Visible to the public Cyber Resilience using State Estimation Updates Based on Cyber Attack Matrix Classification

TitleCyber Resilience using State Estimation Updates Based on Cyber Attack Matrix Classification
Publication TypeConference Paper
Year of Publication2020
AuthorsHopkins, Stephen, Kalaimannan, Ezhil, John, Caroline Sangeetha
Conference Name2020 IEEE Kansas Power and Energy Conference (KPEC)
Date PublishedJuly 2020
ISBN Number978-1-7281-5391-9
KeywordsClassification algorithms, computer security, CPS Resilience, cyber physical systems, cyber resilience, Cyber-physical systems, Data injection, integrated circuits, Internet of Things, Observers, pubcrawl, reliability, resilience, Resiliency, Smart grids, state estimation
AbstractCyber-physical systems (CPS) maintain operation, reliability, and safety performance using state estimation and control methods. Internet connectivity and Internet of Things (IoT) devices are integrated with CPS, such as in smart grids. This integration of Operational Technology (OT) and Information Technology (IT) brings with it challenges for state estimation and exposure to cyber-threats. This research establishes a state estimation baseline, details the integration of IT, evaluates the vulnerabilities, and develops an approach for detecting and responding to cyber-attack data injections. Where other approaches focus on integration of IT cyber-controls, this research focuses on development of classification tools using data currently available in state estimation methods to quantitatively determine the presence of cyber-attack data. The tools may increase computational requirements but provide methods which can be integrated with existing state estimation methods and provide for future research in state estimation based cyber-attack incident response. A robust cyber-resilient CPS includes the ability to detect and classify a cyber-attack, determine the true system state, and respond to the cyber-attack. The purpose of this paper is to establish a means for a cyber aware state estimator given the existence of sub-erroneous outlier detection, cyber-attack data weighting, cyber-attack data classification, and state estimation cyber detection.
Citation Keyhopkins_cyber_2020