Cyber Attacks Detection, Prevention, and Source Localization in Digital Substation Communication using Hybrid Statistical-Deep Learning

📅 2025-07-01
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
IEC 61850 Sampled Values (SV) communication lacks authentication and encryption, rendering it vulnerable to malicious injection attacks that may cause protective relay misoperation or failure-to-trip; existing detection methods neglect the risk of communication disruption induced by defensive actions. This paper proposes an integrated SV attack defense framework unifying statistical modeling and deep learning: it precisely characterizes network latency using an exponentially modified Gaussian distribution and employs a hybrid LSTM–Elman neural network for probabilistic anomaly detection. For the first time, active filtering and source localization are performed concurrently upon detection. The method achieves near-zero false-positive rates and low latency overhead. It is rigorously validated across industrial Intelligent Electronic Devices (IEDs), hardware-in-the-loop (HIL) testbeds, and virtualized platforms, demonstrating high accuracy, strong robustness, and readiness for practical deployment.

Technology Category

Application Category

📝 Abstract
The digital transformation of power systems is accelerating the adoption of IEC 61850 standard. However, its communication protocols, including Sampled Values (SV), lack built-in security features such as authentication and encryption, making them vulnerable to malicious packet injection. Such cyber attacks can delay fault clearance or trigger unintended circuit breaker operations. While most existing research focuses on detecting cyber attacks in digital substations, intrusion prevention systems have been disregarded because of the risk of potential communication network disruptions. This paper proposes a novel method using hybrid statistical-deep learning for the detection, prevention, and source localization of IEC 61850 SV injection attacks. The method uses exponentially modified Gaussian distributions to model communication network latency and long short-term memory and Elman recurrent neural network to detect anomalous variations in the estimated probability distributions. It effectively discards malicious SV frames with minimal processing overhead and latency, maintains robustness against communication network latency variation and time-synchronization issues, and guarantees a near-zero false positive rate in non-attack scenarios. Comprehensive validation is conducted on three testbeds involving industrial-grade devices, hardware-in-the-loop simulations, virtualized intelligent electronic devices and merging units, and high-fidelity emulated communication networks. Results demonstrate the method's suitability for practical deployment in IEC 61850-compliant digital substations.
Problem

Research questions and friction points this paper is trying to address.

Detect cyber attacks in IEC 61850 digital substations
Prevent malicious SV injection with minimal disruption
Locate attack sources using hybrid statistical-deep learning
Innovation

Methods, ideas, or system contributions that make the work stand out.

Hybrid statistical-deep learning for attack detection
Exponentially modified Gaussian models latency
LSTM-Elman networks detect anomalous distributions
🔎 Similar Papers
No similar papers found.
N
Nicola Cibin
Department of Electrical Sustainable Energy (ESE), Delft University of Technology, Mekelweg 4, 2628CD, Delft, The Netherlands
B
Bas Mulder
DNV Netherlands B.V., Utrechtseweg 310, 6812AR Arnhem, The Netherlands
Herman Carstens
Herman Carstens
Elia
EnergyMeasurement and VerificationBayesian statisticsMismeasurementSampling
Peter Palensky
Peter Palensky
TU Delft
Cyber-physical energy systemsAutomationDistributed systemsModelingSmart Grids
A
Alexandru Ştefanov
Department of Electrical Sustainable Energy (ESE), Delft University of Technology, Mekelweg 4, 2628CD, Delft, The Netherlands