DocumentCode
19833
Title
Classification of Disturbances and Cyber-Attacks in Power Systems Using Heterogeneous Time-Synchronized Data
Author
Shengyi Pan ; Morris, Thomas ; Adhikari, Uttam
Author_Institution
Mississippi State Univ., Starkville, MS, USA
Volume
11
Issue
3
fYear
2015
fDate
Jun-15
Firstpage
650
Lastpage
662
Abstract
Visualization and situational awareness are of vital importance for power systems, as the earlier a power-system event such as a transmission line fault or cyber-attack is identified, the quicker operators can react to avoid unnecessary loss. Accurate time-synchronized data, such as system measurements and device status, provide benefits for system state monitoring. However, the time-domain analysis of such heterogeneous data to extract patterns is difficult due to the existence of transient phenomena in the analyzed measurement waveforms. This paper proposes a sequential pattern mining approach to accurately extract patterns of power-system disturbances and cyber-attacks from heterogeneous time-synchronized data, including synchrophasor measurements, relay logs, and network event monitor logs. The term common path is introduced. A common path is a sequence of critical system states in temporal order that represent individual types of disturbances and cyber-attacks. Common paths are unique signatures for each observed event type. They can be compared to observed system states for classification. In this paper, the process of automatically discovering common paths from labeled data logs is introduced. An included case study uses the common path-mining algorithm to learn common paths from a fusion of heterogeneous synchrophasor data and system logs for three types of disturbances (in terms of faults) and three types of cyber-attacks, which are similar to or mimic faults. The case study demonstrates the algorithm´s effectiveness at identifying unique paths for each type of event and the accompanying classifier´s ability to accurately discern each type of event.
Keywords
data mining; pattern classification; phasor measurement; power engineering computing; power system security; security of data; sensor fusion; classification; common path; critical system states; heterogeneous synchrophasor data; heterogeneous time-synchronized data; network event monitor logs; path-mining algorithm; pattern extraction; power system cyber-attacks; power system disturbances; relay logs; sequential pattern mining approach; synchrophasor measurements; system logs; Classification algorithms; Data mining; Monitoring; Power systems; Relays; Sensors; Transmission line measurements; Common Paths; Common paths; Cyber-attack Detection; Disturbances; Symmetric and Unsymmetrical Faults; Synchrophasor Data and Device Log Mining; cyber-attack detection; disturbances; symmetric and unsymmetrical faults; synchrophasor data and device log mining;
fLanguage
English
Journal_Title
Industrial Informatics, IEEE Transactions on
Publisher
ieee
ISSN
1551-3203
Type
jour
DOI
10.1109/TII.2015.2420951
Filename
7081776
Link To Document