Searched for: subject%3A%22Cyber%255C+attack%22
(1 - 20 of 26)

Pages

document
Xiao, J. (author), Wang, L. (author), Qin, Z. (author), Bauer, P. (author)
Communication-based distributed secondary control is deemed necessary to restore the state of islanding AC microgrids to set points. As its limited global information, the microgrids become vulnerable to cyber-attacks, which by falsifying the communicating singles, like the angular frequency, can disturb the power dispatch in the microgrids...
journal article 2024
document
Vian, Giacomo (author)
The proliferation of Distributed Energy Resources (DERs) is decentralizing the power system, with more and more capacity installed in the distribution grids. Concurrently, the energy sector is embracing the Internet of Things (IoT) paradigm, resulting in the emergence of the Internet of Energy. However, this transformation introduces new...
master thesis 2023
document
Hofman, Daan (author)
With the ever-increasing digitalisation of society and the explosion of internet-enabled devices with the Internet of Things (IoT), keeping services and devices secure is becoming more important. Logs play a critical role in sustaining system reliability. Manual analysis of logs has become increasingly difficult, accelerating the development of...
master thesis 2023
document
ZHANG, JIAXUAN (author)
Cyber-physical systems are vulnerable to malicious attacks, which can lead to severe consequences. Active detection methods have emerged as a promising approach for identifying such attacks. However, existing active detection methods are susceptible to malicious parameter identification attacks, where attackers exploit eavesdropped data to...
master thesis 2023
document
Keijzer, T. (author), Ferrari, Riccardo M.G. (author), Sandberg, Henrik (author)
Interconnections in modern systems make them vulnerable to adversarial attackers both by corrupting communication channels and compromising entire subsystems. The field of secure state estimation (SSE) aims to provide correct state estimation even when an unknown part of the measurement signals is corrupted. In this letter, we propose a...
journal article 2023
document
Xiao, J. (author), Wang, L. (author), Qin, Z. (author), Bauer, P. (author)
In multi-inverter parallel connected islanded micro-grids, reactive power sharing is challenged by the differences in feeder impedance and various controller parameters. In order to address this issue, a virtual impedance reshaping strategy based on the consensus algorithm is proposed in this paper. The proposed method facilitates adaptive...
conference paper 2023
document
Xiao, J. (author), Wang, L. (author), Qin, Z. (author), Bauer, P. (author)
This paper proposes a virtual impedance reshaping strategy to share active and harmonic power while promoting the PCC voltage quality. Moreover, the suggested method is resilient to cyber-attacks and immune to communication interruption and delay. Furthermore, it significantly reduces the communication burden. Experiments verify the...
conference paper 2023
document
Presekal, A. (author), Stefanov, Alexandru (author), Subramaniam Rajkumar, Vetrivel (author), Palensky, P. (author)
Electrical power grids are vulnerable to cyber attacks, as seen in Ukraine in 2015 and 2016. However, existing attack detection methods are limited. Most of them are based on power system measurement anomalies that occur when an attack is successfully executed at the later stages of the cyber kill chain. In contrast, the attacks on the Ukrainian...
journal article 2023
document
Chen, Jie (author), Gallo, A.J. (author), Yan, Shuo (author), Parisini, Thomas (author), Yuen Ron Hui, Shu (author)
With increasing installations of grid-connected power electronic converters in the distribution network, there is a new trend of using distributed control in a cyber layer to coordinate the operations of these power converters for improving power system stability. However, cyber-attacks remain a threat to such distributed control. This paper...
journal article 2022
document
Subramaniam Rajkumar, Vetrivel (author), Musunuri, Shyam (author), Stefanov, Alexandru (author), Bruijns, Siem (author), de Wit, J.J. (author), Klaar, Danny (author), Louh, Amadou (author), Thoen, Arnaud (author), Palensky, P. (author)
Paper ID – 0348
conference paper 2022
document
Mohammadpourfard, Mostafa (author), Weng, Yang (author), Khalili, Abdullah (author), Genc, Istemihan (author), Shefaei, A. (author), Mohammadi-Ivatloo, Behnam (author)
The expansion of power systems over large geographical areas renders centralized processing inefficient. Therefore, the distributed operation is increasingly adopted. This work introduces a new type of attack against distributed state estimation of power systems, which operates on inter-area boundary buses. We show that the developed attack...
journal article 2022
document
Xiao, J. (author), Wang, L. (author), Qin, Z. (author), Bauer, P. (author)
Smart grid steady control relies heavily on the communication infrastructure among sensors, actuators, and control systems, which makes it vulnerable to cyber-attacks. Accurate acquisition of dynamic state information is deemed vital for efficient detection of these cyber-attacks on a smart grid. However, several popular state estimation...
conference paper 2022
document
Xiao, J. (author), Wang, L. (author), Qin, Z. (author), Bauer, P. (author)
Distributed secondary control is deemed necessary to restore the state of AC micro-grids to set points. However, for its limited global information, the power electronic system is vulnerable to cyber-attacks that aim to desynchronize converters or even cause a shutdown of micro-grids by unnecessarily triggering the protection schemes. To this...
conference paper 2022
document
Semertzis, I. (author), Subramaniam Rajkumar, Vetrivel (author), Stefanov, Alexandru (author), Fransen, Frank (author), Palensky, P. (author)
Over the past decade, the number of cyber attack incidents targeting critical infrastructures such as the electrical power system has increased. To assess the risk of cyber attacks on the cyber-physical system, a holistic approach is needed that considers both system layers. However, the existing risk assessment methods are either qualitative in...
conference paper 2022
document
Semertzis, Ioannis (author)
Power grids rely on Operational Technology (OT) networks, for real-time monitoring and control. These traditionally segregated systems are now being integrated with general-purpose Information and Communication Technologies (ICTs). The coupling of the physical power system and its communications infrastructure forms a complex, interdependent...
master thesis 2021
document
Patel, Abhilash (author), Roy, Spandan (author), Baldi, S. (author)
By increasingly relying on network-based operation for control, monitoring, and protection functionalities, modern wide-area power systems have also become vulnerable to cyber-attacks aiming to damage system performance and/or stability. Resilience in state-of-the-art methods mostly relies on known characteristics of the attacks and static...
journal article 2021
document
van der Knaap, Paul (author)
The Internet has grown from a few interconnections of trusted parties to an incredibly large network with many different use cases. While the Internet grew, threats emerged as well. Although there are many different threats on the Internet, Distributed Denial of Service (DDoS) attacks are a threat that keeps rising in the threat landscape. The...
master thesis 2020
document
Subramaniam Rajkumar, Vetrivel (author), Tealane, M. (author), Stefanov, Alexandru (author), Palensky, P. (author)
Power systems automation and communication standards are crucial for the transition of the conventional power system towards a smart grid. The IEC 61850 standard is widely used for substation automation and protection. It enables real-time communication and data exchange between critical substation automation devices. IEC 61850 serves as the...
conference paper 2020
document
Subramaniam Rajkumar, Vetrivel (author), Tealane, M. (author), Stefanov, Alexandru (author), Presekal, A. (author), Palensky, P. (author)
Power system automation and communication standards are spearheading the power system transition towards a smart grid. IEC 61850 is one such standard, which is widely used for substation automation and protection. It enables real-time communication and data exchange between critical substation automation and protection devices within digital...
conference paper 2020
document
Bijmans, Hugo (author)
Cryptojacking, a phenomenon also known as drive-by cryptomining, involves stealing computing power from others to be used in illicit cryptomining. While first observed as host-based infections with low activity, the release of an efficient browser-based cryptomining application -- as introduced by Coinhive in 2017 -- has skyrocketed...
master thesis 2019
Searched for: subject%3A%22Cyber%255C+attack%22
(1 - 20 of 26)

Pages