Next Article in Journal
Potential Climate Change Risks to Meeting Zimbabwe’s NDC Goals and How to Become Resilient
Next Article in Special Issue
Open-Circuit Fault-Tolerant Strategy for Interleaved Boost Converters via Filippov Method
Previous Article in Journal
Modelling to Lower Energy Consumption in a Large WWTP in China While Optimising Nitrogen Removal
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Hybrid Framework for Detecting and Eliminating Cyber-Attacks in Power Grids

1
Department of Electronics and Electrical Engineering, Shiraz University of Technology, Shiraz 71555-313, Iran
2
Department of Electrical and Computer Engineering, University of Windsor, Windsor, ON N9B 3P4, Canada
3
Center for Data Science, Coventry University, Coventry CV1 5FB, UK
*
Author to whom correspondence should be addressed.
Energies 2021, 14(18), 5823; https://doi.org/10.3390/en14185823
Submission received: 30 July 2021 / Revised: 1 September 2021 / Accepted: 10 September 2021 / Published: 15 September 2021

Abstract

:
The work described in this paper aims to detect and eliminate cyber-attacks in smart grids that disrupt the process of dynamic state estimation. This work makes use of an unsupervised learning method, called hierarchical clustering, in an attempt to create an artificial sensor to detect two different cyber-sabotage cases, known as false data injection and denial-of-service, during the dynamic behavior of the power system. The detection process is conducted by using an unsupervised learning-enhanced approach, and a decision tree regressor is then employed for removing the threat. The dynamic state estimation of the power system is done by Kalman filters, which provide benefits in terms of the speed and accuracy of the process. Measurement devices in utilities and buses are vulnerable to communication interruptions between phasor measurement units and operators, who can be easily manipulated by false data. While Kalman filters are incapable of detecting the majority of such cyber-attacks, this article proves that the proposed unsupervised machine learning method is able to detect more than 90 percent of the mentioned attacks. The simulation results on the IEEE 9-bus with 3-machines and IEEE 14-bus with 5-machines systems verify the efficiency of the proposed approach.

1. Introduction

Many industries are becoming more modernized as technology advances, including the power systems [1]. High-speed internet is being used as the primary mean of communication between various sectors of the power grid. Cyber-attacks pose a significant threat to various industries, as technologies increasingly rely on wireless communications, and most of the power system operations, such as energy management programs, state estimation, optimal power flow, etc., depend on safe and reliable communications [2,3]. DSE is an important tool for monitoring and controlling the power network, especially when the system is performing in the transient mode [4]. DSE is an effective method to track the behavior of the power system in the transient mode, and it usually employs Kalman filters to perform the state estimation process. Modernized power systems, known as smart grids, rely heavily on wireless communication, making them vulnerable to cybercriminals who can tamper with data derived from PMUs [5]. DSE usually uses PMU data as inputs for estimation of the dynamic behavior of the power system, and thus the communication between PMUs and central control is of paramount importance due to vulnerability to cyber-attacks.
Because traditional methods based on various types of Kalman filters are only effective against certain types of cyber-sabotages [5], a machine learning-enhanced method is needed for optimizing the detection process of these attacks. In this article, clustering and regression techniques are used to tackle these threats, and the results are compared to the previous methods of system defense against the mentioned attacks. While the traditional power system is transitioning to a new and more intelligent system known as the smart grids, the threat posed by cybercriminals is unavoidable, and by injecting more sophisticated attacks, linear and non-linear traditional detection techniques, such as Kalman filters, appear to be rendered ineffective.
Kalman filters were first used in the 1970s, when the term “Dynamic State Estimation” was introduced [6]. With the development of related techniques, more advanced filters were used for the accurate and robust estimation of dynamic states. In recent years, some studies emphasized that DSE fulfills an essential function in dealing with electromechanical transient models and unknown inputs collected from PMUs [7,8]. Numerous methods for detecting and eliminating cyber-sabotages were implemented, ranging from linear techniques to AI-based methods [9,10,11]. Applying different types of Kalman filters, such as UKF and EKF, to eliminate the malfunctions and unknown data injections was proposed in recent years, and these filters were examined in various scenarios of cyber-attacks [11,12]. While cyber threats are increasing these days, a power system needs better preparation for such attacks. FDI and DoS are two typical kinds of attacks, and while both FDI and DoS consider the measurement equipment as the main target of data injection, the former usually changes the mean value of the measured object, while the latter denies the transmission of data. FDI poses a considerable threat to network security, and by changing the value of the measured data, it misleads the operators via the fundamental change in the monitored states of the system. The situation worsens when it comes to transient electromechanical states. DoS attacks manipulate the power system observers during the transient period of the system and may lead to huge power outages by the incorrect decisions made by operators due to the false data injected by intruders. In 2019, a confirmed case of cyber-attack happened in the US power grid, in which the intruders tried to manipulate the operators by aiming some sensitive PMUs in the power network [13]. Clustering and classification techniques, on the other hand, can be used to provide a more optimized mean of facing these cyber-attacks [2,3]. These days, numerous AI-enhanced techniques are utilized to separate standard data from anomalous ones, which is called anomaly detection. HC is a well-known clustering method used on continuous data and time series [14]. Many classification techniques were proposed in the field of machine learning. Many of them, however, are not suitable for processing challenging time series data. DTR and neighboring techniques seem to be more useful in the case of continuous data generated in power networks.
It is known that the Kalman filter performs well under specific conditions, such as Gaussian-based noise [15]. However, in more complex situations, Kalman filters are struggling to detect the outliers, especially when the measurement noise does not obey the Gaussian assumption [16]. In [17], robust filters were implemented to tackle this problem by using the RCKF and CKF during electromechanical transients in the power transmission network. A non-linear control loop-based method was proposed in [18] as a technique to detect and eliminate cyber-attacks along with risk mitigation.
Wang et al. [19] mention a Luenberger method for both cyber-attack detection and power system isolation. In recent years, the use of AI techniques has boosted power engineering, as demonstrated in [20] by the use of sequential hypothesis testing based on machine learning methods. In [21], the authors propose a machine learning-aided dynamic state estimation method, and in [22], the authors employ a variety of deep learning-based methods to detect false data injection. Ref. [23] reviews how to control the power system under cascading failures. In [24], a new Markov-based approach is proposed to detect DoS attacks, while in [25], applications of extended Kalman filter is illustrated. An on-line DSE method is proposed in [26]. Ref. [27] uses novel Kalman filters to perform DSE. Reference [28] introduces hierarchical clustering applications for anomaly detection. Basics of random tree for classification and regression was first introduced in [29], and in [30], the authors used the random tree method to recovering clusters under random noise. In Towards Data Science, Lorraine Li used decision tree for regression and classification problems [31], and in [32], the authors propose a power system toolbox for MATLAB. An EKF/UKF toolbox is proposed in [33]. In [34], a toolbox named PSAT is proposed for dynamic analysis of the power system. It is worth noting that all of the mentioned toolboxes are employed for simulating our results in this paper.
Reference [35] proposes a machine learning-based approach to detect FDI attacks in the power system. In [36], the authors propose a linear approach to detect cyber-attacks and outliers in PMU-based power system state estimation, and in [37], a supervised learning-based approach is proposed to detect DoS attacks in smart grids. Table 1 shows a comparison of the methods studied in this article and others in the same field. As illustrated in Table 1, this article contributes to the field in at least two ways. Firstly, it employs two machine learning-based methods to detect and eliminate the cyber-threats. Secondly, it draws a comparison between Kalman filters and a proposed hybrid machine learning method for the same purpose.
The rest of this paper is organized as follows. Section 2 formulates models for DSE, fourth-order generator, cyber-attacks and the two Kalman filters utilized for simulation. Machine learning methods are described in Section 3. In Section 4, the proposed approach is detailed, and in Section 5 the proposed method is examined by different case studies, with the results of the simulations being illustrated as well. The paper is concluded in Section 6.

2. Methods

This section firstly presents the generator model of the power system and then describes attack models.

2.1. DSE and the Generator Model

The procedure for estimating the dynamic state of a power system is relatively well known and can be found in many related articles [12,18,23,24,25,26]. The relationship between the system’s dynamic states and the measurements is formulated as follows:
{ x k + 1 = f ( x k ,   u k ,   v k )                   y k + 1 = h ( x k + 1 ,   u k + 1 ,   w k )
where x is the vector containing the states of the system, y is the measurements vector, u refers to the control vector, v is the process noise, w represents the measurement noise, and k is the number of iterations. Both h and f are non-linear state and measurement functions, illustrated in (3) and (4). It is worth noting that in this article, we assume that x, y, and u are shaped as follows.
{ x = { δ ,   ω }                                             y = { P e ,   P m ,   ω y ,   U ,   φ   }   u = { E f ,   T m }                                      
where δ ,   ω are the rotor angle and rotor speed, respectively. ω y is the measurement of the rotor speed, Pe is the electrical power of the generator, and Pm is the mechanical input power of a generator. U and φ represent the voltage magnitude and phase angle of the respective bus, E f is the field voltage of the synchronous generator, and Tm is the mechanical torque derived from the governor.
The fourth-order transient swing equations are formulated below [12,18,23,24,25,26].
{ δ ˙ =   ω 1   ω ˙ =   1 T J [ T m   T e D ( ω 1 ) ] E ˙ d =   1 T d 0 [ E f   E q ( X d   X d ) i d ] E ˙ q =   1 T q 0 [ E d + ( X q   X q ) i q ]
T J represents the inertia time constant, while T e is the electromagnetic torque, and D is the damping coefficient. X d and X q are d-axis and q-axis reactances, respectively, while X d and X q are d-axis and q-axis transient reactances. T d 0 and T q 0 are d-axis and q-axis transient time constants. i d , i q are d-axis and q-axis output currents and E d ,     E q are d-axis and q-axis voltages of a generator.
The measurement vector, which includes δ ,     ω ,   and   P e ,   is listed below [12,18,23,24,25,26].
{ δ y =   δ ω y =   ω P e y =   U 2 2 sin ( 2 δ 2 φ )   ( 1 X q   1 X d ) +   U sin ( δ   φ ) E q X d +   U sin ( δ   φ ) E d X q  
where δ y is the measurement of the rotor angle, and P e y is the measurement of the electrical power.
Both E f and   T m are control features that can be obtained from governor and exciter models depending on the power utility, and in both IEEE 9-bus and IEEE 14-bus systems, the power utilities are assumed to be steam power plants. For the random noises, v along with w were calculated by random value generation ranging from “Gaussian” to “Central Limit”.
In this article, two different Kalman filters for the forecasting and filtering stages are proposed to improve the speed and accuracy of the DSE. Kalman filtering is an algorithm that estimates some unknown variables taking into account the observed measurements over time. Kalman filters have proven themselves in a wide variety of applications, are relatively simple and easy to use, and require little computing power. The primary aim of employing Kalman filters in our study is to make use of the minimization ability of both EKF and UKF in a non-linear space to reduce the covariance of the squared error between estimated and real states. Both of the aforementioned filters take different approaches to accomplishing this task. Both EKF and UKF formulations can be found in [27], and the two final stages of DSE in this paper, i.e., forecasting and filtering, are based on these. Figure 1 depicts the DSE procedure with the addition of EKF and UKF.

2.2. Attack Models

Cyber-criminals can easily manipulate the DSE process by changing the measurement data-driven by PMUs. Numerous attacking scenarios can be obtained in cyber-enhanced sabotage, particularly in dynamic situations ranging from FDI and DoS to spoofing attacks. Malfunctions and bad data frequently cause disasters and significantly impact the power network’s monitoring system, which should be held accountable for the grid’s smooth operation. This section goes over two different attack scenarios. Figure 2 depicts a brief summary of how cyber-attacks are carried out on power grids.

2.2.1. FDI Attack

Assume the state vector derived from Kalman filters as x = [ x 1 ,   x 2 ,   x 3 ,   ,   x n ] T, in which n is the number of states and the measurement vector as y = [ y 1 ,   y 2 ,   y 3 ,   ,   y m ] T , where m is the number of measurements. The invader targets measurements for the FDI attack because the DSE is highly vulnerable to PMUs records and can be easily manipulated by incorrect data. As shown in (1), measurements are dependent on states and the control vector, so the residual definition can be written as follows:
ε = y h ( x k + 1 ,   u k + 1 ,   w k )    
in which ε is the residual representing the difference between the measured value and the calculated value. It is worth noting that in the optimum situation, the residual is a definite zero. Assume the attack vector as A = [ A 1 ,   A 2 ,   A 3 ,   ,   A m ] T . The residual under the FDI attack can be calculated as follows:
ε = y + A h ( x k + 1 ,   u k + 1 ,   w k )    
The outcome of the process is an incorrect x which will significantly impact operators for making decisive decisions and may also lead to power outages. In conclusion, while it has the shape of A, the attack has succeeded, and the system states are going to be inaccurate, as illustrated in Figure 3. The subplot in Figure 3 shows how the true measurements are changing under the FDI attack. As it is illustrated in the mentioned figure, some of the measurements randomly increase or decrease.

2.2.2. DoS Attack

This attack is based on data loss, and it can mislead operators by disrupting communication between PMUs and data centers, resulting in power system failures, such as blackouts. A DoS attack can be simulated in a variety of ways, and the Bernoulli distribution [24] method is considered in this article. DoS attacks can be carried out at various intervals or concurrently during the grid’s transient time. Assume that y = [ y 1 ,   y 2 ,   y 3 ,   ,   y m ] T   is the measurement vector in which m is the number of measurements. The interval of DoS attack is assumed to be a vector named tD, and the attack lasts until tDk, so the time vector is t D = [ t D 0 ,   t D 1 ,   t D 2 ,   ,   t D k ] . By employing a Bernoulli distribution, the attack vector of A is described as below.
A ( i ) = { 1 0  
and i [ t D 0 ,   t D k ] while the v a r ( A ( i ) ) = 1 .
The DoS attack will result in a new measurement vector named yA. The attacked measurement vector is formulated as follows:
y A = A × y  
As in (6), the ε after the DoS attack is going to be calculated as:
ε = y A h ( x k + 1 ,   u k + 1 ,   w k )
or
ε = A × y h ( x k + 1 ,   u k + 1 ,   w k )
Therefore, by twisting the measured data, DSE will fail to estimate the true states, and operators will be manipulated by the wrong information delivered by DSE at several different times (within tD). In Figure 4, the mechanism of the DoS attack is illustrated. The subplot in Figure 4 shows how the true measurements change under the FDI attack. As it is illustrated in the mentioned figure, some of the measurements, depending on Bernoulli’s probability, become zeros.

3. AI-Based Methods

In this article, an unsupervised learning method, HC, and a supervised method, DTR, are employed to facilitate the detecting and eliminating process.

3.1. Hierarchical Clustering

HC is a broad category of clustering algorithms that construct nested clusters by successively merging or splitting them. This cluster hierarchy is portrayed as a tree (or dendrogram). The tree’s root is a single cluster that collects all of the samples, while the leaves are clusters with just one sample [28], making the HC a suitable method for detecting the cyber-attack performed in a power system with various sample data derived from PMUs. In this article, the agglomerative type of HC is employed, which is a bottom-up approach. Each discovery begins in its cluster, and when one progresses up the hierarchy, pairs of clusters are combined. Figure 5 represents the dendrogram of agglomerative HC.
The distance metrics for HC range from the Euclidean distance to the Mahalanobis distance. The most common distance metric for agglomerative clustering is the Euclidean distance. Assume that a and b are two different data vectors. The Euclidean distance is formulated as below.
a b 2 = i ( a i b i ) 2
The linkage criterion determines the distance between sets of observations that includes pairwise distances between observations. Commonly used linkages criteria are complete-linkage clustering and single-linkage clustering. Assume that A and B are two sets of observations. The single-linkage clustering is formulated as below.
Linkage = m i n { d ( a , b )   : a A ,   b B }    
where d is the distance metric.

3.2. Decision Tree

Decision trees are a non-parametric supervised learning method for classification and regression tasks [29]. The goal is to learn basic decision rules from data features to construct a model for prediction. Used at the elimination stage, DTR is employed as a prediction method to prevent the manipulation of the operators and the upcoming disasters. A supervised learning technique requires labeled data to train the model with, and, for that purpose, we simulated numerous dynamic events and trained the tree regressor with different non-attacked data. DTR can work with time series and continuous values such as those we are facing in the power networks, making this method well suited for this purpose [30]. DTR does not necessarily require pre-scaling or pre-processing of data, which is useful in the case of generators’ angles as the angle is forecasted in degree. Missing values in the power system data also do not affect the process of building a decision tree to any considerable extent. Last but not least, DTR prevents overfitting and boosts the speed of the learning process compared to other methods. Assume a training data set X = x 1 ,   x 2 ,   ,   x n with the responses Y = y 1 ,   y 2 ,   ,   y n in which n is the number of samples. Bagging will create a random sample with replacement to boost the accuracy in B repeats. Therefore, a sample of training data X b ,   Y b , b = 1, 2, …, B, is created, and the DTR can be fitted with them, and after that, other non-tested samples x will be predicted. A considerable advantage of DTR is that with respect to the whole forest trained on the bagged datasets, the variance will be decreased without increasing the bias, meaning that the model is not sensitive to noise. The predicted value for test data x is calculated as follows by assuming f as tree regressor.
f = 1 B b = 1 B f b ( x )  
and the standard deviation can be formulated as below:
σ = b = 1 B ( f b ( x )   f ) 2 B 1

4. Problem Formulation

Both machine learning methods mentioned in the last section are employed to spot and eliminate cyber-attacks. For tackling the cyber-sabotage problem in the power system, a modified version of HC is employed. The main idea behind this approach is to identify the anomalous data and eliminate them and reduce the features used as input to the DTR so that the algorithm predicts the correct states of the system. The challenge of the proposed method is to maintain the high accuracy of its predicted states (rotor angle and rotor mechanical speed), and reducing the dimension of the main features exerts a pervasive influence on the accuracy of this method. The main features chosen in this work are as follows.
f e a = [ P m ,   U ,   φ ,   ω z ]  
In which f e a is the vector of features, and the clustering distortion is formulated as below [28].
J ( c , μ ) = i = 1 m s i μ c ( i )  
While si is the ith sample, the cluster centroids are μ c , m is the number of clusters, and c = [1, 2, 3, …, k].
HC is a vital tool for detecting anomalies, and when data is far from other tree roots or leaves, it is usually clustered as an outlier with respect to the threshold set for the method. Therefore, for each measurement type, voltage, speed, etc., an HC algorithm will be utilized to detect the attacked data. As the data derived from PMUs are flowing, the HC accepts the new data and starts clustering. If the data is clustered as an outlier, the algorithm will send it to the DTR, and the regression method replaces the data by using other features and predicts the real value of the attacked data, and then the predicted value will be sent to the DSE, while HC will delete the attacked data from its database. If not an outlier, the data will be sent directly to the DSE for state estimating purposes. We need an impurity metric appropriate for continuous variables to use a decision tree for regression, so we define the impurity measure using the children’s leaves’ weighted mean squared error (MSE) [31].
MSE = 1 N t i     D t ( a ( i ) a t ^ ) 2
a t ^ = 1 N t i     D t a ( i )    
where Nt is the number of samples at the leave t, while Dt is the training subset, a ( i ) is the true target value and a t ^ is the estimated target value. It is worth noting that the mentioned equations are used for the training process of the DTR. Figure 6 illustrates the flowchart of the proposed method.
For comparing different methods, some indices are defined and used as follows [12,36,37].
τ 1 = i = 1 N ( x ^ i x i t r u e ) 2 N    
τ 2 = S a d S a    
τ 3 = 1 M c ( T t 0 + 1 ) i = 0 t ( x ^ i x i t r u e ) 2
where N is the number of samples while x ^ i and x i t r u e are estimated and true states, respectively. Sa and Sad are the number of the attacked data and detected attacked data, respectively. M c is the number of Monte-Carlo replications, which in this article is set to be 100. T and t 0 are the end and the starting time of the period in which the cyber-attack was launched, respectively. It is clear that the first index is able to evaluate the estimation results, while the second one is the attack classification ratio. The last index represents the least squared error measure.

5. Simulation and Results

Here, the proposed method was tested on the IEEE 3-machine 9-bus system and the IEEE 5-machine 14-bus system, while the data of these test systems are derived by using the MATLAB power system toolbox [32] and the EKF and UKF methods are from the EKF/UKF toolbox [33]. All tests are conducted with MATLAB 2020a and Python 3.8. A sudden load fluctuation happened in 0.1 and lasted for 1 s in both test systems. The PMU sample rate is 120 samples per second, and a PMU is utilized at each generator bus.
Two case studies are represented in this article, and various cyber-attacks are employed for the simulation process. Both FDI and DoS attacks are simulated with different attack vectors and probabilities as illustrated in Table 2. It is worth noting that the base rotor speed is 376.8 rad/sec for both case studies, and the base generator angle is 1 degree. The cyber-attacks were launched over t = 4.2 s and exerted a significant influence on the DSE. The HC has clustered all the features simultaneously by taking the distortion level of features into account, and the DTR was held responsible for clearing the attack and correcting the states. It is worth noting that the DTR was trained by numerous data from different contingencies ranging from three-phase fault to lightning stroke, all of which are available on a MATLAB power system’s toolbox named PSAT [34].
In the three scenarios of FDI cyber-attack, the “Normal Distribution” is employed with different standard deviations for simulating the attacks [35]. In DoS cases, a “Packet Loss Ratio” is utilized for simulating the DoS attack process with four different intensities. Figure 7 shows the schematic of the IEEE 3-machine 9-bus and IEEE 5-machine 14-bus systems. The whole simulation time is about 10 s, while the distortion constant is set to 10 for the IEEE 9-bus and 30 for the IEEE 14-bus. Figure 8 illustrates the first generator’s states derived from the DSE, aided by EKF, UKF, and the proposed method under the three FDI cyber-attack scenarios. Figure 9 shows the dynamic states of the mentioned generator calculated by DSE under DoS cyber-sabotages for the IEEE 3-machine 9-bus test system.
From Figure 8a–c, it is clear that the proposed method boosted the accuracy of the DSE, especially during the time of FDI cyber-attacks, a task in which both EKF and UKF performed poorly. It is worth noting that before the cyber-attack, all three methods accurately estimated the dynamic states of the network. After the cyber-attack was launched, however, Kalman filters failed to detect and eliminate the attacks. The situation deteriorates in the case of DoS attacks. From (a) to (d) subplots of Figure 9, it can be observed that the mentioned filters almost failed to eliminate the attacks, while the proposed DTR-based method properly detected and eliminated the attack vectors.
In Figure 10a, an example of an attacked dataset detected by the HC method is illustrated, while in Figure 10b, a feature is shown which is not attacked. Both of the mentioned figures are heatmaps plotted by scatter function in Python with “cmap” set to cool. The former is the rotor speed of the second generator, and the latter is the voltage angle of bus three. Figure 11a,b shows the clustering inertia of both mentioned features. The accuracy of the proposed method significantly depends on the accurate functioning of the clustering method, which diagnoses malfeatures.
The proposed indices are calculated and compared to another related study in Table 3 and Table 4 under different attack scenarios in the IEEE 3-machine 9-bus test system. It is worth noting that the method proposed in [12] is RCKF.
From Figure 11a,b, it is clear that as soon as the attacked measurement of rotor speed enters the HC, the distortion of only one cluster boosts rapidly, and the injected data is eliminated, while all of the voltage angle data are correct and the distortion for only one cluster is smaller than d. The second index has the same value for both rotor speed and angle, as it measures the detecting accuracy of HC and does not depend on any individual features. By taking the first index into account, the proposed method works slightly better than that of [12], which shows the higher accuracy of the proposed method.
From Table 3 and Table 4, it can be seen that the HC-DTR-based dynamic state estimation outperformed the RCKF technique. The HC model managed to detect the attacked data better than the Kalman filter algorithm, and the DTR predicted the actual values more robustly than the method conducted in [12].
Figure 12 illustrates the generator’s states in the IEEE 5-machine 14-bus under three different FDI attack scenarios, while Figure 13 shows the generator’s states under DoS attack scenarios. In this test system, only UKF was employed as an alternative method due to the low accuracy of EKF.
As it is clear from Figure 12, the proposed machine learning-based method’s accuracy is far better than the UKF’s, even in more extensive scenarios under FDI attacks. Similar to the previous cyber-attack, it is clear from Figure 13 that the DoS attack is well detected and eliminated by the proposed method, a task in which the UKF has failed. The DTR method shows considerable potential in eliminating different cyber-attacks, as illustrated in the mentioned figures for both the IEEE 3-machine 9-bus test system and the IEEE 5-machine 14-bus test system. Figure 14 illustrates the rotor speed’s data of the second generator and voltage angle’s data of the third bus as attacked and the true features. Both mentioned figures are heatmaps plotted by scatter function in Python with “cmap” set to warm, while Figure 15 shows the cluster inertia of both features. It is worth noting that the HC method is clustering the data simultaneously, which is vitally essential for rapid response against cyber-attacks.
The proposed indices are illustrated in Table 5 and Table 6 for rotor angle and rotor speed, respectively, and compared to results from two other related studies [36,37], for the IEEE 5-machine 14-bus test system. It is worth mentioning that [36] proposed a non-linear method based on a novel Kalman filter for detecting and eliminating the FDI attack, while [37] employed a support vector machine classification-based method for diagnosing the DoS attack.
It is clear from Table 5 and Table 6 that the proposed method possesses better detection accuracy in the case of DoS attacks than that of [36] and more accuracy for estimating the dynamic states of the case study than that of [37]. Other indices illustrate that the proposed method is fully capable of eliminating DoS and FDI cyber-attacks and simply outperforms other mentioned techniques in [36,37].

6. Conclusions

A two-stage machine learning-based method was proposed in this paper to tackle the cyber-sabotage issue in the smart grid by clustering data using an HC method and regressing with DTR to eliminate the attack. This paper contributes to the area of DSE in power networks by using an unsupervised learning method for attack detection and an ensemble learning method for attack elimination. This novel technique was capable of detecting and eliminating cyber-attacks and tracking the dynamic states of the power system, which can provide significant help to human operators to prevent them from making wrong decisions during the transient time in the power system operation. The proposed method carried out the given tasks better than previous methods based on the traditional Kalman filter and support vector machines. By correctly diagnosing the attack vectors, the proposed method provides the operators with accurate state estimations, decreasing the risk of blackouts or other disasters due to wrong commands. However, the full efficiency of the proposed method is yet to be tested in a large-scale power grid network, and the cost for this was not considered in the present study. Our future work will also focus on developing effective methods for distinguishing between faults, cyber-attacks, damaged PMUs, and measurement noise in power networks.

Author Contributions

Conceptualization, A.A., M.G. and A.A.G.; methodology, A.A. and M.G.; software, A.A.; validation, M.G., R.R.-F. and V.P.; formal analysis, M.G.; investigation, R.R.-F. and V.P.; resources, A.A.; data curation, A.A.; writing—original draft preparation, A.A.; writing—review and editing, R.R.-F. and V.P.; visualization, A.A.G.; supervision, M.G., R.R.-F. and V.P.; project administration, R.R.-F. and V.P. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

AIArtificial Intelligence
CKFCubature Kalman Filter
DoSDenial of Service
DSEDynamic State Estimation
DTRDecision Tree Regressor
EKFExtended Kalman Filter
FDIFalse Data Injection
HCHierarchical Clustering
PMUPhasor Measurement Unit
RCKFRobust Cubature Kalman Filter
UKFUnscented Kalman Filter

References

  1. Thabet, A.; Boutayeb, M. On the Modeling and State Estimation for Dynamic Power System. Int. J. Electron. Sci. Eng. 2013, 7, 965–974. [Google Scholar]
  2. Farajzadeh-Zanjani, M.; Hallaji, E.; Razavi-Far, R.; Saif, M. Generative adversarial dimensionality reduction for diagnosing faults and attacks in cyber-physical systems. Neurocomputing 2021, 440, 101–110. [Google Scholar] [CrossRef]
  3. Farajzadeh-Zanjani, M.; Hallaji, R.E.; Razavi-Far, R.; Saif, M.; Parvania, M. Adversarial Semi-Supervised Learning for Diagnosing Faults and Attacks in Power Grids. IEEE Trans. Smart Grid 2021, 12, 3468–3478. [Google Scholar] [CrossRef]
  4. Zhao, J.; Qi, J.; Huang, Z.; Meliopoulos, A.P.S.; Gomez-Exposito, A.; Netto, M.; Mili, L.; Abur, A.; Terzija, V.; Kamwa, I.; et al. Power System Dynamic State Estimation: Motivations, Definitions, Methodologies, and Future Work. IEEE Trans. Power Syst. 2019, 34, 3188–3198. [Google Scholar] [CrossRef]
  5. Razavi-Far, R.; Farajzadeh-Zanjani, M.; Saif, M.; Chakrabarti, S. Correlation Clustering Imputation for Diagnosing Attacks and Faults With Missing Power Grid Data. IEEE Trans. Smart Grid 2019, 11, 1453–1464. [Google Scholar] [CrossRef]
  6. Debs, A.S.; Larson, R.E. A Dynamic Estimator for Tracking the State of a Power System. IEEE Trans. Power Appar. Syst. 1970, PAS-89, 1670–1678. [Google Scholar] [CrossRef]
  7. Huang, Z.; Schneider, K.; Nieplocha, J. Feasibility studies of applying Kalman Filter techniques to power system dynamic state estimation. In Proceedings of the 2007 International Power Engineering Conference (IPEC 2007), Singapore, 3–6 December 2007; pp. 376–382. [Google Scholar]
  8. Ghahremani, E.; Kamwa, I. Dynamic State Estimation in Power System by Applying the Extended Kalman Filter with Unknown Inputs to Phasor Measurements. IEEE Trans. Power Syst. 2011, 26, 2556–2566. [Google Scholar] [CrossRef]
  9. Hassani, H.; Razavi-Far, R.; Saif, M.; Palade, V. Generative Adversarial Network-Based Scheme for Diagnosing Faults in Cyber-Physical Power Systems. Sensors 2021, 21, 5173. [Google Scholar] [CrossRef]
  10. Hallaji, E.; Razavi-Far, R.; Saif, M. DLIN: Deep Ladder Imputation Network. IEEE Trans. Cybern. 2021, 1–13. [Google Scholar] [CrossRef] [PubMed]
  11. Hassani, H.; Hallaji, E.; Razavi-Far, R.; Saif, M. Unsupervised concrete feature selection based on mutual information for diagnosing faults and cyber-attacks in power systems. Eng. Appl. Artif. Intell. 2021, 100, 104150. [Google Scholar] [CrossRef]
  12. Li, Y.; Li, Z.; Chen, L. Dynamic State Estimation of Generators under Cyber Attacks. IEEE Access 2019, 7, 125253–125267. [Google Scholar] [CrossRef]
  13. An Unprecedented Cyberattack Hit the US Power Grid|WIRED. Available online: https://www.wired.com/story/power-grid-cyberattack-facebook-phone-numbers-security-news/ (accessed on 31 August 2021).
  14. Liang, B.-M. A hierarchical clustering based global outlier detection method. In Proceedings of the 2010 IEEE Fifth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA), Changsha, China, 23–26 September 2010; pp. 1213–1215. [Google Scholar] [CrossRef]
  15. Qi, J.; Taha, A.F.; Wang, J. Comparing Kalman Filters and Observers for Power System Dynamic State Estimation With Model Uncertainty and Malicious Cyber Attacks. IEEE Access 2018, 6, 77155–77168. [Google Scholar] [CrossRef]
  16. Wang, S.; Zhao, J.; Huang, Z.; Diao, R. Assessing Gaussian assumption of PMU measurement error using field data. IEEE Trans. Power Del. 2018, 33, 3233–3236. [Google Scholar] [CrossRef]
  17. Li, Y.; Li, J.; Qi, J. Robust Cubature Kalman Filter for Dynamic State Estimation of Synchronous Machines under Unknown Measurement Noise Statistics. IEEE Access 2019, 7, 29139–29148. [Google Scholar] [CrossRef]
  18. Taha, A.F.; Qi, J.; Wang, J.; Panchal, J.H. Risk Mitigation for Dynamic State Estimation Against Cyber Attacks and Unknown Inputs. IEEE Trans. Smart Grid 2016, 9, 886–899. [Google Scholar] [CrossRef]
  19. Wang, X.; Luo, X.; Guan, X. Unknown cyber attack detection and isolation for power systems via Luenberger observer. In Proceedings of the 2017 4th International Conference on Information, Cybernetics and Computational Social Systems (ICCSS), Dalian, China, 24–26 July 2017; pp. 673–678. [Google Scholar] [CrossRef]
  20. Lei, M.; Mohammadi, M. Hybrid machine learning based energy policy and management in the renewable-based microgrids considering hybrid electric vehicle charging demand. Int. J. Electr. Power Energy Syst. 2021, 128, 106702. [Google Scholar] [CrossRef]
  21. Almasabi, S.; Bera, A.; Mitra, J. Dynamic State Estimation Aided By Machine Learning. In Proceedings of the 2019 IEEE Power & Energy Society General Meeting (PESGM), Atlanta, GA, USA, 4–8 August 2019; pp. 1–5. [Google Scholar] [CrossRef]
  22. Ferrag, M.A.; Maglaras, L.; Moschoyiannis, S.; Janicke, H. Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. J. Inf. Secur. Appl. 2019, 50, 102419. [Google Scholar] [CrossRef]
  23. Sun, K.; Hou, Y.; Sun, W.; Qi, J. Power System Control Under Cascading Failures: Understanding, Mitigation, and System Restoration; John Wiley & Sons: Hoboken, NJ, USA, 2018. [Google Scholar]
  24. Befekadu, G.; Gupta, V.; Antsaklis, P.J. Risk-Sensitive Control Under Markov Modulated Denial-of-Service (DoS) Attack Strategies. IEEE Trans. Autom. Control. 2015, 60, 3299–3304. [Google Scholar] [CrossRef]
  25. Lu, Z.; Yang, S.; Sun, Y. Application of extended fractional Kalman filter to power system dynamic state estimation. In Proceedings of the 2016 IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC), Xi’an, China, 25–28 October 2016; pp. 1923–1927. [Google Scholar] [CrossRef]
  26. Gao, W.; Wang, S. On-line dynamic state estimation of power systems. In Proceedings of the North American Power Symposium 2010, Arlington, TX, USA, 26–28 September 2010; pp. 1–6. [Google Scholar] [CrossRef]
  27. Tebianian, H.; Jeyasurya, B. Dynamic state estimation in power systems using Kalman filters. In Proceedings of the 2013 IEEE Electrical Power & Energy Conference, Halifax, NS, Canada, 21–23 August 2013; pp. 1–5. [Google Scholar] [CrossRef]
  28. Nielsen, F. Chapter 8: Hierarchical Clustering. In Introduction to HPC with MPI for Data Science; Springer: Berlin/Heidelberg, Germany, 2016. [Google Scholar] [CrossRef]
  29. Maree, R.; Geurts, P.; Piater, J.; Wehenkel, L. Random Subwindows for Robust Image Classification. In Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR’05), San Diego, CA, USA, 20–25 June 2005; Volume 1, pp. 34–40. [Google Scholar] [CrossRef] [Green Version]
  30. de Amorim, R.C.; Hennig, C. Recovering the number of clusters in data sets with noise features using feature rescaling factors. Inf. Sci. 2015, 324, 126–145. [Google Scholar] [CrossRef] [Green Version]
  31. Classification and Regression Analysis with Decision Trees|by Lorraine Li|Towards Data Science. Available online: https://towardsdatascience.com/https-medium-com-lorrli-classification-and-regression-analysis-with-decision-trees-c43cdbc58054 (accessed on 31 August 2021).
  32. Sauer, P.W.; Pai, M.A.; Chow, J.H. Power System Toolbox. In Power System Dynamics and Stability: With Synchrophasor Measurement and Power System Toolbox 2e; Sauer, P.W., Pai, M.A., Chow, J.H., Eds.; John Wiley & Sons: Hoboken, NJ, USA, 2017; pp. 305–325. [Google Scholar] [CrossRef]
  33. Särkkä, S. Bayesian Filtering and Smoothing; Physical Books Available from Cambridge University Press and a Free Electronic Version Online; Cambridge University Press: Cambridge, UK, 2013. [Google Scholar]
  34. Milano, F. An Open Source Power System Analysis Toolbox. IEEE Trans. Power Syst. 2005, 20, 1199–1206. [Google Scholar] [CrossRef]
  35. Xue, D.; Jing, X.; Liu, H. Detection of False Data Injection Attacks in Smart Grid Utilizing ELM-Based OCON Framework. IEEE Access 2019, 7, 31762–31773. [Google Scholar] [CrossRef]
  36. Chakhchoukh, Y.; Lei, H.; Johnson, B.K. Diagnosis of Outliers and Cyber Attacks in Dynamic PMU-Based Power State Estimation. IEEE Trans. Power Syst. 2019, 35, 1188–1197. [Google Scholar] [CrossRef]
  37. Sakhnini, J.; Karimipour, H.; Dehghantanha, A. Smart Grid Cyber Attacks Detection Using Supervised Learning and Heuristic Feature Selection. In Proceedings of the 2019 IEEE 7th International Conference on Smart Energy Grid Engineering (SEGE), Oshawa, ON, Canada, 12–14 August 2019; pp. 108–112. [Google Scholar] [CrossRef] [Green Version]
Figure 1. DSE aided by UKF and EKF, in which x t + 1   |   f is the filtered state vector.
Figure 1. DSE aided by UKF and EKF, in which x t + 1   |   f is the filtered state vector.
Energies 14 05823 g001
Figure 2. How cyber-attacks can be performed in a smart grid.
Figure 2. How cyber-attacks can be performed in a smart grid.
Energies 14 05823 g002
Figure 3. Data under the FDI attack, in which c is the state attack vector.
Figure 3. Data under the FDI attack, in which c is the state attack vector.
Energies 14 05823 g003
Figure 4. Data under the DoS attack, in which c is the state attack vector.
Figure 4. Data under the DoS attack, in which c is the state attack vector.
Energies 14 05823 g004
Figure 5. Agglomerative clustering dendrogram, in which squares represent clusters and letters represent data.
Figure 5. Agglomerative clustering dendrogram, in which squares represent clusters and letters represent data.
Energies 14 05823 g005
Figure 6. Our proposed method for state estimation, which results in more accurate estimations under cyber-attacks.
Figure 6. Our proposed method for state estimation, which results in more accurate estimations under cyber-attacks.
Energies 14 05823 g006
Figure 7. (a) IEEE 3-machine 9-bus schematic; (b) IEEE 5-machine 14-bus schematic.
Figure 7. (a) IEEE 3-machine 9-bus schematic; (b) IEEE 5-machine 14-bus schematic.
Energies 14 05823 g007
Figure 8. (a) Rotor angle and angular frequency of the first generator in IEEE 9-bus system under the FDI attack scenario 1; (b) rotor angle and angular frequency of the first generator in IEEE 9-bus system under the FDI attack scenario 2; (c) rotor angle and angular frequency of the first generator in IEEE 9-bus system under the FDI attack scenario 3.
Figure 8. (a) Rotor angle and angular frequency of the first generator in IEEE 9-bus system under the FDI attack scenario 1; (b) rotor angle and angular frequency of the first generator in IEEE 9-bus system under the FDI attack scenario 2; (c) rotor angle and angular frequency of the first generator in IEEE 9-bus system under the FDI attack scenario 3.
Energies 14 05823 g008
Figure 9. (a) Rotor angle and angular frequency of the first generator in IEEE 9-bus system under the DoS attack scenario 1; (b) rotor angle and angular frequency of the first generator in IEEE 9-bus system under the DoS attack scenario 2; (c) rotor angle and angular frequency of the first generator in IEEE 9-bus system under the DoS attack scenario 3; (d) rotor angle and angular frequency of the first generator in IEEE 9-bus system under the DoS attack scenario 4.
Figure 9. (a) Rotor angle and angular frequency of the first generator in IEEE 9-bus system under the DoS attack scenario 1; (b) rotor angle and angular frequency of the first generator in IEEE 9-bus system under the DoS attack scenario 2; (c) rotor angle and angular frequency of the first generator in IEEE 9-bus system under the DoS attack scenario 3; (d) rotor angle and angular frequency of the first generator in IEEE 9-bus system under the DoS attack scenario 4.
Energies 14 05823 g009aEnergies 14 05823 g009b
Figure 10. (a) Rotor speed of the second generator in IEEE 9-bus system under the FDI attack; (b) voltage angle of the third bus in IEEE 9-bus system.
Figure 10. (a) Rotor speed of the second generator in IEEE 9-bus system under the FDI attack; (b) voltage angle of the third bus in IEEE 9-bus system.
Energies 14 05823 g010
Figure 11. (a) Clustering inertia for the rotor speed of the second generator in IEEE 9-bus system under the FDI attack; (b) clustering inertia for the voltage angle of the third bus in IEEE 9-bus system under the FDI attack.
Figure 11. (a) Clustering inertia for the rotor speed of the second generator in IEEE 9-bus system under the FDI attack; (b) clustering inertia for the voltage angle of the third bus in IEEE 9-bus system under the FDI attack.
Energies 14 05823 g011
Figure 12. (a) Rotor angle and angular frequency of the first generator in IEEE 14-bus system under the FDI attack scenario 1; (b) rotor angle and angular frequency of the first generator in IEEE 14-bus system under the FDI attack scenario 2; (c) rotor angle and angular frequency of the first generator in IEEE 14-bus system under the FDI attack scenario 3.
Figure 12. (a) Rotor angle and angular frequency of the first generator in IEEE 14-bus system under the FDI attack scenario 1; (b) rotor angle and angular frequency of the first generator in IEEE 14-bus system under the FDI attack scenario 2; (c) rotor angle and angular frequency of the first generator in IEEE 14-bus system under the FDI attack scenario 3.
Energies 14 05823 g012aEnergies 14 05823 g012b
Figure 13. (a) Rotor angle and angular frequency of the first generator in IEEE 14-bus system under the DoS attack scenario 1; (b) rotor angle and angular frequency of the first generator in IEEE 14-bus system under the DoS attack scenario 2; (c) rotor angle and angular frequency of the first generator in IEEE 14-bus system under the DoS attack scenario 3; (d) rotor angle and angular frequency of the first generator in IEEE 14-bus system under the DoS attack scenario 4.
Figure 13. (a) Rotor angle and angular frequency of the first generator in IEEE 14-bus system under the DoS attack scenario 1; (b) rotor angle and angular frequency of the first generator in IEEE 14-bus system under the DoS attack scenario 2; (c) rotor angle and angular frequency of the first generator in IEEE 14-bus system under the DoS attack scenario 3; (d) rotor angle and angular frequency of the first generator in IEEE 14-bus system under the DoS attack scenario 4.
Energies 14 05823 g013
Figure 14. (a) Rotor speed of the second generator in IEEE 14-bus system under the DoS attack; (b) voltage angle of the third bus in IEEE 14-bus system.
Figure 14. (a) Rotor speed of the second generator in IEEE 14-bus system under the DoS attack; (b) voltage angle of the third bus in IEEE 14-bus system.
Energies 14 05823 g014
Figure 15. (a) Clustering inertia for the rotor speed of the second generator in IEEE 14-bus system under the DoS attack; (b) clustering inertia for the voltage angle of the third bus in IEEE 14-bus system.
Figure 15. (a) Clustering inertia for the rotor speed of the second generator in IEEE 14-bus system under the DoS attack; (b) clustering inertia for the voltage angle of the third bus in IEEE 14-bus system.
Energies 14 05823 g015
Table 1. Comparison between related studies.
Table 1. Comparison between related studies.
Features[12][15][17][18][36][37]This Article
Supervised learning method×××××
FDI attack×
DoS attack×
Unsupervised learning method××××××
Cyber-attack detection
Cyber-attack elimination×
Table 2. Illustrates seven different attack scenarios.
Table 2. Illustrates seven different attack scenarios.
Attack ScenariosState Attack Vectors Standard DeviationPacket Loss Rate
FDI–first scenarioN(0, σ), σ = 0.0001×
FDI–second scenarioN(0, σ), σ = 0.001×
FDI–third scenarioN(0, σ), σ = 0.01×
DoS–first scenario×1
DoS–second scenario×0.95
DoS–third scenario×0.85
DoS–fourth scenario×0.75
Table 3. Indices calculated for the rotor angle of the first generator in IEEE 9-bus system.
Table 3. Indices calculated for the rotor angle of the first generator in IEEE 9-bus system.
ScenariosIndex[12]This Article
First FDI scenario τ 1 6.0998 × 1055.4721 × 105
τ 2 ×0.9372
τ 3 ×4.7548 × 106
Second FDI scenario τ 1 6.4476 × 1055.8539 × 105
τ 2 ×0.9421
τ 3 ×5.4152 × 106
Third FDI scenario τ 1 6.8111 × 1056.1836 × 105
τ 2 ×0.9723
τ 3 ×6.6205 × 106
First DoS scenario τ 1 1.6683 × 1041.3721 × 104
τ 2 ×0.9936
τ 3 ×1.0665 × 105
Second DoS scenario τ 1 1.6640 × 1041.4380 × 104
τ 2 ×0.9632
τ 3 ×2.4792 × 105
Third DoS scenario τ 1 1.6549 × 1041.5779 × 104
τ 2 ×0.9248
τ 3 ×3.6721 × 105
Fourth DoS scenario τ 1 1.6378 × 1041.6035 × 104
τ 2 ×0.8931
τ 3 ×4.9620 × 105
Table 4. Indices calculated for the rotor speed of the first generator in IEEE 9-bus system.
Table 4. Indices calculated for the rotor speed of the first generator in IEEE 9-bus system.
ScenariosIndex[7]This Article
First FDI scenario τ 1 1.5821 × 1051.2395 × 105
τ 2 ×0.9372
τ 3 ×2.1442 × 108
Second FDI scenario τ 1 1.5841 × 1051.3254 × 105
τ 2 ×0.9421
τ 3 ×6.5948 × 108
Third FDI scenario τ 1 1.5969 × 1051.4837 × 105
τ 2 ×0.9723
τ 3 ×9.9827 × 108
First DoS scenario τ 1 1.5626 × 1051.1147 × 105
τ 2 ×0.9936
τ 3 ×1.9546 × 107
Second DoS scenario τ 1 1.5619 × 1051.2759 × 105
τ 2 ×0.9632
τ 3 ×4.2756 × 107
Third DoS scenario τ 1 1.5612 × 1051.4738 × 105
τ 2 ×0.9248
τ 3 ×6.9563 × 107
Fourth DoS scenario τ 1 1.5604 × 1051.5392 × 105
τ 2 ×0.8931
τ 3 ×1.6383 × 106
Table 5. Indices calculated for the rotor angle of the first generator in IEEE 14-bus system.
Table 5. Indices calculated for the rotor angle of the first generator in IEEE 14-bus system.
ScenariosIndex[36][37]This Article
First FDI scenario τ 1 ××6.2471 × 105
τ 2 ××0.9163
τ 3 ××1.5728 × 106
Second FDI scenario τ 1 ××9.4638 × 105
τ 2 ××0.9274
τ 3 ××1.6371 × 106
Third FDI scenario τ 1 ××1.2532 × 104
τ 2 ××0.9355
τ 3 2.4920 × 104×1.7814 × 106
First DoS scenario τ 1 ××8.9060 × 105
τ 2 ××0.9997
τ 3 ××1.5406 × 106
Second DoS scenario τ 1 ××9.7987 × 105
τ 2 ××0.9723
τ 3 ××1.6086 × 106
Third DoS scenario τ 1 ××1.0614 × 104
τ 2 ××0.9491
τ 3 ××1.6796 × 106
Fourth DoS scenario τ 1 ××1.3000 × 104
τ 2 ×0.90790.9186
τ 3 ××2.2414 × 106
Table 6. Indices calculated for the rotor speed of the first generator in IEEE 14-bus system.
Table 6. Indices calculated for the rotor speed of the first generator in IEEE 14-bus system.
ScenariosIndex[36][37]This Article
First FDI scenario τ 1 ××2.1461 × 105
τ 2 ××0.9163
τ 3 ××1.2362 × 107
Second FDI scenario τ 1 ××3.6921 × 105
τ 2 ××0.9274
τ 3 ××1.5036 × 107
Third FDI scenario τ 1 ××3.9251 × 105
τ 2 ××0.9355
τ 3 8 × 106×1.4270 × 107
First DoS scenario τ 1 ××2.3250 × 105
τ 2 ××0.9997
τ 3 ××5.7519 × 107
Second DoS scenario τ 1 ××3.7969 × 105
τ 2 ××0.9723
τ 3 ××6.5682 × 107
Third DoS scenario τ 1 ××3.8801 × 105
τ 2 ××0.9491
τ 3 ××6.7121 × 107
Fourth DoS scenario τ 1 ××4.0986 × 105
τ 2 ×0.90790.9186
τ 3 ××7.0902 × 107
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Aflaki, A.; Gitizadeh, M.; Razavi-Far, R.; Palade, V.; Ghasemi, A.A. A Hybrid Framework for Detecting and Eliminating Cyber-Attacks in Power Grids. Energies 2021, 14, 5823. https://doi.org/10.3390/en14185823

AMA Style

Aflaki A, Gitizadeh M, Razavi-Far R, Palade V, Ghasemi AA. A Hybrid Framework for Detecting and Eliminating Cyber-Attacks in Power Grids. Energies. 2021; 14(18):5823. https://doi.org/10.3390/en14185823

Chicago/Turabian Style

Aflaki, Arshia, Mohsen Gitizadeh, Roozbeh Razavi-Far, Vasile Palade, and Ali Akbar Ghasemi. 2021. "A Hybrid Framework for Detecting and Eliminating Cyber-Attacks in Power Grids" Energies 14, no. 18: 5823. https://doi.org/10.3390/en14185823

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop