IDEAS home Printed from https://ideas.repec.org/a/gam/jeners/v16y2023i12p4573-d1166048.html
   My bibliography  Save this article

Cyber Attacks in Cyber-Physical Microgrid Systems: A Comprehensive Review

Author

Listed:
  • Sriranga Suprabhath Koduru

    (Department of Electrical and Computer Engineering, Ecole Centrale School of Engineering, Mahindra University, Hyderabad 500043, India)

  • Venkata Siva Prasad Machina

    (Department of Electrical and Computer Engineering, Ecole Centrale School of Engineering, Mahindra University, Hyderabad 500043, India)

  • Sreedhar Madichetty

    (Department of Electrical and Computer Engineering, Ecole Centrale School of Engineering, Mahindra University, Hyderabad 500043, India)

Abstract

The importance of and need for cyber security have increased in the last decade. The critical infrastructure of the country, modeled with cyber-physical systems (CPS), is becoming vulnerable because of a lack of efficient safety measures. Attackers are becoming more innovative, and attacks are becoming undetectable, thereby causing huge risks to these systems. In this scenario, intelligent and evolving detection methods should be introduced to replace basic and outworn methods. The ability of artificial intelligence (AI) to analyze data and predict outcomes has created an opportunity for researchers to explore the power of AI in cyber security. This article discusses new-age intelligence and smart techniques such as pattern recognition models, deep neural networks, generative adversarial networks, and reinforcement learning for cyber security in CPS. The differences between the traditional security methods used in information technology and the security methods used in CPS are analyzed, and the need for a transition into intelligent methods is discussed in detail. A deep neural network-based controller that detects and mitigates cyber attacks is designed for microgrid systems. As a case study, a stealthy local covert attack that overcomes the existing microgrid protection is modeled. The ability of the DNN controller to detect and mitigate the SLCA is observed. The experiment is performed in a simulation and also in real-time to analyze the effectiveness of AI in cyber security.

Suggested Citation

  • Sriranga Suprabhath Koduru & Venkata Siva Prasad Machina & Sreedhar Madichetty, 2023. "Cyber Attacks in Cyber-Physical Microgrid Systems: A Comprehensive Review," Energies, MDPI, vol. 16(12), pages 1-36, June.
  • Handle: RePEc:gam:jeners:v:16:y:2023:i:12:p:4573-:d:1166048
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1996-1073/16/12/4573/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1996-1073/16/12/4573/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Mohamed Amine Ferrag & Leandros Maglaras & Ahmed Ahmim & Makhlouf Derdour & Helge Janicke, 2020. "RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks," Future Internet, MDPI, vol. 12(3), pages 1-14, March.
    2. P. S. Keila & D. B. Skillicorn, 2005. "Structure in the Enron Email Dataset," Computational and Mathematical Organization Theory, Springer, vol. 11(3), pages 183-199, October.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Jana Diesner & Terrill L. Frantz & Kathleen M. Carley, 2005. "Communication Networks from the Enron Email Corpus “It's Always About the People. Enron is no Different”," Computational and Mathematical Organization Theory, Springer, vol. 11(3), pages 201-228, October.
    2. Michael W. Berry & Murray Browne, 2005. "Email Surveillance Using Non-negative Matrix Factorization," Computational and Mathematical Organization Theory, Springer, vol. 11(3), pages 249-264, October.
    3. Hady W. Lauw & Ee-Peng Lim & HweeHwa Pang & Teck-Tim Tan, 2005. "Social Network Discovery by Mining Spatio-Temporal Events," Computational and Mathematical Organization Theory, Springer, vol. 11(2), pages 97-118, July.
    4. Anurat Chapanond & Mukkai S. Krishnamoorthy & Bülent Yener, 2005. "Graph Theoretic and Spectral Analysis of Enron Email Data," Computational and Mathematical Organization Theory, Springer, vol. 11(3), pages 265-281, October.
    5. Alastair Irons & Harjinder Singh Lallie, 2014. "Digital Forensics to Intelligent Forensics," Future Internet, MDPI, vol. 6(3), pages 1-13, September.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jeners:v:16:y:2023:i:12:p:4573-:d:1166048. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.