Island detection methods | Type of cyber attack | |||||
---|---|---|---|---|---|---|
Denial-of-services attack | False data injection | Replay attack | Malware-virus attack | Web-attack | Cross-site-scripting attack | |
Remote | Fail | Fail | Fail | Fail | Fail | May work on SCADA and transfer tripping |
Active | Fail | May fail (depends on the nature of VPN) | May fail (depends on the nature of GOOSE message) | Fail | Fail | May work (depend on nature of phase perturbation injection) |
Passive | May work if it works on traditional ROCOF on not receiving any signal | May fail (depends on the nature of VPN) | May fail (depends on the nature of GOOSE message) | May work if it works on traditional ROCOF on not receiving any signal | May work if it works on modified Kalman filter based technique | Fail |
Hybrid | May work if it works on traditional ROCOF on not receiving any signal | May fail (depends on the nature of VPN) | May fail (depends on the nature of GOOSE message) | May work if it works on traditional ROCOF on not receiving any signal | May work if it works on modified Kalman filter based technique | May work (depend on nature of fluctuation injection) |
Signal Processing | May work if it works on traditional ROCOF on not receiving any signal | May work if the signal processor rapidly adapts to new data formats | May work if the signal processor detects bad data | May work if the signal communication is through cloud based information and communication technology | May work with Deep learning techniques and cloud computing | Fail |
Intelligence | May work if it works on traditional ROCOF on not receiving any signal | May work if the classifier is also trained for false data detection | May work with Deep learning techniques | May work if the signal communication is through cloud based information and communication technology | May work with Deep learning techniques and cloud computing | Fail |