Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Issue title: Digital transformation through advances in artificial intelligence and machine learning
Guest editors: Hasmat Malik, Gopal Chaudhary and Smriti Srivastava
Article type: Research Article
Authors: Malik, Hasmata | Alotaibi, Majed A.b; c | Almutairi, Abdulazizd; *
Affiliations: [a] BEARS, University Town, NUS Campus, Singapore | [b] Deparment of Electrical Engineering, College of Engineering, King Saud University, Riyadh, Saudi Arabia | [c] Saudi Electricity Company Chair in Power System Reliability and Security, King Saud University, Riyadh, Saudi Arabia | [d] Deparment of Electrical Engineering, College of Engineering, Majmaah University, Riyadh, Saudi Arabia
Correspondence: [*] Corresponding author. Abdulaziz Almutairi, Deparment of Electrical Engineering, College of Engineering, Majmaah University, Riyadh, Saudi Arabia. E-mail: [email protected].
Abstract: Maintaining the reliable, efficient, secure and multifunctional IEC 61850 based substation is an extremely challenging task, especially in the ever-evolving cyberattacks domain. This challenge is also exacerbated with expending the modern power system (MPS) to meet the demand along with growing availability of hacking tools in the hacker community. Few of the most serious threats in the substation automation system (SAS) are DoS (Denial of Services), MS (Message Suppression) and DM (Data Manipulation) attacks, where DoS is due to flood bogus frames. In MS, hacker inject the GOOSE sequence (sqNum) and GOOSE status (stNum) number. In the DM attacks, attacker modify current measurements reported by the merging units, inject modified boolean value of circuit breaker and replay a previously valid message. In this paper, an intelligent cyberattacks identification approach in IEC 61850 based SAS using PSVM (proximal support vector machine) is proposed. The performance of the proposed approach is demonstrated using experimental dataset of recorded signatures. The obtained results of the demonstrated study shows the effectiveness and high level of acceptability for real side implementation to protect the SAS from the cyberattacks in different scenarios.
Keywords: False data injection, Man-In-The-Middle, intrusion detection system, GOOSE, MMS, SVM, information and communication technologies, substation automation system, telephone switching based remote control unit, digital communication network
DOI: 10.3233/JIFS-189783
Journal: Journal of Intelligent & Fuzzy Systems, vol. 42, no. 2, pp. 1213-1222, 2022
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]