• DocumentCode
    19833
  • Title

    Classification of Disturbances and Cyber-Attacks in Power Systems Using Heterogeneous Time-Synchronized Data

  • Author

    Shengyi Pan ; Morris, Thomas ; Adhikari, Uttam

  • Author_Institution
    Mississippi State Univ., Starkville, MS, USA
  • Volume
    11
  • Issue
    3
  • fYear
    2015
  • fDate
    Jun-15
  • Firstpage
    650
  • Lastpage
    662
  • Abstract
    Visualization and situational awareness are of vital importance for power systems, as the earlier a power-system event such as a transmission line fault or cyber-attack is identified, the quicker operators can react to avoid unnecessary loss. Accurate time-synchronized data, such as system measurements and device status, provide benefits for system state monitoring. However, the time-domain analysis of such heterogeneous data to extract patterns is difficult due to the existence of transient phenomena in the analyzed measurement waveforms. This paper proposes a sequential pattern mining approach to accurately extract patterns of power-system disturbances and cyber-attacks from heterogeneous time-synchronized data, including synchrophasor measurements, relay logs, and network event monitor logs. The term common path is introduced. A common path is a sequence of critical system states in temporal order that represent individual types of disturbances and cyber-attacks. Common paths are unique signatures for each observed event type. They can be compared to observed system states for classification. In this paper, the process of automatically discovering common paths from labeled data logs is introduced. An included case study uses the common path-mining algorithm to learn common paths from a fusion of heterogeneous synchrophasor data and system logs for three types of disturbances (in terms of faults) and three types of cyber-attacks, which are similar to or mimic faults. The case study demonstrates the algorithm´s effectiveness at identifying unique paths for each type of event and the accompanying classifier´s ability to accurately discern each type of event.
  • Keywords
    data mining; pattern classification; phasor measurement; power engineering computing; power system security; security of data; sensor fusion; classification; common path; critical system states; heterogeneous synchrophasor data; heterogeneous time-synchronized data; network event monitor logs; path-mining algorithm; pattern extraction; power system cyber-attacks; power system disturbances; relay logs; sequential pattern mining approach; synchrophasor measurements; system logs; Classification algorithms; Data mining; Monitoring; Power systems; Relays; Sensors; Transmission line measurements; Common Paths; Common paths; Cyber-attack Detection; Disturbances; Symmetric and Unsymmetrical Faults; Synchrophasor Data and Device Log Mining; cyber-attack detection; disturbances; symmetric and unsymmetrical faults; synchrophasor data and device log mining;
  • fLanguage
    English
  • Journal_Title
    Industrial Informatics, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1551-3203
  • Type

    jour

  • DOI
    10.1109/TII.2015.2420951
  • Filename
    7081776