Distributed Estimation and Detection of Anomalies in Control Systems

Information

  • Patent Application
  • 20180115561
  • Publication Number
    20180115561
  • Date Filed
    October 20, 2016
    8 years ago
  • Date Published
    April 26, 2018
    6 years ago
Abstract
Methods and Systems for detecting anomalies in a control area of a control system. Estimating for the control area, a first state from a historical state over a first time period using a model of dynamics, and defining a transition of the first state as a function of control inputs, the first state includes a generator state for each generator, the control inputs include a network state for each bus, a mechanical input to each generator or power consumptions at the buses. Updating estimated first state, by connecting measurements of rotor frequency of each generator and measurements of the network states on the buses with the generator state of each generator, to obtain a second state over a second time period later than the first time period, and detecting anomalies based on a statistic deviation of the second state from its corresponding prediction derived from the first state.
Description
FIELD

The present disclosure relates generally to electric power systems, and more particularly to electrical anomaly detection in electric power systems.


BACKGROUND

Anomaly detection has been applied to control systems to increase cyber-physical security and optimize operations of a control system. The principles typically used in anomaly detection can include identifying normal behavior and a threshold selection procedure for identifying anomalous behavior. Usually, the challenge is to develop a method that is able to detect the abnormalities specific to an industry's needs.


An anomaly such as a cyber-physical attack may be undetectable from tampered measurements if there is a set of normal operating conditions consistent with the tampered measurements. Conventional cyber-physical attack detection approaches are centralized implemented.


In cyber-physical attack security applications one of the major problems is distinguishing between normal circumstance and “anomalous” or “abnormal” circumstances. For example, malfunction mechanical devices can be viewed as abnormal modifications to normal programs. The detection of anomalous activities is a difficult problem in which the detection of anomalous activities is disadvantaged by not having appropriate data and/or because of the variety of different activities that need to be monitored. Additionally, protective measures based on established conventional practices are vulnerable to activities designed specifically to undermine these assumptions.


Therefore, there is a need for developing more advanced distributed methods for real-time estimation and detection of anomalies in control systems.


SUMMARY

The present disclosure relates to methods and systems of dynamic state estimation of Electric Power Systems (EPS) for detecting anomalies in control areas of a control system having multiple control areas. The disclosure includes methods and systems relating to the detection of anomalies in a control area positioned within a multiple of neighbouring control areas in the control system that takes into account both process and measurement anomalies.


According to embodiments of the present disclosure, the methods and systems for dynamic state estimation are based on partitioning a control area from the multiple neighboring control areas in the control system, and detecting the anomalies for that individual control area.


Specifically, the present disclosure is based on the realization that dynamics of the control area can be decoupled if the voltage phase angles on the buses are treated as control inputs to a model of dynamics of the control area defining a transition of the state of the control area as a function of control inputs. At least one aspect regarding the decoupling dynamics of the control area from the control system, is that it allows for detecting anomalies within an individual control area rather than for the entire control system.


This is significant, because convention control system state variables include states of generators and buses, i.e., a rotor angle and a rotor frequency of generators and voltage phase angles on buses for the entire control system and not for a single control area. The states of the convention control system are globally coupled because the phase angle on a bus is related to the states of all buses within the control system. Cyber-attacks target entire computer information systems and infrastructures such as control systems, by manipulating with measurements of the control system as part of cyberterrorism. Resulting in the cyber-attacks being undetectable from tampered measurements of convention control systems, if there is a set of normal operating conditions consistent with those measurements when detection is based on the entire central system.


We realized that by avoiding centralized processing, and focusing on a single control area we make it more difficult for cyber-attackers to stage a global attack on the entire control system.


Our realization of decoupling dynamics of the control area from the entire control systems is contrary to the technical engineering principles of the structured network of the conventional control system, due to the fact that system networks of electrical components used to supply, transfer and use electric power are a dynamically coupled system. In other words, the conventional control system has a state on a bus of the generator that depends on states of all buses in the entire conventional control system, so that to detect a cyber-attack on one control area, the state of the entire conventional control system is required. The reason for this requirement is that the model of dynamics for the entire conventional control system's state transition is coupled together, and the measurement model of the conventional control system is also coupled together, which requires that any test for detecting a cyber-attack must be for the entire conventional control system and not for a single control area, as according the present disclosure. Another realization that the methods and systems of the present disclosure are based on is that the state of generators can be estimated according to a measurement model of the first control area, i.e. control area, connecting measurements of the rotor frequency of each generator and measurements of the voltage phase angles on the buses of the control area with the rotor angle and the rotor frequency of each generator of the control area. For example, we are able to estimate a first state of the control area from a historical state of the control area over a first state time period using a model of dynamics of the control area. In order to determine a transition of the first state of control area we used a function of control inputs, where the state of the control area includes a rotor angle and a rotor frequency for each generator in the control area. Based on the control inputs including one or combination of phase angles on the buses of the control area, phase angles on some neighbouring buses of neighbouring control areas, a mechanical input to each generator in the control area, or power consumptions at the buses in the control area. Essentially, embodiments of the present disclosure are based on tracking the dynamic relationship between local states and local operational measurements to detect the anomalies or cyber-attack in a distributed fashion with limited neighbouring communications. Wherein, no new measurements or devices are needed or required to be added to the EPS system, which provides an unencumbered implementation for the methods and systems of the present disclosure into the control systems industry.


We further realized that a cyber-attack can be detected in a distributed fashion based on a statistic deviation of the state of the local area, control area, from a normal state of the local area even considering uncertainties of the model of dynamics and the model of measurements. Wherein we use a Kalman filter based approach to deal with the level of ambiguity under which we assess how likely a cyber-attack has occurred introduced by the statistic deviation or noises. The Kalman filter can be distributed applied for each control area through iterative liner solvers and a neighborhood-approximation to an estimated state covariance matrix. In comparison, the estimated state covariance used in a centralized Kalman filter is, in general full, due to the global coupling of the bus voltages with the generator rotor angles for an interconnected power system.


We also formulate the dynamic state estimation problem using a structure-preserving model that preserves the sparse coupling of the dynamics. Both the generator state, i.e., rotor angle and frequency of each generator, and the network state, i.e., voltage phase angle at each bus, are considered in the estimation. Wherein we decompose the problem in such a way that each control area solves a problem of reduced dimension, and a decoupled state-space formulation is also used to avoid communication requirements between all generators.


For example, we updated the first state of the control area according to a measurement model of the control area, by connecting measurements in the control area of the rotor frequency of each generator and measurements of the phase angles on the buses, with the rotor angle and the rotor frequency of each generator in the control area, to obtain a second state of the control area over a second state time period that is later than the first state time period. Wherein we were able to detect the cyber-attack based on a statistic deviation of the second state of the control area from its corresponding prediction derived from the first state of the control area.


The local attack detection statistic is designed jointly with the dynamic state estimation in order to limit communication requirements. The communication requirements consist of buses' sharing their weighted measurement residuals within a user-specified neighborhood. The size of the neighborhood can be adjusted to allow for a tradeoff between accuracy and communication overhead.


According to another embodiment of the disclosure, a method for detecting anomalies in a control area of a control system with multiple control areas. The control area includes a set of generators in communication with a set of buses and some neighboring buses of neighboring controls area of the control system. The method including accessing a memory in communication with at least one processor, wherein the memory includes stored historical states of the control area. Estimating, by the processor, a first state of the control area over a first state time period from the historical states of the control area. Using a model of dynamics of the control area, and defining a transition of the first state of the control area as a function of control inputs. Wherein the first state of the control area includes a generator state for each generator in the control area. Further, wherein the control inputs include one or combination of: a network state for each bus in the control area; a network state for some neighboring buses of neighboring controls areas; a mechanical input to each generator in the control area or power consumptions at the buses in the control area. Updating, by the processor, the estimated first state of the control area according to a measurement model of the control area, by: connecting measurements of the rotor frequency of each generator; a weighted combination of measurements of the network states on the buses in the control area and some neighboring buses of neighboring controls areas; with the generator state of each generator in the control area, to obtain a second state of the control area over a second state time period later than the first state time period. Detecting, by the processor, the anomalies based on a statistic deviation of the second state of the control area from its corresponding prediction derived from the first state of the control area.


According to another embodiment of the disclosure, a system for detecting anomalies in a control area of a power system with multiple control areas. The control area includes a set of generators in communication with a set of buses and some neighboring buses of neighboring controls area of the control system. The system including a computer readable memory to store historical states of the control area, current states of the control area, a model of dynamics of the control area and a measurement model of the control area. A set of sensors arranged to sense measurements in the control area for the set of generators, the set of buses and to measure one or combination of rotor frequencies for each generator, voltage phase angles on the buses, a mechanical input to each generator, or power consumptions at the buses. A processor in communication with the computer readable memory configured is to: estimate a first state of the control area from a historical state of the control area over a first state time period using the stored model of dynamics of the control area, and defining a transition of the first state of the control area as a function of control inputs. Wherein the first state of the control area includes a rotor angle and a rotor frequency for each generator in the control area. Further, wherein the control inputs include one or combination of phase angles on the buses of the control area, a mechanical input to each generator in the control area, and power consumptions at the buses in the control area. Update the estimated first state of the control area according to the stored measurement model of the control area, by connecting measurements of the rotor frequency of each generator in the control area and a weighted combination of measurements of the voltage phase angles on the buses of the control area and some neighboring buses of the neighboring control areas, with the rotor angle and the rotor frequency of each generator in the control area, to obtain a second state of the control area over a second state time period later than the first state time period. Detect the anomalies based on a statistic deviation of the second state from its corresponding prediction derived from the first state of the control area.


According to another embodiment of the disclosure, a detector for detecting anomalies in a control area of an electric power system (EPS) with multiple control areas. The control area includes a set of generators in communication with a set of buses and some neighboring buses of neighboring controls area of the control system. The detector includes acquiring a plurality of measurements from sensors configure for sensing the set of generators and the set of buses over a first state time period. Acquiring a respective second plurality of measurements from sensors configure for sensing the set of generators and the set of buses over a second state time period. At least one processor having a computer readable memory configured to receive the plurality of measurements sensed by the sensors over the first state time period. Estimate a first state of the control area from a historical state of the control area over the first state time period using a model of dynamics of the control area, and defining a transition of the first state of the control area as a function of control inputs. Wherein the first state of the control area includes a rotor angle and a rotor frequency for each generator in the control area, wherein the control inputs include one or combination of phase angles on the buses of the control area, a mechanical input to each generator in the control area, and power consumptions at the buses in the control area. Receive the plurality of measurements sensed by the sensors over the second state time period. Update the estimated first state of the control area according to a measurement model of the control area, by connecting sensed measurements of the rotor frequency of each generator in the control area and a weighted combination of sensed measurements of the phase angles on the buses of the control area and some neighboring buses of the neighboring control areas, with the rotor angle and the rotor frequency of each generator in the control area, to obtain a second state of the control area over the second state time period later than the first state time period. Detect the anomalies based on a statistic deviation of the second state of the control area from its corresponding prediction derived from the first state of the control area.


Further features and advantages of the present disclosure will become more readily apparent from the following detailed description when taken in conjunction with the accompanying Drawing.





BRIEF DESCRIPTION OF THE DRAWINGS

The present disclosure is further described in the detailed description which follows, in reference to the noted plurality of drawings by way of non-limiting examples of exemplary embodiments of the present disclosure, in which like reference numerals represent similar parts throughout the several views of the drawings. The drawings shown are not necessarily to scale, with emphasis instead generally being placed upon illustrating the principles of the presently disclosed embodiments.



FIG. 1A is a schematic of a power network in which anomalies and/or cyber-physical attacks are detected, according to one embodiment of the present disclosure;



FIG. 1B is a schematic for partitioning the power network into multiple control areas that anomalies and/or cyber-physical attacks are detected independently for each control area with limited communications with neighbors, according to one embodiment of the present disclosure;



FIG. 1C is a schematic for a measurement configuration of the power network, according to some embodiments of the present disclosure;



FIG. 2A is a schematic block diagram of an example of a control system that may be used with one or more embodiments described herein, according to some embodiments of the present disclosure;



FIG. 2B is a block diagram of a method for distributed estimation and detection of anomalies in an electric power system (EPS), according to one embodiment of the present disclosure;



FIG. 2C is a schematic of an exemplar EPS controlled system, according to some embodiments of the present disclosure;



FIG. 3A is a schematic block diagram for distributed estimation and detection of cyber-physical attacks for predetermined period of covariance matrix update, according to some embodiments of the present disclosure;



FIG. 3B is a schematic block diagram for determining local area attack statistic and declare possible attack, according to some embodiments of the present disclosure;



FIG. 4A is a schematic histogram of the local attack statistic for Area I, dI before attack at area I, according to some embodiments of the present disclosure;



FIG. 4B is a schematic histogram of the local attack statistic for Area I, dI during attack at area I, according to some embodiments of the present disclosure;



FIG. 4C is a schematic histogram of the local attack statistic for Area I, dI after attack at area I, according to some embodiments of the present disclosure;



FIG. 4D is a schematic histogram of the local attack statistic for Area IV, dIV before attack at area I, according to some embodiments of the present disclosure;



FIG. 4E is a schematic histogram of the local attack statistic for Area IV, dIV during attack at area I, according to some embodiments of the present disclosure; and



FIG. 4F is a schematic histogram of the local attack statistic for Area IV, dIV after attack at area I, according to some embodiments of the present disclosure.





While the above-identified drawings set forth presently disclosed embodiments, other embodiments are also contemplated, as noted in the discussion. This disclosure presents illustrative embodiments by way of representation and not limitation. Numerous other modifications and embodiments can be devised by those skilled in the art which fall within the scope and spirit of the principles of the presently disclosed embodiments.


DETAILED DESCRIPTION

The following description provides exemplary embodiments only, and is not intended to limit the scope, applicability, or configuration of the disclosure. Rather, the following description of the exemplary embodiments will provide those skilled in the art with an enabling description for implementing one or more exemplary embodiments. Contemplated are various changes that may be made in the function and arrangement of elements without departing from the spirit and scope of the subject matter disclosed as set forth in the appended claims.


Specific details are given in the following description to provide a thorough understanding of the embodiments. However, understood by one of ordinary skill in the art can be that the embodiments may be practiced without these specific details. For example, systems, processes, and other elements in the subject matter disclosed may be shown as components in block diagram form in order not to obscure the embodiments in unnecessary detail. In other instances, well-known processes, structures, and techniques may be shown without unnecessary detail in order to avoid obscuring the embodiments. Further, like reference numbers and designations in the various drawings indicated like elements.


Also, individual embodiments may be described as a process which is depicted as a flowchart, a flow diagram, a data flow diagram, a structure diagram, or a block diagram. Although a flowchart may describe the operations as a sequential process, many of the operations can be performed in parallel or concurrently. In addition, the order of the operations may be re-arranged. A process may be terminated when its operations are completed, but may have additional steps not discussed or included in a figure. Furthermore, not all operations in any particularly described process may occur in all embodiments. A process may correspond to a method, a function, a procedure, a subroutine, a subprogram, etc. When a process corresponds to a function, the function's termination can correspond to a return of the function to the calling function or the main function.


Furthermore, embodiments of the subject matter disclosed may be implemented, at least in part, either manually or automatically. Manual or automatic implementations may be executed, or at least assisted, through the use of machines, hardware, software, firmware, middleware, microcode, hardware description languages, or any combination thereof. When implemented in software, firmware, middleware or microcode, the program code or code segments to perform the necessary tasks may be stored in a machine readable medium. A processor(s) may perform the necessary tasks.


Definition of Terms

We use vk to denote the k-th entry of a vector v, and the (i,j)-th entry of a matrix M is given by Mij. The i-th row of a matrix M is denoted Mi. The transpose of a vector or matrix X is denoted by XT. The inverse of a matrix M is denoted by M−1. The entry-wise matrix multiplication is denoted ⊗. A matrix M is positive definite is denoted Mcustom-character0, and Acustom-characterB means A−Bcustom-character0.


The present disclosure is directed to dynamic state estimation in electric power systems (EPS), for detecting anomalies in control areas of a control system having multiple control areas. In particular, the detection of anomalies in a single control area positioned within a multiple of neighbouring control areas in the control system that takes into account both process and measurement anomalies.


Specifically, the present disclosure is based on realizing that dynamics of the control area can be decoupled if the phase angles on the buses are treated as control inputs to a model of dynamics of the control area defining a transition of the state of the control area as a function of control inputs. At least one aspect regarding the decoupling dynamics of the control area from the control system, is that it allows for detecting anomalies within an individual control area rather than for the entire control system. Thus, by avoiding centralized processing, and focusing on a single control area we make it more difficult for cyber-attackers to stage a global attack on the entire control system.


The methods and systems of the present disclosure are also based on that the state of generators can be estimated according to a measurement model of the first control area, i.e. control area, connecting measurements of the rotor frequency of each generator and measurements of the voltage phase angles on the buses of the control area with the rotor angle and the rotor frequency of each generator of the control area. For example, we estimate a first state of the control area from a historical state of the control area over a first state time period using a model of dynamics of the control area.


In order to determine a transition of the first state of control area we use a function of control inputs, where the state of the control area includes a rotor angle and a rotor frequency for each generator in the control area. Based on the control inputs including one or combination of phase angles on the buses of the control area and neighbouring border buses, a mechanical input to each generator in the control area or power consumptions at the buses in the control area. In other words, we are essentially tracking the dynamic relationship between local states and local operational measurements to detect the anomalies or cyber-attack in a distributed fashion.


We then update the estimated first state of the control area according to a measurement model of the control area, by connecting measurements of the rotor frequency of each generator in the control area and measurements of the weighted phase angles on the buses of the control area, with the rotor angle and the rotor frequency of each generator in the control area, to obtain a second state of the control area over a second state time period later than the first state time period. Lastly, we detect the anomalies based on a statistic deviation of the second state of the control area from its corresponding prediction derived from the first state of the control area.


Formulation for State Space Model and Attack Detection of a Power System


FIG. 1 is a schematic of a power network in which anomalies and/or cyber-physical attacks are detected, according to one embodiment of the present disclosure. The system includes a set of generators 110, 140 and connected to a set of loads 130, 139 through transmission lines 150, 160. A generator 110, or load 130 is connected to the system through a bus 120, and a line 150 is connected to the system through two terminal buses.


The neighbourhood distance is used in the present disclosure to determine the communication requirements between generators or portions of power system. The distance of neighbourhood, that is the distance between a pair of neighboring generators or loads in term of number of hops, is measured by the number of connected branches residing in the path between the neighboring buses that the generators or loads connect to. For example, generator 110 is connected to generator 140 through 3 transmission lines, 150, 160 and 170, therefore generator 110 and generator 140 is 3-hop neighbors.


The power system is partitioned to be a set of control areas in the present disclosure. Two adjacent control areas may have common transmission lines, but there are no overlapping buses between two control areas.



FIG. 1B is a schematic for partitioning the exemplar power network into multiple control areas that cyber-physical attack detected independently for each area with limited communications with neighbors. In FIG. 1B, the original power system as shown in FIG. 1A is partitioned 4 control areas, including area I, 155, area II, 165, area III, 175 and area IV, 180.


The anomalies and/or cyber-physical attacks are detected based on dynamic state estimation of the power system. The state estimation may use a set of measurements or input information acquired by a set of sensors from the system.



FIG. 1C is a schematic for measurement configuration of the power system, according to embodiments of the present disclosure. The measurements may include the rotor frequencies of generators, 159, and voltage phase angles of buses 169. The generator mechanical inputs of generators, 179 and load power consumption at buses, 189 can also be available for estimating system states and detecting anomalies.



FIG. 2A is a schematic block diagram of an example of a control system 200 that may be used with one or more embodiments described herein. The control system 200 may comprise of at least one processor 201, and a memory 215 connected to the processor 201, as well as a set of sensors 230. Further, the control system 200 includes communication from neighbouring control areas 225 regarding neighbouring areas' states and attributes. Contemplated may include one or more network interfaces (e.g., wired, wireless, PLC, etc.) used with the system. Also contemplated may bet at least one power supply (i.e. battery, plug-in, etc.) may be used with the control system.


Still referring to FIG. 2A, the memory 215 can be implemented within the processor 201 and/or external to the processor 201. In some embodiments, the memory 215 stores historical states of generators and buses of EPS including a first control area, received neighbouring control area states and attributes and determined control inputs of the first control area.


Similarly, the memory 215 can store the state dynamic model 220, measurement model 240, anomaly detection model 250, and/or instructions to the processor 201 of how to use the state dynamics model 220, measurement model 240 and anomaly detection model 250. For example, in various embodiments, the processor 201 determines estimations of the updated generator rotor angles and frequencies corresponding to the updated current state using the measurement model that relates the measurements to state variables.


Still referring to FIG. 2A, in some embodiments, the processor 201 can include functionality blocks including a state dynamics model block 220, a measurement model block 240, and an anomaly detection model block 250. The data receiving, estimation execution, and results transmitting can be implemented in the processor 201.


Further, the processor 201 may comprise hardware elements or hardware logic adapted to execute software programs and manipulate data structures. The memory 215 may include an operating system, portions of which can typically resident in memory 215 and executed by the processor 201, functionally organizes the control system by, inter alia, invoking operations in support of software processes and/or services executing on the device.


As may be apparent to those skilled in the art that other processor and memory types, including various computer-readable media, may be used to store and execute program instructions pertaining to the techniques described herein. Also, while the description illustrates various processes, contemplated may be that various processes can be embodied as modules configured to operate in accordance with the techniques herein (e.g., according to the functionality of a similar process). Further, while the processes have been shown separately, those skilled in the art will appreciate that processes may be routines or modules within other processes.


Still referring to FIG. 2A, the set of sensors 230 can include phasor measurement units which provide measurements for voltage phase angle for a bus. The sensors 230 can also include remote measurement units which provide the rotor frequency for a bus.


The system 200 can also include a screen or display 270. In some embodiments, the result of the anomaly detection can be rendered on the display 270 or submitted to different applications that can be internal or external to the system. For example, the results can be sent to a real-time security control and prevention application which can be added to the processor 201.



FIG. 2B is a block diagram of a method 202 for distributed estimation and detection of anomalies in an electric power system (EPS), according to one embodiment of the present disclosure. The method including partitioning the EPS into multiple neighbouring control areas 207, wherein the multiple neighbouring control areas include a first control area. Further, estimating current states of generators in the first control area using the states of the generators via a state dynamics model 221 of the generators of the first control area, wherein the states of the generators is from historical data of the EPS 209. Further, receiving, over a communication channel, a current state and attribute of at least some of neighbouring buses located in the neighboring control areas 226. Wherein the neighbouring buses are the buses of neighbouring control areas that connects to at least one boarder bus of the first control area via at least one transmission line within pre-determined neighbourhood distance. Determining measurements of states from generators and buses in the first control area 233. Then, updating the current state of the generators in the first control area using a measurement model 236 on a basis of the estimated current states of the generators in the first control area, the received states and attributes from the neighbouring control areas, and the measurements of states from at least some generators and buses in the first control area. Finally, determining anomaly based on statistic of deviation of measurement from the states of first control area using anomaly detection model 261, so as to update the current state and anomaly status 272. Wherein at least some steps of the method are performed by one or more processor and the updated current state and detection results may be displayed on a display, i.e. monitor or some other related electronic display device.



FIG. 2C shows a schematic of an exemplar EPS controlled according to one embodiment of the present disclosure. The power generation facilities 110 are coupled to substations 120. Associated with substations 120 is a regional control module 276. The regional control module manages power production, distribution, and consumption within its region. Also associated with each region are industrial/commercial/residential loads 130 representative of industrial plant or large commercial enterprises or residential loads. According to some embodiments of the disclosure, each regional control module 276 using one or more applications is operable to manage the power production and distribution within its region, and monitoring the healthy and security status of the region of grid under its control.


In some implementations, power producing entity, such as the power generation plants 110, interfaces with the regional grid via a local control module 272. The local control module 272 can standardize control command responses with each of the plurality of power providers. By offering to the regional control module 276 a standardized response from each of the plurality of power producing entities, the regional control module can actively manage the power grid in a scalable manner. The regional control module 276 is further aware of the electricity producing capacity within the region and the limitations to the power grid. The regional control module 276 understands topology with respect to the power providers and power consumers and its own ability to distribute the power.


Each regional control module 276 is communicatively coupled to a control system 277 via, e.g., a wide area network 274. The wide area network can be the Internet or other means to communicate data among remote locations. Additionally, or alternatively, the data can be exchanged between the control system 277 and the regional control modules 276 via a local area network or Intranet. To that end, the control system 277 includes a transceiver 280 for exchanging data between the control system and regional control modules 276 via the network 274. Also, control system 277 includes one or several processors 211A and 211B to balance amounts of electricity passing through an electrical grid.


The control system 277 is operable to manage the interaction of several regional control modules 276 and the power providers under their control. As previously described, each regional control module 276 using applicable applications can dynamically manage the power consumers and power providers within its control. As demand within a certain region managed by a regional control module 276 increases or decreases, the regional control module 276 needs to act to compensate for power production within a particular region. To that end, the regional control module 276 makes a decision about supplying or requesting the electricity from the grid. The control system 277 receives, transmits or retransmits such request to balance amount of electricity going in or off the grid.


Different embodiments of the disclosure monitor one or combination of the voltage phase angles on the buses of the EPS and/or the rotor frequencies of generators in the EPS. For example, one embodiment determines anomalies from the updated states of the EPS, and then the control system 277 can issue a command to the regional control module 276 to control their production or loads or network topology accordingly. For example, the regional control module 276 can issue a command to a local control module 272 of a generation facility 110 to block its automatic generation control to avoid executing incorrect load flowing function, when an anomaly 15 found.


Structure-Preserving Model

Consider a power system that includes a set of {1, 2, . . . , n} buses and a set of transmission lines connecting between the buses. Let the subset of buses with generators be denoted G with |G|=ng. Let the subset of buses with loads be denoted D with |D|=nd, and ng+nd=n.


Assumed that the transient voltage behind its internal reactance of a generator at bus i, i∈G is constant, then the dynamics of the generator can be described as:













δ
.

i



(
t
)


=


ω
i



(
t
)



,







M
i





ω
.

i



(
t
)



=



P
i
G



(
t
)


-




E
i



V
i



Z
i




sin


(



δ
i



(
t
)


-


θ
i



(
t
)



)



-


D
i




ω
i



(
t
)





,




(
1
)







where Ei and δi are the internal voltage magnitude and the rotor angle of generator at bus i, Mi, Di and Zi are the inertia, the damping coefficient and the transient reactance of generator at bus i, Vi and θi are the voltage magnitude and the phase angle of bus i, PiG is the equivalent power injections of mechanical power input of generator at bus i.


The power flow equation at generator bus i, i∈G is as follows:











P
i
D

=





E
i



V
i



Z
i




sin


(


θ
i

-

δ
i


)



+




j
=
1

n




V
i



V
j



Y
ij
B



sin


(


θ
i

-

θ
j


)




+




j
=
1

n




V
i



V
j



Y
ij
G



cos


(


θ
i

-

θ
j


)






,






Q
i
D

=



1

Z
i




V
i
2


-




E
i



V
i



Z
i




cos


(


θ
i

-

δ
i


)



+




j
=
1

n




V
i



V
j



Y
ij
G



sin


(


θ
i

-

θ
j


)




-




j
=
1

n




V
i



V
i



Y
ij
B



cos


(


θ
i

-

θ
j


)






,




(
2
)







where, PiD and QiD are the equivalent active and reactive power injections for power demands of generator bus i, YijG and YijB are the elements of bus conductance matrix and bus susceptance matrix at the row corresponding to bus i and the column corresponding to bus j.


Analogously, for any load bus i, i∈D (i.e. i∉G), the power flow equation at the bus is











P
i
D

=





j
=
1

n




V
i



V
j



Y
ij
B



sin


(


θ
i

-

θ
j


)




+




j
=
1

n




V
i



V
j



Y
ij
G


cos


(


θ
i

-

θ
j


)





,






Q
i
D

=





j
=
1

n




V
i



V
j



Y
ij
G



sin


(


θ
i

-

θ
j


)




-




j
=
1

n




V
i



V
j



Y
ij
B



cos


(


θ
i

-

θ
j


)






,




(
3
)







It can be assumed for a practical power system that all angular differences for each generator and line are small, the resistance at each transmission lines is ignorable, and the voltage at each generator or generator is close to its nominal rated value, and therefore we can have: sin(δi−θi)≈δi−θi, cos(δi−θi)≈1, sin(θi−θj)≈θi−θi, cos(θi−θj)≈1, YijG=0 and Ei=Vi=1 per unit. With these assumptions, the equations (1)-(3) can be linearized around the network steady state condition to yield following the dynamic linearized swing equation and the algebraic DC power flow equation:














δ
.

i



(
t
)


=


ω
i



(
t
)



,

i

G











M
i





ω
.

i



(
t
)



=



-

1

Z
i






δ
i



(
t
)



-


D
i




ω
i



(
t
)



+


1

Z
i





θ
i



(
t
)



+


P
i
G



(
t
)




,

i

G









0
=



1

Z
i





δ
i



(
t
)



-


1

Z
i





θ
i



(
t
)



-




j
=
1

n




Y
ij
B



(



θ
i



(
t
)


-


θ
j



(
t
)



)



+


P
i
D



(
t
)




,

i

G









0
=


-




j
=
1

n




Y
ij
B



(



θ
i



(
t
)


-


θ
j



(
t
)



)




+


P
i
D



(
t
)




,

i

G

,





(
4
)







Equation (4) is usually called as the linearized structure-preserving model. It can be also expressed in compact form as:












[



I


0


0




0



M
INER



0




0


0


0



]




X
.



(
t
)



=



-

[



0



-
I



0





L
GG




D
DAMP




L
GD






L
DG



0



L
DD




]




X


(
t
)



+


[


0
T








P
G



(
t
)









P
D



(
t
)



]

T



,




(
5
)







where MINER and DDAMP are diagonal matrices, MiiINER=Mi, DiiDAMP=Di; PG (t)=└P1G (t), . . . , PngG(t)┘, and PD(t)=[P1D(t), . . . , PnD(t)]. The state X(t)=[δ(t)T ω(t)T θ(t)T] consists of the rotor angle δ and rotor frequency ω at every generator and the voltage phase angle θ at every bus. The matrix






L
=

[




L
GG




L
GD






L
DG




L
DD




]





is a Laplacian matrix with a sparsity structure related to the underlying network. We note that LGG is a diagonal matrix,








L
ii
GG

=

1

Z
i



,

L
DD





is related to the bus susceptance matrix,







L
ii
DD

=

{











j
=
1

,

j

i


n



Y
ij
B


+

1

Z
i



,




i

G











j
=
1

,

j

i


n



Y
ij
B


,




i

G




,


L
ij
DD

=



-

Y
ij
B







and






L
GD


=


(

L
DG

)

T



,






L
ij
GD

=

{





-

1

Z
i







j
=
i

,

i

G






0


otherwise



.









The control input U(t)=[0T PG(t) PD(t)]T is given by the mechanical power input at the generators, PG, and the electrical power demand at each bus, PD, including those connected to a generator.


For a practical application, there exist both process and measurement noise. Additionally, the measurements are taken to be a discrete-time process rather than a continuous time process, which is more realistic for digitally sampled systems. The process noise v(t) and measurement noise n[k] are assumed to be Gaussian noise processes. With the introduction of noise, we cannot apply a deterministic filter for attack detection. For the noisy setting, we appeal to Kalman filtering techniques. However, since the dynamic system matrix in (5) is a singular matrix, the dynamic model in (5) is not directly applicable for Kalman filtering. One solution is to eliminate θ from the state dynamics through the equation





θ(t)=(LDD)−1(PD(t)−LDGδ(t)).  (6)


Although LDD is sparse, its inverse is not, which leads to a coupling of the dynamics for ω(t) amongst all generators that is not present in the original formulation (5). Such a global coupling makes developing a distributed solution with reasonable communication requirements infeasible.


Dynamic Model

To solve the problem described above, we treat the bus voltage phase angle as a control input rather than eliminating it from the dynamics. The state given by the generator variables can be described as:






x(t)=└x1(t)x2(t) . . . xng(t)┘T,  (7)






x
i(t)=[δi(ti(t)]T.  (8)


The dynamics for the generator can be described as follows:













δ
.

i



(
t
)


=



ω
i



(
t
)


+


v

δ
i




(
t
)




,




(
9
)










ω
.

i



(
t
)


=




-
1



M
i



Z
i






δ
i



(
t
)



-



D
i


M
i





ω
i



(
t
)



+


1

M
i




(



P
i
G



(
t
)


+


1

Z
i





θ
i



(
t
)




)


+


v

ω
i




(
t
)




,




(
10
)







where vδi(t) and vωi(t) are the process noises on δi and ωi, respectively. Therefore, these equations can be collected in matrix-form:





{dot over (x)}(t)=Āx(t)+u(t)+v(t),  (11)


where Ā is block diagonal, and its non-zero entries are set as:









A
_



(




δ
.

i



(
t
)


,


ω
i



(
t
)



)


=
1.0

,







A
_



(




ω
.

i



(
t
)


,


δ
i



(
t
)



)


=


-
1



M
i



Z
i




,







A
_



(




ω
.

i



(
t
)


,


ω
i



(
t
)



)


=



D
i


M
i


.






The control input is










u


(
t
)


=






u

δ
1




(
t
)









u

ω
1




(
t
)















u

δ

n
g





(
t
)









u

ω

n
g





(
t
)





.





(
12
)









u

δ
i




(
t
)


=
0

,



u

ω
i




(
t
)


=


1

M
i





(



P
i
G



(
t
)


+


1

Z
i





θ
i



(
t
)




)

.







(
13
)







The process noise is assumed to be v(t)˜N(0, Q) and uncorrelated in time. After digital sampling with sampling period T, the continuous-time dynamic system is converted to a discrete-time system:











x


[

k
+
1

]


=


Ax


[
k
]


+

Bu


[
k
]


+

v


[
k
]




,




where




(
14
)







A
=

e

TA
_



,

B
=



0

T
_





e

τ






A
_




d





τ



,




(
15
)







and v[k]˜N(0, Q). The sampled process noise covariance matrix Q is related to the un-sampled covariance matrix Q via









Q
=



0

T
_





e


A
_


τ




Q
_



e



A
_

T


τ



d






τ
.







(
16
)







To evaluate the integrals in (15)-(16), we use a second-order approximation:







A


I
+

TA
_

+




T
_

2


2
!





A
_

2




,





B




T
_


I

+




T
_

2


2
!




A
_




,





Q



TQ
_

+




T
_

2


2
!





(


AQ
_

+


QA
_

T


)

.








The voltage phase angles are usually measured by a Phasor Measurement Unit (PMU). Since the sampling rate of the PMUs is high enough to track the system dynamics, we assume the second-order approximation is accurate.


Measurement Model

The measurements used in this present disclosure include the measurements of the generator rotor frequencies ω, and the measurements of the bus voltage phase angles θ. Similar to the dynamics, using θ directly in the measurement equations yields the following measurement model:





{circumflex over (ω)}i[k]=ωi[k]+nωi[k],  (17)





{circumflex over (θ)}ik[k]=[−(LDD)−1LDG]iδ[k](LDD)i−1PD[k]+nθi[k],  (18)


where, PD[k] is a known input. This formulation is not desirable for distributed processing since (LDD)−1 couples the measurement of the phase angle {circumflex over (θ)} at any given bus to the rotor angle δ at all generators and the electrical power demand PD at all buses. We handle this by instead considering measurement of





{circumflex over (θ)}i*[k]≙LiDD{circumflex over (θ)}[k]−PiD[k]  (19)


The relation to the state is:











θ
i
*



[
k
]


=



1

Z
i





δ
i



[
k
]



+


n

θ
i
*




[
k
]







(
20
)







where nθi*[k] is the measurement noise.


Let y[k]=[y1[k] . . . yn[k]]T, where yi[k] is the measurement set local to bus i, and defined as:











y
i



[
k
]


=

{







[




ω
^

i



[
k
]










θ
^

i
*



[
k
]



]


i


G










θ
^

i
*



[
k
]



i


G




,






(
21
)







We can have the following decoupled measurement model:






y[k]=Hx[k]+n[k].


The measurement matrix, H can be decoupled (i.e. block diagonal), since the measurements yi involve only local variables ωi and δi as shown in equations (17) and (20). The non-zero elements for the measurement matrix H are:








H


(



ω
^

i

,

ω
i


)


=
1.0

,






i


G





and






H


(



θ
^

i
*

,

δ
i


)




=

1

Z
i



,

i


G
.






This new formulation maintains the original sparse, localized coupling inherent to power systems rather than a global coupling. The quantity θi* in (19) is a linear combination of voltage phase angles at neighboring buses and thus can be calculated in a distributed fashion with limited communication, since LiDD only have non-zero element for the entry corresponding to the buses that have direct connection with bus i. Furthermore, only the local electric power demand PiD is needed at each bus rather than the global PD.


However, measurement of θ* introduces the following complication. The measurement noise is Gaussian with nω˜N(0,Rω) and nθ˜N(0, Rθ), where Rω and Rθ are assumed to be diagonal. However, Rθ*=LDDRθ(LDD)T is not diagonal. Rθ* introduces coupling and communication requirements that depend on neighboring rather than global information. The sparsity pattern of LDD is the same as the adjacency matrix of the underlying network. The matrix LijDD is nonzero if and only if bus i and bus j are neighbors, and [LDDRθ(LDD)T]ij is nonzero if and only bus i and bus j are at most 2-hop neighbors. In summary, we have a new formulation that transfers all of the coupling to the measurement covariance matrices and process-measurement covariance.


Kalman Filtering with Correlated Process and Measurement Noise


Due to the presence of θ as a control input in (13) and in the measurements in (19), the process noise v[k] is correlated with the measurement noise n[k+1]. Let






E{v[k]n[j]
T
}
custom-character

j,k+1,  (22)


where δ is the Kronecker delta, that is δ is 1 if j equals to (k+1), and 0 otherwise. Before discretization the control input to δi is zero, and the control input to ωi depends only on θi. After discretization, the matrix B in (15) is block-diagonal introducing a coupling between uδi and θi. Therefore, we specify C to have non-zero entries only at:






C(uδi,{circumflex over (θ)}j*) if j=i or j∈Ni






C(uωi,{circumflex over (θ)}j*) if j=i or j∈Ni.


Ni is the set of 1-hop neighboring buses of bus i.


The Kalman gain and state covariance estimation update formulas with process and measurement noise correlated according to c are given below:






{circumflex over (x)}

[k]=A{circumflex over (x)}
+
[k−1]+Bu[k−1],  (23)






P

[k]=AP
+
[k−1]AT+Q.  (24)






{circumflex over (x)}
+
[k]={circumflex over (x)}

[k]+K[k](y[k]−H{circumflex over (x)}[k]),  (25)






S[k]=HP

[k]H
T
+HC+C
T
H
T
+R,  (26)






K[k]=(P[k]HT+C)S[k]−1,  (27)






P
+
[k]=P

[k]−K[k](HP[k]+CT).  (28)


Equations (23) and (24) represent the dynamic update step, in which the estimated state, {circumflex over (x)}+[k−1], and estimated covariance, P+[k−1], are updated according to the system dynamics.


Equations (25)-(28) represent the measurement update step, in which the predicted state estimate, {circumflex over (x)}[k], and the predicted covariance estimate, P[k], are updated with the measurements to produce the current estimate, {circumflex over (x)}+[k] and P+[k].


Cyber-Physical Attack Model and Detection

The vectors f1 and f2 are introduced into state space model to represent additive state and measurement anomaly, or attack vectors, respectively:






x[k+1]=Ax[k]+Bu[k]+v[k]+f1[k],  (29)






y[k]=Hx[k]+n[k]+f
2
[k].  (30)


In terms of hypothesis testing, the aim of the present disclosure is to distinguish between






H
0(No Attack, or Anomaly):∀k,f1[k]=0,f2[k]=0






H
1(Attack, or Anomaly):There exist {k*} for which f1└k*┘≠0,f2└k*┘≠0.  (31)


Bad data from a faulty sensor can be viewed as one particular attack, or anomaly in this framework.


Our criterion for detecting attacks or anomalies is a statistic based on the output of the dynamic state estimation. It is assumed that the attack, or anomaly vectors f1 and f2 in Equations (29)-(30) are unknown. A sliding window attack statistic is proposed based on the measurement residual. The global attack statistic at time k is defined as follows:











d


[
k
]


=




j
=

k
-
w
+
1


k





γ
T



[
j
]





S

-
1




[
k
]




γ


[
j
]





,




(
32
)







where the sliding window is of length w and m is the number of measurements. The measurement residual, i.e. Kalman innovation, is a zero mean Gaussian random variable, and the statistic d[k]˜χ2 (win) is a chi-squared random variable with wm degrees of freedom. This is due to the fact that the covariance matrix of global innovation γ[k] is equal to S[k].


This fact can be proven as follows: the global innovations covariance matrix can be defined as:















E


[


γ


[
k
]





γ
T



[
k
]



]


=

E





(


y


[
k
]


-

H




x
^

-



[
k
]




)




(


y


[
k
]


-

H




x
^

-



[
k
]




)

T










(

33

a

)











=

E


{



[


H


(


x


[
k
]


-



x
^

-



[
k
]



)


+

n


[
k
]



]



[


H


(


x


[
k
]


-



x
^

-



[
k
]



)


+

n


[
k
]



]


T

}







(

33

b

)






=




HP
-



[
k
]




H
T


+
R
+

E


[


H


(


x


[
k
]


-



x
^

-



[
k
]



)





n
T



[
k
]



]


+

E






n


[
k
]





(


x


[
k
]


-



x
^

-



[
k
]



)

T



H
T




.







(

33

c

)







From equation (23) we have that











x


[
k
]


-



x
^

-



[
k
]



=


(


Ax


[

k
-
1

]


+

Bu


[

k
-
1

]


+

v


[

k
-
1

]



)

-

(


A




x
^

+



[

k
-
1

]



+

Bu


[

k
-
1

]



)






(

34

a

)












=


A


(


x


[

k
-
1

]


-



x
^

+



[

k
-
1

]



)


+

v


[

k
-
1

]




,





(

34

b

)








E


[


(


x


[
k
]


-



x
^

-



[
k
]



)




n
T



[
k
]



]


=



E


[


A


(


x


[

k
-
1

]


-



x
^

+



[

k
-
1

]



)





n
T



[
k
]



]


+

E


[


v


[

k
-
1

]





n
T



[
k
]



]



=
C


,




(
35
)







where the last line follows from the fact measurement noise at time k is uncorrelated with the measurements and state at the previous time step. Plugging into (33c), the desired result can be obtained as:






E[γ[k]γ
T
[k]]=HP

[k]H
T
+R+HC+C
T
H
T
=S[k]  (36)


Distributed Implantation of Estimation and Online Attack Detection

According to embodiments of the present disclosure, the attack detection is implemented jointly with distributed dynamic state estimation. The distributed and dynamic nature of the invented method facilitates detecting attacks in an online fashion as new measurements become available, making this particularly attractive for monitoring the health of critical cyber-physical systems, such as power grids. In addition to eliminating the need for communication with a centralized control center, each control area is solved as a problem of reduced dimension with respect to the original global problem. In this aim, local states and local measurements are used for each control area.


As shown in Equation (27), the Kalman filtering needs an inversion for the innovations covariance matrix S[k]. In order to achieve distributed implementation of dynamic state estimation, it is solved using an iterative (distributed) inversion method instead of a direct (centralized) inversion method. To avoid using full communication scheme that is all generators communicate with each other, a proximity-based limited communication scheme, i.e. l-hop communication is used. That is only generators at most l-hops away communicate with each other. The parameter l is a pre-determined neighborhood distance.


Distributed Dynamic State Estimation

The present disclosure uses a criterion for detecting attacks that is a statistic based on the output of dynamic state estimation. Dynamic state estimation is distributed solved for each control area using local state and measurement models and limited communications with adjacent control areas.


Assumed the network buses are partitioned into a set of N control areas. The state local to control area I is the generator rotor angle and frequency at the buses in the control area I, xI=[δI ωI]T. There is no overlap between states of neighboring areas.


The measurements local to control area I, yI are the frequencies of all generators contained in the control area and the weighted phase angles θI* at buses contained in the control area. Based on the characteristics of matrix LDD, the θI* for the border buses of control area I depends on measurements of phase angles at neighboring buses at neighboring control areas, so control area I needs exchanging the measurements of neighboring buses with their neighboring control areas.


One remarkable feature of the Kalman filter is that the estimated covariance matrices, such as P[k], P+[k] and S[k] do not depend on the measurements. Therefore, they can be computed in advance offline. It is stressed here again that the system dynamics matrix A and measurement matrix H are both decoupled (i.e. no mixing is introduced between states in different areas). Assuming buses are labeled consecutively across control areas, therefore the state-space model can be written as:






x
I
[k+1]=AIxI[k]+BIuI[k]+vI[k],






y
I
[k]=H
I
x
I
[k]+n
I
[k]






I={1,2, . . . N}.  (37)


Since the power network is an interconnected system, it can expect that a need to exchange information between control areas. Indeed, this need is reflected in the fact that the Kalman gain K[k] is not a block-diagonal matrix. The innovation, or measurement residual, for control area I is defined as:





γI[k]custom-characteryI[k]−HI{circumflex over (x)}I[k].  (38)


The measurement update to the local estimate is then






{circumflex over (x)}
I
+
[k]={circumflex over (x)}
I
+
[k]+K
I
[k]γ[k],  (39)


where KI[k] are the rows of K[k] corresponding to control area I. Since K[k] is not a block-diagonal matrix, control area I needs to communicate the entries of γ[k] with adjacent control areas to update its local estimate {circumflex over (x)}I+±[k]. Because the formula for K[k] in (27), K[k]=(P[k]HT+C)S−1[k] contains a matrix inversion, S[k]−1, it is difficult to calculate in a distributed way if a direct inversion method is used. Instead, the present disclosure uses an iterative inversion method to achieve distributed implementation for dynamic state estimation.


Consider the linear system






S[k]β[k]=γ[k],  (40)


Then, the measurement update in (39) is given as






{circumflex over (x)}
I
+
[k]={circumflex over (x)}
I
+
[k]+(P[k]HT+C)Iβ[k]  (41)


The key to dealing with the inverse in a distributed way is to iteratively solve (40) for β[k] without explicitly calculating the inverse and use the result in (41). The present disclosure uses the damped Jacobi method to achieve a fully distributed solution to (40).


The matrix S[k] can be decomposed into the difference of a diagonal matrix, SD[k] and a matrix containing the remaining off-diagonal entries, SE[k]:






S[k]=S
D
[k]−S
E
[k].  (42)


Iteratively solving for β[k] using the damped Jacobi method amounts to finding the fixed point of





βt+1[k]=βt[k]+α(SD[k])−1(γ[k]−S[k]βt[k]),  (43)


where α is the damping parameter. Since SD[k] is diagonal, its inverse (SD[k])−1 is diagonal, and each block can be computed locally. The sparsity of S[k] determines the entries from βt[k] that need to be communicated with neighboring areas.


The damped Jacobi method in (43) can be proven to converge if the damping factor is selected according to






α
<


min
i





2







S
ii



[
k
]







j

i











S
ij



[
k
]






.






Since S[k] is the covariance matrix for the innovations, it is symmetric and positive semi-definite. Furthermore, by the standard assumptions for Kalman filtering, S[k] is an invertible matrix, thus S[k] positive definite, that is S[k]custom-character0. The damped Jacobi method can be converged if and only






0


S


[
k
]





2
α





S
D



[
k
]


.






Therefore, a sufficient condition is to choose α so that






(



2
α




S
D



[
k
]



-

S


[
k
]



)




is diagonally dominant. Diagonal dominance requires that












[



2
α




S
D



[
k
]



-

S


[
k
]



]

ii

=




(


2
α

-
1

)




S
ii



[
k
]



>




j

i







[



2
α




S
D



[
k
]



-

S


[
k
]



]

ij





=




j

i











S
ij



[
k
]







,




(
44
)







Then we can have:









α
<



2







S
ii



[
k
]







j

i











S
ij



[
k
]










i
.







(
45
)







The result utilizes the fact that Sii[k]>0 since it is the value of a variance.


Since the damped Jacobi method is iterative, an inner-loop of iterations can be introduced for each outer-loop k of the Kalman filter. The number of inner-loop iterations Tinner is a tunable parameter that can be chosen to achieve a specified tolerance on the difference between consecutive inner iterations. After completing pre-determined number of iterations, Tinner, we obtain βTinner, which is multiplied by (P[k]HT+C) in order to calculate (41). Since P[k] is in general a full matrix, in order to avoid communication between all generators, we propose the following masking approximation:






{tilde over (P)}

[k]
custom-character
N
l
⊗P

[k].  (46)


where Nl is a mask matrix for “l-hop” neighbors, and defined as:











[

N
l

]

ij



=
def



{




1
,




i
,

j





are





l


-


hop





neighbors







0
,



Otherwise








(
47
)







Thus, {tilde over (P)}ij[k] is nonzero if and only if the buses corresponding to xi and xj are at most l-hops away (e.g., direct neighbors are l-hop neighbors.) By tuning l, there is a tradeoff between accuracy of estimation and communication requirements.


The sparsity of S[k] in (26) determines the entries from βt[k] that need to be communicated with neighboring areas. We analyze the communication requirements of our distributed method in terms of the sparsity patterns of relevant matrices and the l-hop neighbor approximation in (47).


Using (43), βI is iteratively solved, then neighbors need to communicate their entries of the vector β according to the sparsity pattern of S[k]. For l≥2, using a l-hop neighbor mask in (47), the sparsity pattern of S[k] has non-zero entries only at pairs of measurements corresponding to buses that are at most l-hops away. Therefore, at most l-hop neighbor communication is needed for each control area.


This can be proved as follows: The matrix S[k] consists of the sum of four terms. Consider the sparsity pattern of the first item, H{tilde over (P)}[k]HT:











(

H




P
~

-



[
k
]




H
T


)

ij

=





m







H


θ
i
*

,
m






l









P
~


m





l

-



[
k
]




H


ω
j

,
l










                     


(
49
)







=






m







H


θ
i
*

,
m






P
~


m
,

ω
j





[
k
]




=


H


θ
i
*

,

δ
i







P
~



δ
i

,

ω
j





[
k
]











(
50
)








For concreteness, take row i of H to correspond to the measurement θi* and take row j to correspond to the measurement {circumflex over (ω)}j.











(

H




P
~

-



[
k
]




H
T


)

ij

=



m







H
im





l









P
~


m





l

-



[
k
]





H
jl

.









(
48
)







is nonzero if and only if {tilde over (P)}δij is not zero. From the definition of l-hop mask in (47), this is equivalent to having bus i and bus j be at most l-hop neighbors. A similar argument follows for the other measurement types. In conclusion, the calculation of (H{tilde over (P)}[k]HT) requires l-hop neighbor communication. In contrast, without the masking approximation, the estimate of the state covariance matrix P is full, and each generator would need to communicate with every other generator. The second item is the measurement noise covariance matrix:










R
=

[




R
ω



0




0




L
DD





R
θ



(

L
DD

)


T





]


,




(
51
)







where Rω and Rθ are assumed to be diagonal. The entry LijDD is nonzero if and only bus i and bus j are 1-hop neighbors, and [LDDRθ(LDD)T]ij is nonzero if and only bus i and bus j are at most 2-hop neighbors. Therefore, R requires at most 2-hop neighbor communication. The third and fourth items are related to analyze the matrix HC. The entry [HC]ij is nonzero if and only if the states that measurement i depends upon have overlap with the control inputs correlated to measurement j. Measurement i can either be {circumflex over (ω)}i or {circumflex over (θ)}i* which depends on ωi or θi, respectively. From (51), a measurement of ωj is not correlated to the control inputs, so [HC]ij is zero for columns j corresponding to measurements of ω. Measurements of θi* are correlated with the control input at bus i and its 1-hop neighboring buses. Therefore, HC only requires neighbor-to-neighbor communication. The same argument holds for CTHT. In summary, at most l-hop neighbor communication is needed due to calculation of (H{tilde over (P)}[k]HT).


For Equation (41), there are additional communication requirements for calculating ({tilde over (P)}[k]HT+C) of the method, after calculating β. The sparsity of PHT is such that the columns corresponding to measurements of {circumflex over (θ)}* at a load bus are zero. In order to calculate the entry of vector └P−1[k]HTβ┘ corresponding to measurement {circumflex over (ω)}i the entries of β corresponding to the measurements of ω and θ* at all other generators are needed. If an l-hop neighbor mask is applied, then only the entries of β corresponding to measurements at generators at most l-hops away are needed. In summary, to approximately calculate local entries of the vector [P−1[k]HT+C]β, areas must communicate local entries of β with at most their l-hop neighbors.


Distributed Attack Detection

During the dynamic state estimation, the quantity βI[j]=[S−1[k]γ[j]]I is calculated locally in each control area I. Therefore no additional communication is required to calculate the local attack statistic











d
I



[
k
]


=




j
=

k
-
w
+
1


k





γ
I
T



[
j
]






β
I



[
j
]


.







(
52
)







If one had access to the global detection statistic, a classic chi-squared detection test could be used. For real-time attack detection in large networks, it is not feasible to collect








I







d
I



[
k
]






over all areas. Instead, the present disclosure proposes that each area base its attack detection on its local attack statistic information. If S−1[k] were block diagonal, then dI[k] would be distributed as a chi-squared random variable with wmI degrees of freedom, where mI is the number of measurements in area I. However, in general S−1[k] is a full matrix, and dI[k] does not have an easily characterized distribution. Instead, this invent compares the real-time local attack statistic with an analytical mean and variance of dI[k] under hypothesis H0 (No Attack) and sliding window w=1 to determine the possible cyber-attack. Using w=1, the mean and variance of the local attack statistic without an attack can be quantified as follows:
















E


[


d
I



[
k
]


]


=




i

I










l
=
1

n





S
il

-
1




[
k
]





S
il



[
k
]






,





(

53

a

)












var


[


d
I



[
k
]


]


=


E


[


d
I
2



[
k
]


]


-

(



E
[


d
I



[
k
]


)

2

,








(

53

b

)










where












E


[


d
I
2



[
k
]


]


=




i
,

j

I











l
,

m
=
1


n





S
il

-
1




[
k
]





S
jm

-
1




[
k
]





(




S
il



[
k
]





S
jm



[
k
]



+



S
ij



[
k
]





S

l





m




[
k
]



+



S
im



[
k
]





S
lj



[
k
]




)

.








(

53

c

)







Given the analytical value for the variance, a threshold τI is set such that if |dI[k]|>τI(var[dI[k]])| an attack is declared. For example, the threshold can be a multiple of Var(dI). A nice feature of the invented method is that different false alarm probabilities can be set per area based on the areas' noise characteristics, and extra information about the location is available since the local partial sums of the global attack variable is monitored in the present disclosure.


Procedure for Distributed Estimation and Attack Detection


FIG. 3A is a schematic block diagram for distributed estimation and detection of cyber-physical attacks for predetermined period of covariance matrix update; and FIG. 3B is a schematic block diagram for determining local area attack statistic and declare possible attack;


In FIG. 3A, the distributed estimation and attack detection of a power system is implemented through the following steps:


Step-310: determine the system dynamics matrix A, measurement relationship matrix H, state and measurement correlation matrix C and state covariance matrix Q and measurement covariance matrix R.


Step-320: Set the total number of time step for covariance update of attack detection K, the threshold number of multiple of no attack variance for each area I, τI, pre-determined neighborhood distance l, and initialize covariance matrix P+[0]. The threshold τI is set per area based on the areas' noise characteristics, and extra information about the location is available.


Step-330: Calculate offline the covariance matrices, including {P[k]}k=0K, {P+[k]}k=0K, and {S[k]}k=0K, and communicated to each control area according to:






P

[k]=AP
+
[k−1]AT+Q






S[k]=HP

[k]H
T
+HC+C
T
H
T
+R






P
+
[k]=P

[k]−(P[k]HT+C)S−1[k](HP[k]+CT)


Step-340: execute on-line attack detection based on a local cyber attack static for each control area for each detection step. Each time step k determines local attack statistic and declare an attack for each area following the steps described in FIG. 3B:


Step-345: Calculate predicted state estimate for each control area I at time step k:






x
I

[k]=A
I
{circumflex over (x)}
I
+
[k−1]+BIuI[k−1]


This step does not require any communication since A is block diagonal and [u]I only depends on local information.


Step-350: Read measurements for local control area and communicate with neighboring areas to get measurements for neighboring buses within 1-hop neighborhood distance in adjacent control areas.


Step-360: Iterate Tinner steps to determine covariance weight vector βI for each control area and communicate with its l-hop neighbors of covariance weight vectors during the iterations according to:





βIt+1It+α[SD[k]]I−1I−SI,I∪NIl[k]βI∪NIlt),


wherein NIl is the set of neighboring buses of buses in the control area I within l-hop neighborhood at adjacent control areas, l is a pre-determined neighborhood distance. SI,I∪NIl[k] is the entries of S[k] at rows corresponding to control area I, and columns corresponding to control area I and its l-hop neighbors, NIl. βI∪NIlt is the entries of βt corresponding to control area I and its l-hop neighbors, NIl.


Step-370: Using a neighbor-limited approximation to P[k], {tilde over (P)}[k] and communication βITinner with its l-hop neighbors, each area calculates






{circumflex over (x)}
I
+
[k]={circumflex over (x)}
I

[k]+({tilde over (P)}[k]HT+C)I,I∪NIlβI∪NIlTinner.


wherein {tilde over (P)}ij[k] is nonzero and equals to Pij[k], if and only if the buses corresponding to xi and xj are at most l-hops away. ({tilde over (P)}[k]HT+C)I,I∪NIl is the entries of ({tilde over (P)}[k]HT+C) at rows corresponding to control area I, and columns corresponding to control area I and its 1-hop neighbors, NIl.


Step-380: Use βI to update the local attack detection statistic dI[k]:









d
I



[
k
]


=




j
=

k
-
w
+
1


k





γ
I
T



[
j
]





β
I



[
j
]





,




wherein w is the length of sliding window and set as 1.


Step-390: check if |dI[k]|>τIVar(dI[k]). Var(dI[k]) is a standard variance of the local attack statistic without an attack, and defined according to:












var


[


d
I



[
k
]


]


=


E


[


d
I
2



[
k
]


]


-

(




E
[


d
I



[
k
]


)

2











E


[


d
I



[
k
]


]



=





i

I










l
=
1

n





S
il

-
1




[
k
]





S
il



[
k
]








E


[


d
I
2



[
k
]


]





=




i
,

j

I











l
,

m
=
1


n





S
il

-
1




[
k
]





S
jm

-
1




[
k
]




(




S
il



[
k
]





S
jm



[
k
]



+



S
ij



[
k
]





S

l





m




[
k
]



+



S
im



[
k
]





S
lj



[
k
]




)













wherein S−1[k] is the inverse of S[k]. If yes, an attack is declared.


Example


FIG. 4A-4F gives an example for the local attack detection statistic behavior in the system shown in FIG. 1. In each of the six figures of FIG. 4, the histogram of the attack statistic without an attack present and with an attack present is overlaid. Each event in the histogram corresponds to different values for the correlated process and measurement noise. The figures give the attack statistic at three different time steps (before, during, and after the attack) and in two different control areas. The attack is a corruption of the signal reading the power demand at bus 120 in Control Area I in FIG. 1A. The power demand at bus 120 is taken to be multiple times its regular value in the state estimation. The threshold of multiple for no-attack variance τI is 1.



FIG. 4 A-4C show the attack statistics in Control Area I, where the attack takes place. The analytic values for the mean and variance are given using the covariance matrix from our simulations. The vertical line is the analytic mean, and the dashed lines are at plus and minus 1 analytic standard deviation. As shown in the plots, before the attack the histogram for dI matches exactly with or without an attack. At the time step where the attack occurs, the variance of the statistic dI is increased with respect to the case when no attack is present.



FIG. 4D-4F show the histogram for the attack statistic dIV in neighboring control area IV. It can be seen that during the attack, the variance of dIV is only slightly increased. This points to another potential advantage of using the local attack statistic dI in (52) rather than the global attack statistic d in (32). Since the variance of the local attack statistic where the attack is taking place is increased with respect to the local statistics in other areas, this suggests that using the local attack statistic helps not only in detecting the presence of an attack but also in identifying where the attack is taking place.


Using the method described above, it can be determined that a possible attack is at control area I, but control area IV.


According to embodiments of the present disclosure a method for detecting anomalies or cyber attacks in a control system or an electric power system. The electric power system includes a set of generators and loads connected to buses, and each pair of buses are connected with branches. Wherein a voltage phase angle of each bus and a rotor frequency of each generator are measured at a pre-determined sampling frequency. Wherein the electric power system is partitioned into a set of control areas in which no common buses exist between the control areas. Wherein a mechanical power for each generator and an active power demand for each load are given for each sampling interval corresponding to the sampling frequency. The method comprising: determining a local state model and a local measurement model for each control area based on measurements at the control area and neighboring buses of adjacent control areas within a pre-determined neighborhood distance. Determining dynamic state estimations for each control area for each sampling interval using iterative inversion solution for covariance matrix and communications among adjacent control areas within the pre-determined neighborhood distance. Determining a local anomalies or cyber-attack statistic for each control area according to results of determined dynamic state estimations. Estimating the possibility for a possible anomalies or cyber attack in the control area by comparing the determined local cyber-attack statistic with a variance of measurement residuals for the control area without anomalies or cyber attack, and declaring possible anomalies, or cyber attacks, when the local statistic is greater than pre-determined multiples of non-anomalies or the non-cyber attack variance of measurement residuals.


According to aspects of the method, wherein the local state for control area I is the generator rotor angle and frequency at the generators in the control area I, xI=[δI ωI]T. Wherein xI is the vector of local states, δI and ωI are the vectors of rotor angle and frequency of all generators in the area; wherein the local measurements for control area I, yI=[{circumflex over (ω)}I θI*]T, {circumflex over (ω)}I are the rotor frequencies of all generators contained in the control area, and {circumflex over (δ)}I* are the weighted bus phase angles for all buses contained in the control area including the terminal buses of generators. Wherein the weighted bus phase angle at bus i is determined as a linear combination of voltage phase angles at neighboring buses and an local electric power demand PiD:





{circumflex over (θ)}i*custom-characterLiDD{circumflex over (θ)}−PiD,


LDD is a matrix related bus power injection to bus phase angle for all buses in the system according to the susceptances of transmission lines and transient reactance of generators in the system; LiDD is the row corresponding to bus i of matrix LDD; {circumflex over (θ)} is the vector of voltage phase angle for all buses; {circumflex over (θ)}i* is determined using measurements at the control area and measurements with their neighbors in other control areas within 1-hop neighborhood distance.


According to other aspects of the method, further comprising: determining the system dynamics matrix A, input control matrix B, measurement relationship matrix H, state and measurement correlation matrix C, state covariance matrix Q, and measurement covariance matrix R. Specifying the number of time steps for a period of covariance update K, the multiple threshold of standard variance of no-attack statistic for each control area τI, I={1, . . . ,N}, N is the total number of control areas. Calculating offline the matrices of predicted state covariance {P[k]}k=0K, estimated state covariance {P+[k]}k=0K, and innovation covariance {S[k]}k=0K for each time step k in the set of time steps of covariance update period, and communicating the matrices to each control area. Executing on-line cyber-physical attack detection based on a local cyber attack statistic for each control area I, I={1, . . . , N} at each time step k, k∈{1, 2, . . . , K}.


According to other aspects of the method, wherein the system dynamics matrix A, input control matrix B, state covariance matrix Q and measurement covariance matrix R are determined according to:







A
=

e

TA
_



,





B
=



0

T
_





e

τ






A
_




d





τ



,





Q
=



0

T
_





a


A
_


τ




Q
_



e



A
_

T


τ



d





τ



,





R
=

[




R
ω



0




0




L
DD





R
θ



(

L
DD

)


T





]


,




wherein Q is sampled process noise covariance matrix, Q is pre-determined un-sampled covariance matrix of states, T is the length of each sampling interval of phase measuring units, Ā is an un-sampled matrix of system dynamics related the state derivatives {dot over (x)}(t) with states x(t), A is a sampled matrix of system dynamics related the states at next time step with states at current time steps, Ā are set with non-zero values at









A
_

(




δ
.

i



(
t
)


,


ω
i



(
t
)



)

=
1.0

,



A
_



(




ω
.

i



(
t
)


,


δ
i



(
t
)



)


=


-
1



M
i



Z
i




,







A
_



(




ω
.

i



(
t
)


,


ω
i



(
t
)



)


=


-


D
i


M
i







ω
i



(
t
)


·

A
T








is the transpose of matrix A, B is an sampled matrix related the states with system inputs at the current time steps, Rω and Rθ are the pre-determined covariance matrices for measurements of rotor frequency and bus phase angle at all generators and all buses; wherein the state x(t) includes the generator variables for all generators, x(t)=└x1(t) x2(t) . . . xng(t)┘T, and the state for generator i is defined as xi(t)=[δi(t) ωi(t)]T, and the control input u(t) includes inputs for all generators, u(t)=└uδ1(t) uω1(t) . . . uδng(t) uωng(t)┘, and the control input corresponding to the rotor angle and frequency of the generator at bus i are defined as:









u

δ
i




(
t
)


=
0

,



u

ω
i




(
t
)


=


1

M
i




(


P
i
G

+


1

Z
i




θ
i



)



,




where ng is the number of generators in the system, Mi, Zi and PiG are the inertia, the transient reactance, and the mechanical power input of the generator at bus i; wherein the entries of measurement correlation matrix C are set with non-zero values at C(ui,δ, {circumflex over (θ)}j*) and C(ui,ω, {circumflex over (θ)}j*) if j=i or j∈Ni, Ni is the set of 1-hop neighboring buses of bus i; wherein entries of measurement relationship matrix H are set with non-zero values at H({circumflex over (ω)}ii)=1.0 and








H
(



θ
^

i
*

,

δ
i


)

=

1

Z
i



,


i

G

;





According to other aspects of the method, the matrices of predicted state covariance, estimated state covariance, and innovation covariance for time step k are determined according to:






P

[k]=AP
+
[k−1]AT+Q,






S[k]=HP

[k]H
T
+HC+C
T
H
T
+R,






P
+
[k]=P

[k]−(P[k]HT+C)S−1[k](HP[k]+CT),






k∈{1, . . . ,K};


According to other aspects of the method, determining local attack statistic and declare an attack for each area at time step k, further comprising: calculating predicted state estimate for each control area I at time step k. Reading measurements for local control area and communicate with neighboring areas to get measurements for neighboring buses within 1-hop neighbors. Iterating Tinner steps to determine covariance weight vector βI for each control area and communicate with its l-hop neighbors of covariance weight vectors during the iterations. Using a neighbor-limited approximation to P[k], {tilde over (P)}[k] and communication βITinner, with its l-hop neighbors to determine estimated state for each control area I at time step k. Using βITinner to update the local attack detection statistic dI[k]. Checking if |dI[k]|>τI(Var(dI[k])). If yes, an attack is declared.


According to other aspects of the method, wherein the predicted state estimate for each control area I at time step k are determined according to:






x
I

[k]=A
I
{circumflex over (x)}
I
+
[k−1]+BIuI[k−1]


xI[k] and {circumflex over (x)}I[k−1] are the vectors of predicted local state at time step k, and estimated local state at time step (k−1); AI and BI are the sub-matrices of system dynamics and measurement matrices corresponding to the buses of control area I, uI[k−1] is the vector of control inputs of control area I at time step (k−1);


According to other aspects of the method, wherein the weight vector of innovation covariance for control area I, βI is solved iteratively according to:





βIt+1It+α[SD[k]]I−1I−SI,I∪NIl[k]βI∪NIlt)






t={0,1, . . . ,Tinner}


wherein Tinner is the total number of iterations, SD[k] is the diagonals of matrix S[k], α is the damping parameter and determined as a value less than the minimum of







2



S
ii



[
k
]







j

i










S
ij



[
k
]









for all row i of matrix S[k]. NIl is the set of neighboring buses of buses in the control area I within l-hop neighborhood distance. SI,I∪NIl[k] is the entries of S[k] at rows corresponding to control area I, and columns corresponding to control area I and its l-hop neighbors, NIl. βI∪NIll is the entries of βt corresponding to control area I and its l-hop neighbors, NIl.


According to other aspects of the method, the estimated state for control area I is determined according to:






{circumflex over (x)}
I
+
[k]={circumflex over (x)}
I

[k]+({tilde over (P)}[k]HT+)I,I∪NIlβI∪NIlTinner.


wherein {tilde over (P)}[k] is a neighbor-limited approximation to P[k], the entry of {tilde over (P)}[k], {tilde over (P)}ij[k] is nonzero and equals to Pij[k], if and only if the buses corresponding to xi and xj are at most 1-hops away. ({tilde over (P)}[k]HT+C)I,I∪NIl, is the entries of ({tilde over (P)}[k]HT+C) at rows corresponding to control area I, and columns corresponding to control area I and its 1-hop neighbors, NIl. βTinner is determined the weight vector of innovation covariance.


According to other aspects of the method, wherein the local attack detection statistic dI[k] is determined according to:









d
I



[
k
]


=




j
=

k
-
w
+
1


k





γ
I
T



[
j
]





β
I



[
j
]





;




wherein γI[k] is the innovation vector of measurement residual determined as:





γI[k]custom-characteryI[k]−HI{circumflex over (x)}I[k]


wherein yI[k] is the vector of local measurements for control area I at time step k, {circumflex over (x)}I[k] is the vector of predicted states for control area I at time step k, w is the slide window size, and set as 1;


According to other aspects of the method, wherein the standard variance of the local attack statistic without an attack, Var(dI[k]) is determined according to:












var


[


d
I



[
k
]


]


=


E


[


d
I
2



[
k
]


]


-

(




E
[


d
I



[
k
]


)

2











E


[


d
I



[
k
]


]



=





i

I










l
=
1

n





S
il

-
1




[
k
]





S
il



[
k
]








E


[


d
I
2



[
k
]


]





=




i
,

j

I











l
,

m
=
1


n





S
il

-
1




[
k
]





S
jm

-
1




[
k
]




(




S
il



[
k
]





S
jm



[
k
]



+



S
ij



[
k
]





S

l





m




[
k
]



+



S
im



[
k
]





S
lj



[
k
]




)













Wherein S−1[k] is the inverse of innovation covariance matrix S[k] at time step k, n is the total number of buses in the system.


According to a system for detecting cyber-physical attacks in an electric power system, wherein the electric power system includes a set of generators and loads connected to buses, and each pair of buses are connected with branches. Wherein a voltage phase angle of each bus and a rotor frequency of each generator are measured at a sampling frequency. Wherein the electric power system is partitioned into a set of control areas in which no common buses exist between the control areas. Wherein mechanical power for each generator and active power demand for each load are given for each sampling interval corresponding to the pre-determined sampling frequency. The system comprising: determining a local state model and a local measurement model for each control area based on measurements at the control area and neighboring buses of adjacent control areas within 1-hop neighborhood distance. Determining dynamic state estimations for each control area for each sampling interval using iterative inversion solution for state covariance matrix and communications among adjacent control areas within the pre-determined neighborhood distance. Determining a local cyber-attack statistic according to results of determined dynamic state estimations. Declaring a possible cyber attack in the control area by comparing the determined cyber-attack statistic with a variance of measurement residuals for the control area without an attack.

Claims
  • 1. A method for detecting anomalies in a control area of a control system with multiple control areas, wherein the control area includes a set of generators in communication with a set of buses and some neighboring buses of neighboring controls area of the control system, comprising: accessing a memory in communication with at least one processor, wherein the memory includes stored historical states of the control area;estimating, by the processor, a first state of the control area over a first state time period from the historical states of the control area, using a model of dynamics of the control area, and defining a transition of the first state of the control area as a function of control inputs, wherein the first state of the control area includes a generator state for each generator in the control area, wherein the control inputs include one or combination of: a network state for each bus in the control area; a network state for some neighboring buses of neighboring controls areas; a mechanical input to each generator in the control area; or power consumptions at the buses in the control area;updating, by the processor, the estimated first state of the control area according to a measurement model of the control area, by: connecting measurements of the rotor frequency of each generator; a weighted combination of measurements of the network states on the buses in the control area and some neighboring buses of neighboring controls areas; with the generator state of each generator in the control area, to obtain a second state of the control area over a second state time period later than the first state time period; anddetecting, by the processor, the anomalies based on a statistic deviation of the second state of the control area from its corresponding prediction derived from the first state of the control area.
  • 2. The method of claim 1, wherein the generator state includes a rotor angle and a frequency of each generator in the set of generators in the control area.
  • 3. The method of claim 1, wherein the network state includes a voltage phase angle at each bus in the set of buses in the control area.
  • 4. The method of claim 1, wherein the first state time period and the second state time period each cover approximately the same time interval.
  • 5. The method of claim 1, wherein the control system is an electric power system (EPS).
  • 6. The method of claim 1, wherein the anomalies include cyber-attacks and power consumption anomalies.
  • 7. The method of claim 1, wherein the second state of the control area are real-time observations.
  • 8. The method of claim 1, further comprising: determining whether, the statistic deviation of the second state from its corresponding prediction derived from the first state of the control area is associated with a cyber attack based, at least in part, on historical cyber attack data stored in a memory in communication with the processor.
  • 9. The method of claim 1, further comprising: determining whether the statistic deviation of the second state from its corresponding prediction derived from the first state of the control area is associated with a cyber attack based, at least in part, on historical anomalies associated with historical states of the control area indicating there is not a cyber attack.
  • 10. The method of claim 9, further comprising: receiving an input from a surface of a user interface in communication with the processor, by a user, of the historical anomalies associated with historical states of the control area that are not indicative of a cyber attack.
  • 11. The method of claim 1, further comprising: determining, by the processor, whether the statistic deviation of the second state from its corresponding prediction derived from the first state of the control area is associated with a cyber attack based, at least in part, on exceeding a cyber attack threshold;providing a notification responsive to the statistic deviation of the second state from its corresponding prediction derived from the first state of the control area exceeding the cyber attack threshold.
  • 12. The method of claim 1, wherein the model of dynamics of the control area includes using an iterative inversion solution for a covariance matrix and communications among adjacent control areas within the pre-determined neighborhood distance.
  • 13. The method of claim 1, wherein the measurement model of the control area is based on measurements at the control area and neighboring buses of adjacent control areas within a pre-determined neighborhood distance.
  • 14. The method of claim 1, wherein the detecting of the anomalies includes: determining a function of a covariance matrix of the deviation of the second state from its corresponding prediction derived from the first state of the control area;comparing the function of the covariance matrix with a threshold determined as a multiple of a variance of the function of the covariance matrix allowed by uncertainties of the model of dynamics and the model of measurements; anddetecting a cyber-attack when the function of the covariance matrix is above the threshold.
  • 15. A system for detecting anomalies in a control area of a power system with multiple control areas, wherein the control area includes a set of generators in communication with a set of buses and some neighboring buses of neighboring controls area of the control system, comprising: a computer readable memory to store historical states of the control area, current states of the control area, a model of dynamics of the control area and a measurement model of the control area;a set of sensors arranged to sense measurements in the control area for the set of generators, the set of buses and to measure one or combination of rotor frequencies for each generator, voltage phase angles on the buses, a mechanical input to each generator, or power consumptions at the buses;a processor in communication with the computer readable memory configured to: estimate a first state of the control area from a historical state of the control area over a first state time period using the stored model of dynamics of the control area, and defining a transition of the first state of the control area as a function of control inputs, wherein the first state of the control area includes a rotor angle and a rotor frequency for each generator in the control area, wherein the control inputs include one or combination of phase angles on the buses of the control area, a mechanical input to each generator in the control area, and power consumptions at the buses in the control area;update the estimated first state of the control area according to the stored measurement model of the control area, by connecting measurements of the rotor frequency of each generator in the control area and a weighted combination of measurements of the voltage phase angles on the buses of the control area and some neighboring buses of the neighboring control areas, with the rotor angle and the rotor frequency of each generator in the control area, to obtain a second state of the control area over a second state time period later than the first state time period; anddetect the anomalies based on a statistic deviation of the second state from its corresponding prediction derived from the first state of the control area.
  • 16. The system of claim 15, wherein the first state time period and the second state time period each cover approximately the same time interval and the second state of the control area are real-time observations.
  • 17. The system of claim 15, wherein the detected anomalies assist in managing the management of the EPS.
  • 18. The method of claim 15, wherein the detecting of the anomalies includes: determining a function of a covariance matrix of the deviation of the second state from its corresponding prediction derived from the first state of the control area;comparing the function of the covariance matrix with a threshold determined as a multiple of a variance of the function of the covariance matrix allowed by uncertainties of the model of dynamics and the model of measurements; anddetecting a cyber-attack when the function of the covariance matrix is above the threshold.
  • 19. A detector for detecting anomalies in a control area of an electric power system (EPS) with multiple control areas, wherein the control area includes a set of generators in communication with a set of buses and some neighboring buses of neighboring controls area of the control system, comprising: acquire a plurality of measurements from sensors configure for sensing the set of generators and the set of buses over a first state time period;acquire a respective second plurality of measurements from sensors configure for sensing the set of generators and the set of buses over a second state time period;at least one processor having a computer readable memory configured to: receive the plurality of measurements sensed by the sensors over the first state time period;estimate a first state of the control area from a historical state of the control area over the first state time period using a model of dynamics of the control area, and defining a transition of the first state of the control area as a function of control inputs, wherein the first state of the control area includes a rotor angle and a rotor frequency for each generator in the control area, wherein the control inputs include one or combination of phase angles on the buses of the control area, a mechanical input to each generator in the control area, and power consumptions at the buses in the control area;receive the plurality of measurements sensed by the sensors over the second state time period;update the estimated first state of the control area according to a measurement model of the control area, by connecting sensed measurements of the rotor frequency of each generator in the control area and a weighted combination of sensed measurements of the phase angles on the buses of the control area and some neighboring buses of the neighboring control areas, with the rotor angle and the rotor frequency of each generator in the control area, to obtain a second state of the control area over the second state time period later than the first state time period; anddetect the anomalies based on a statistic deviation of the second state of the control area from its corresponding prediction derived from the first state of the control area.
  • 20. The detector of claim 19, wherein the first state time period and the second state time period each cover approximately the same time interval and the second state of the control area are real-time observations.