data Injection Attacks Detection in Industrial IoT. IEEE Internet Things J. 2020, 7, 8462–8471. [Google Scholar] [CrossRef]
- Vincent, P.; Larochelle, H.; Lajoie, I.; Bengio, Y.; Manzagol, P.-A. Stacked Denoising Autoencoders: Learning Useful Representations in a Deep Network with a Local Denoising Criterion. J. Mach. Learn. Res. 2010, 11, 3371–3408. [Google Scholar]
- Yao, L.; Ge, Z. Scalable Semi-Supervised GMM for Big Data Quality Prediction in Multimode Processes. IEEE Trans. Ind. Electron. 2019, 66, 3681–3692. [Google Scholar] [CrossRef]
- Bennett, K.P.; Demiriz, A. Semi-Supervised Support Vector Machines, in NIPS; The MIT Press: Cambridge, MA, USA, 1998; pp. 368–374. [Google Scholar]
- Wilson, D.; Tang, Y.; Yan, J.; Lu, Z. Deep Learning-Aided Cyber-Attack Detection in Power Transmission Systems. In Proceedings of the IEEE Power Energy Soc General Meet PESGM, Portland, OR, USA, 5–10 August 2018. [Google Scholar]
- Ju, C.; Bao, F.; Xu, C.; Fu, X. A Novel Method of Interestingness Measures for Association Rules Mining Based on Profit. Discret. Dyn. Nat. Soc. 2015, 2, 868634. [Google Scholar] [CrossRef]
- Abu, M.S.; Selamat, S.R.; Yusof, R.; Ariffin, A. An Attribution of Cyberattack using Association Rule Mining (ARM). Int. J. Adv. Comput. Sci. Appl. (IJACSA) 2020, 11, 2. [Google Scholar] [CrossRef]
- Lou, P.; Lu, G.; Jiang, X.; Jiang, Z.; Hu, J.; Yan, J. Cyber Intrusion Detection through Association Rule Mining on Multi-Source Logs. Appl. Intell. 2021, 51, 4043–4057. [Google Scholar] [CrossRef]
- Wu, X.; Zhang, C.; Zhang, S. Efficient Mining of both Positive and Negative Association Rules. ACM Trans. Inf. Syst. 2004, 22, 381–405. [Google Scholar] [CrossRef]
- Prakash, S.; Vijayakumar, M. An Effective Network Traffic Data Control Using Improved Apriori Rule Mining. Circuits Syst. 2016, 7, 3162–3173. [Google Scholar] [CrossRef]
- Rosyid, N.R.; Ohrui, M.; Kikuchi, H.; Sooraksa, P.; Terada, M. A Discovery of Sequential Attack Patterns of Malware in Botnets. In Proceedings of the 2010 IEEE International Conference on Systems, Istanbul, Turkey, 10–13 October 2010; Man and Cybernetics, pp. 2564–2570. [Google Scholar]
- Isam, K.T.; Osman, N.U.; Bayat, O.; Alsaedi, K.H. Improving IDSs Alerts to Improve High-Quality Network Security by using Data Mining Techniques. Aurum J. Eng. Syst. Archit. 2017, 1, 17–29. [Google Scholar]
- Ohrui, M.; Kikuchi, H.; Rosyid, N.R.; Terada, M. Mining Botnet Coordinated Attacks using an Apriori-Prefix Span Hybrid Algorithm. J. Inf. Process. J. Inf. Process. 2013, 21, 607–616. [Google Scholar]
- Nugroho, E.P.; Megasari, R.; Junaeti, E.; Pribadi, S.R. Implementation of CM-SPADE Algorithm in Building Denial of Service Detection System Model Using Snort. In Proceedings of the 7th Mathematics, Science, and Computer Science Education International Seminar, MSCEIS 2019, Bandung, West Java, Indonesia, 12 October 2019. [Google Scholar]
- Agrawal, R.; Srikant, R. Mining sequential patterns. In Proceedings of the Eleventh International Conference on Data Engineering, Taipei, Taiwan, 6–10 March 1995; pp. 3–14. [Google Scholar]
- Silva, C.; Faria, P.; Vale, Z. Clustering Support for an Aggregator in a Smart Grid Context. In Hybrid Intelligent Systems; Madureira, A., Abraham, A., Gandhi, N., Varela, M., Eds.; HIS 2018; Advances in Intelligent Systems and Computing; Springer: Berlin/Heidelberg, Germany, 2020; Volume 923. [Google Scholar]
- Saddam, A.; Muhammad, I.; Ahmed, H.S.; Wu, J.; Nan, D.D.; Ahmad, S. Protection of a Smart Grid with the Detection of Cyber-Malware Attacks using Efficient and Novel Machine Learning Models. Front. Energy Res. 2022, 10, 1102. [Google Scholar]
- Lei, W.; Xu, P.; Qu, Z.; Bo, X.; Dong, Y.; Zhang, Z.; Li, Y. Coordinated Cyber-Attack Detection Model of Cyber-Physical Power System Based on the Operating State Data Link. Front. Energy Res. 2021, 9, 666130. [Google Scholar]
- Hussain, T.; Saeed, M.I.; Khan, I.U.; Aslam, N.; Aljameel, S.S. Implementation of a Clustering Based DDoS Detection Method. Electronics 2022, 11, 2804. [Google Scholar] [CrossRef]
- Bohara, B.; Bhuyan, J.; Wu, F.; Ding, J. A Survey on the Use of Data Clustering for Intrusion Detection System in Cyber Security. Int. J. Netw. Secur. Appl. 2020, 12, 1–18. [Google Scholar] [PubMed]
- Faisal, M.A.; Aung, Z.; Williams, J.R.; Sanchez, A. Data-Stream based Intrusion Detection System for Advanced Metering Infrastructure in Smart Grid: A feasibility study. IEEE Syst. J. 2015, 9, 31–44. [Google Scholar] [CrossRef]
- Pena, J.; Lozano, J.; Larranaga, P. An Empirical Comparison of Four Initialization Methods for the k-Means Algorithm. Pattern Recognit. Lett. 1999, 20, 1027–1040. [Google Scholar] [CrossRef]
- Jin, X.; Han, J. K-Medoids Clustering. In Encyclopedia of Machine Learning; Sammut, C., Webb, G.I., Eds.; Springer: Berlin/Heidelberg, Germany, 2011. [Google Scholar]
- Sreenivasulu, V.; Prasad, R.S. A Methodology for Cybercrime Identification using Email Corpus based on the Gaussian Mixture Model. Int. J. Comput. Appl. 2015, 117, 29–32. [Google Scholar]
- Farrokhifard, M.M.; Hatami, M.; Venkatasubramanian, V.M.; Torresan, G.; Panciatici, P.; Xavier, F. Clustering of Power System Oscillatory Modes using Dbscan Technique. In Proceedings of the 2019 North American Power Symposium (NAPS), Wichita, KS, USA, 13–15 October 2019; pp. 1–6. [Google Scholar]
- Anwar, A.; Mahmood, A.N.; Zahir, T. Identification of Vulnerable Node Clusters against False Data Injection Attack in an AMI-based Smart Grid. Inf. Syst. 2015, 53, 201–212. [Google Scholar] [CrossRef]
- Gallardo, J.L.; Ahmed, M.A.; Jara, N. Clustering Algorithm-Based Network Planning for Advanced Metering Infrastructure in Smart Grid. IEEE Access 2021, 9, 48992–49006. [Google Scholar] [CrossRef]
- Abazari, A.; Zadsar, M.; Ghafouri, M.; Atallah, R.; Assi, C. A Data Mining/ANFIS and Adaptive Control for Detection and Mitigation of Attacks on DC MGs. IEEE Trans. Smart Grid, 2022; (Early access). [Google Scholar] [CrossRef]
Ref No./Year | Sensor Technologies | Communication Technologies | Computing Technologies | Type of Cyber Attack | Detection | Contributions | Limitations |
---|---|---|---|---|---|---|---|
[25]/2020 | No | No | Yes | FDIA | No | Studied FDIA against SE and degrade the microgrids inducing a power imbalance between supply and demand | Detection and mitigation techniques |
[16]/2018 | yes | yes | No | Virus, DOS, replay, Man in middle attacks | Yes Limited approach | Comprehensive overview of cyber-security in the smart grid and examined the main cyber-attacks threatening its structure, network protocols, and applications. | Machine learning techniques |
[26]/2021 | No | No | No | Attacks on CIA model. | No | Analyses the threats and potential solutions of smart grids based on IoT. | Detection techniques |
[27]/2021 | No | No | No | FDIA | No | Discussed two modeling frameworks for CPSs, FDIAs against state estimation, vulnerabilities, and dynamical properties of attacks | Sensor, communication, and detection techniques |
[17]/2023 | yes | yes | No | No | No | Overview of SG model, key elements, ADMS, SCADA, AMI, cyber security principles, standards, and protocols. | Detection techniques |
[22]/2022 | No | No | No | Physics aware control command, measurement integrity, FDI, control logic modification, DOS, etc. | yes | A complete review of the nature of complex cyber-attacks, detection and monitoring capabilities, Cyber-Physical Situational Awareness, IDS-based host, network, cloud, IoT, signature, distributed, anomaly, ML/DL, hybrid, moving target defense, specification, etc. | Sensor, communication technologies. |
[24]/2022 | No | No | yes | Described several types of cyber attack | yes | A broad analysis of the system structure and vulnerabilities of typical inverter-based power systems with DER integration, several types of cyberattacks, modern defense strategies including several detection and mitigation techniques, and comparison of testbed and simulation tools applicable for cyber-physical research. | Communication protocols and networks, sensor measurement |
[28]/2022 | yes | yes | No | yes | yes | Discussed approaches to ML, AI, 5G, blockchain, and data aggregation methods. | Limited approach to sensor technologies |
[29]/2021 | No | No | No | FDIA | yes | Cyber-attack enhancement methods, challenges, and resilience of the smart grid. | Sensor, communication technologies. |
[23]/2022 | No | No | No | yes | yes | Presented attack strategy, detection methods, and solutions for cyberattacks in terms of blockchain technology and AI techniques. | Sensor and communication technologies. |
[18]/2021 | yes | yes | No | FDIA, DOS | yes | Various threats and vulnerabilities can affect the key elements of cyber security in the smart grid network and then present the security measures. | Limited approach to ML and blockchain techniques. |
[19]/2021 | yes | yes | yes | All types of attacks mentioned | yes | Inclusive review of the cyber-physical attacks, vulnerabilities, mitigation approaches on the power electronics, and the security challenges for the smart grid applications. | The limited approach in ML detection techniques |
[30]/2020 | No | No | No | All types of attacks mentioned | yes | Summarizes impacts of cyber-attacks on power system control, power system stability, and types of cyber-attacks, from the viewpoints of topology, mechanism, probability, and simulation. | Communication sensors, and limited approach to detection techniques |
[31]/2021 | yes | yes | yes | Aurora, pricing, AGC, FDI, topology, GPI-spoofing, load redistribution, line outage masking, Stuxnet-like networks | No | Reviewed an abstracted and combined state-space model, in which cyber-physical attack and defense models are effectively widespread, and advanced in the field, moving target defense, watermarking, and data-driven approaches. | Detection techniques |
[32]/2012 | yes | No | No | No | No | Significance of cyber infrastructure security in conjunction with power application security to prevent, mitigate, and tolerate cyber-attacks. | Cyber-attacks, communication, and detection techniques. |
[33]/2017 | No | No | No | FDIA | No | A comprehensive review of the theoretical and mathematical approach of FDIAs against modern power systems. | Detection strategy of FDIA |
[20]/2021 | yes | yes | yes | No | IDS | Discussed in detail rule learning-based intrusion detection systems. | Limited approach to detection techniques. |
[34]/2017 | No | No | No | yes | No | Introduced CPS, distinguishing between cyber, cyber-physical, and physical components security perspective, a taxonomy of threats, susceptibilities, attacks, and controls. | Detection techniques |
[35]/2019 | yes | yes | Yes | All types of attacks mentioned | Limited approaches and types mentioned | The approach of ML in security concerns. Overview of big data tools, system platforms, required skill levels, CIA models, encryption algorithms, software attacks, and their countermeasures | ML detection techniques |
[21]/2021 | yes | yes | yes | No | No | This survey is focused on IOT technologies that facilitate smart energy grid systems, architecture, related software standard applications, security vulnerabilities, and opportunities to integrate advanced techniques. | Cyber-attacks and detection systems |
[36]/2022 | No | No | yes | DOS | Attacks of model and driven in PV farms | Blockchain algorithm to address cyberattacks in software and cyber networks. Analyzed multiscale system modeling, event-trigger control, AI application, and hot patching. | Communication, sensor networks, and detection techniques. |
[37]/2020 | No | yes | yes | DOS, MITM, FDIA, Intrusion attack | No | Summary of IEC 61850 message structures and related cybersecurity concerns | Detection methods and sensor measurements |
[38]/2022 | yes | yes | yes | Attacks on CIA model. | Limited approach | Defined protected protocols and standards, cryptographic and authentication, intrusion prevention, education, access control, and required cybersecurity policy approaches. | Detection techniques of ML techniques |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Pinto, S.J.; Siano, P.; Parente, M. Review of Cybersecurity Analysis in Smart Distribution Systems and Future Directions for Using Unsupervised Learning Methods for Cyber Detection. Energies 2023, 16, 1651. https://doi.org/10.3390/en16041651
Pinto SJ, Siano P, Parente M. Review of Cybersecurity Analysis in Smart Distribution Systems and Future Directions for Using Unsupervised Learning Methods for Cyber Detection. Energies. 2023; 16(4):1651. https://doi.org/10.3390/en16041651
Chicago/Turabian StylePinto, Smitha Joyce, Pierluigi Siano, and Mimmo Parente. 2023. "Review of Cybersecurity Analysis in Smart Distribution Systems and Future Directions for Using Unsupervised Learning Methods for Cyber Detection" Energies 16, no. 4: 1651. https://doi.org/10.3390/en16041651
APA StylePinto, S. J., Siano, P., & Parente, M. (2023). Review of Cybersecurity Analysis in Smart Distribution Systems and Future Directions for Using Unsupervised Learning Methods for Cyber Detection. Energies, 16(4), 1651. https://doi.org/10.3390/en16041651