{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T07:06:13Z","timestamp":1777705573647,"version":"3.51.4"},"reference-count":22,"publisher":"SAGE Publications","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2022,1,25]]},"abstract":"<jats:p>Maintaining the reliable, efficient, secure and multifunctional IEC 61850 based substation is an extremely challenging task, especially in the ever-evolving cyberattacks domain. This challenge is also exacerbated with expending the modern power system (MPS) to meet the demand along with growing availability of hacking tools in the hacker community. Few of the most serious threats in the substation automation system (SAS) are DoS (Denial of Services), MS (Message Suppression) and DM (Data Manipulation) attacks, where DoS is due to flood bogus frames. In MS, hacker inject the GOOSE sequence (sqNum) and GOOSE status (stNum) number. In the DM attacks, attacker modify current measurements reported by the merging units, inject modified boolean value of circuit breaker and replay a previously valid message. In this paper, an intelligent cyberattacks identification approach in IEC 61850 based SAS using PSVM (proximal support vector machine) is proposed. The performance of the proposed approach is demonstrated using experimental dataset of recorded signatures. The obtained results of the demonstrated study shows the effectiveness and high level of acceptability for real side implementation to protect the SAS from the cyberattacks in different scenarios.<\/jats:p>","DOI":"10.3233\/jifs-189783","type":"journal-article","created":{"date-parts":[[2021,3,19]],"date-time":"2021-03-19T13:19:55Z","timestamp":1616159995000},"page":"1213-1222","source":"Crossref","is-referenced-by-count":11,"title":["Cyberattacks identification in IEC 61850 based substation using proximal support vector machine"],"prefix":"10.1177","volume":"42","author":[{"given":"Hasmat","family":"Malik","sequence":"first","affiliation":[{"name":"BEARS, University Town, NUS Campus, Singapore"}]},{"given":"Majed A.","family":"Alotaibi","sequence":"additional","affiliation":[{"name":"Deparment of Electrical Engineering, College of Engineering, King Saud University, Riyadh, Saudi Arabia"},{"name":"Saudi Electricity Company Chair in Power System Reliability and Security, King Saud University, Riyadh, Saudi Arabia"}]},{"given":"Abdulaziz","family":"Almutairi","sequence":"additional","affiliation":[{"name":"Deparment of Electrical Engineering, College of Engineering, Majmaah University, Riyadh, Saudi Arabia"}]}],"member":"179","reference":[{"issue":"2","key":"10.3233\/JIFS-189783_ref1","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1109\/JIOT.2015.2459049","article-title":"BLITHE: Behavior rule based insider threat detection for smart grid","volume":"3","author":"Bao","year":"2016","journal-title":"IEEE Internet Things J"},{"issue":"6","key":"10.3233\/JIFS-189783_ref3","doi-asserted-by":"crossref","first-page":"3104","DOI":"10.1109\/TSG.2015.2409775","article-title":"Developing a hybrid intrusion detection system using data mining for power systems","volume":"6","author":"Pan","year":"2015","journal-title":"IEEE Trans Smart Grid"},{"issue":"1","key":"10.3233\/JIFS-189783_ref4","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/JSYST.2013.2294120","article-title":"Data-stream-based intrusion detection system for advanced metering infrastructure in smart grid: A feasibility study","volume":"9","author":"Faisal","year":"2015","journal-title":"IEEE Syst J"},{"issue":"12","key":"10.3233\/JIFS-189783_ref6","doi-asserted-by":"crossref","first-page":"24 188","DOI":"10.3390\/s141224188","article-title":"A malicious pattern detection engine for embedded security systems in the Internet of Things","volume":"14","author":"Oh","year":"2014","journal-title":"Sensors"},{"issue":"1","key":"10.3233\/JIFS-189783_ref7","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1145\/1952982.1952995","article-title":"False data injection attacks against state estimation in electric power grids","volume":"14","author":"Liu","year":"2011","journal-title":"ACM Trans Inf Syst Secur"},{"issue":"3","key":"10.3233\/JIFS-189783_ref8","doi-asserted-by":"crossref","first-page":"717","DOI":"10.1109\/TPDS.2013.92","article-title":"On false data-injection attacks against power system state estimation: Modeling and countermeasures","volume":"25","author":"Yang","year":"2014","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"1","key":"10.3233\/JIFS-189783_ref9","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/MCOM.2013.6400435","article-title":"Bad data injection in smart grid: attack and defense mechanisms","volume":"51","author":"Huang","year":"2013","journal-title":"IEEE Commun Mag"},{"issue":"3","key":"10.3233\/JIFS-189783_ref11","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1109\/TDSC.2012.11","article-title":"Detecting anomalous insiders in collaborative information systems","volume":"9","author":"Chen","year":"2012","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"10.3233\/JIFS-189783_ref12","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1016\/j.procs.2015.03.175","article-title":"Insider threat detection using log analysis and event correlation","volume":"45","author":"Ambre","year":"2015","journal-title":"Procedia Comput Sci"},{"issue":"2","key":"10.3233\/JIFS-189783_ref13","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1109\/JSYST.2015.2438442","article-title":"Automated insider threat detection system using user and role-based profile assessment","volume":"11","author":"Legg","year":"2017","journal-title":"IEEE Syst J"},{"key":"10.3233\/JIFS-189783_ref16","first-page":"17","article-title":"Poisoned GOOSE: Exploiting the GOOSE Protocol, in","volume":"149","author":"Kush","year":"2014","journal-title":"Twelfth Australasian Information Security Conference (AISC 2014)"},{"key":"10.3233\/JIFS-189783_ref17","doi-asserted-by":"crossref","first-page":"825","DOI":"10.1016\/j.epsr.2016.08.022","article-title":"A new methodology for real-time detection of attacks in IEC 61850-based systems","volume":"143","author":"da Silva","year":"2017","journal-title":"Electr Power Syst Res"},{"key":"10.3233\/JIFS-189783_ref18","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1016\/j.ijepes.2018.07.033","article-title":"Safety related functions with IEC 61850 GOOSE messaging","volume":"104","author":"Caserza Magro","year":"2019","journal-title":"Int J Electr Power Energy Syst"},{"issue":"19","key":"10.3233\/JIFS-189783_ref19","doi-asserted-by":"crossref","first-page":"3731","DOI":"10.3390\/en12193731","article-title":"The IEC 61850 Sampled Measured Values Protocol: Analysis, Threat Identification, and Feasibility of Using NN Forecasters to Detect Spoofed Packets","volume":"12","author":"El Hariri","year":"2019","journal-title":"Energies"},{"issue":"4","key":"10.3233\/JIFS-189783_ref20","doi-asserted-by":"crossref","first-page":"1643","DOI":"10.1109\/TSG.2013.2294473","article-title":"Integrated Anomaly Detection for Cyber Security of the Substations","volume":"5","author":"Hong","year":"2014","journal-title":"IEEE Trans Smart Grid"},{"issue":"4","key":"10.3233\/JIFS-189783_ref21","doi-asserted-by":"crossref","first-page":"2376","DOI":"10.1109\/TPWRD.2010.2050076","article-title":"An Intrusion Detection System for IEC61850 Automated Substations","volume":"25","author":"Premaratne","year":"2010","journal-title":"IEEE Trans Power Deliv"},{"issue":"10","key":"10.3233\/JIFS-189783_ref23","doi-asserted-by":"crossref","first-page":"4091","DOI":"10.3390\/en5104091","article-title":"Intrusion Detection of NSM Based DoS Attacks Using Data Mining in Smart Grid","volume":"5","author":"Choi","year":"2012","journal-title":"Energies"},{"issue":"6","key":"10.3233\/JIFS-189783_ref24","doi-asserted-by":"crossref","first-page":"2442","DOI":"10.1109\/TII.2017.2770096","article-title":"Toward Threat of Implementation Attacks on Substation Security: Case Study on Fault Detection and Isolation","volume":"14","author":"Chattopadhyay","year":"2018","journal-title":"IEEE Trans Ind Informatics"},{"key":"10.3233\/JIFS-189783_ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2019.8909783"},{"key":"10.3233\/JIFS-189783_ref29","doi-asserted-by":"publisher","DOI":"10.1109\/IICPE.2014.7115842"},{"key":"10.3233\/JIFS-189783_ref30","doi-asserted-by":"publisher","DOI":"10.1109\/POWERI.2014.7117762"},{"key":"10.3233\/JIFS-189783_ref31","doi-asserted-by":"crossref","unstructured":"Malik H. and Mishra S. , Proximal Support Vector machine (PSVM) Based Imbalance Fault Diagnosis of Wind Turbine Using Generator Current Signals, Elsevier Energy Procedia 90 (2015), Pp. 593-603, 15-17 Dec. 2015. Doi: https:\/\/doi.org\/10.1016\/j.egypro.2016.11.228","DOI":"10.1016\/j.egypro.2016.11.228"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-189783","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:44:17Z","timestamp":1777455857000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-189783"}},"subtitle":[],"editor":[{"given":"Hasmat","family":"Malik","sequence":"additional","affiliation":[]},{"given":"Gopal","family":"Chaudhary","sequence":"additional","affiliation":[]},{"given":"Smriti","family":"Srivastava","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2022,1,25]]},"references-count":22,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.3233\/jifs-189783","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,25]]}}}