Enhancement of Transformer Differential Protection Using Machine Learning
Enhancement of Transformer Differential Protection Using Machine Learning
Abstract—The growing use of information and communication components and promoted the cybersecurity enhancement of
technologies (ICT) in power grid operational environments has its assets like substation protective relays to a top priority for
been essential for operators to improve the monitoring, mainte-
nance and control of power generation, transmission and distri-
regulatory agencies and utilities, in particular following the
bution, however, at the expense of an increased grid exposure successful cyberattacks against Ukrainian power infrastruc-
to cyber threats. This paper considers cyberattack scenarios tures [10], [11]. In a substation, protective relays form the most
targeting substation protective relays that can form the most critical defensive ingredient of power system against abnormal
critical ingredient for the protection of power systems against
abnormal conditions. Disrupting the relays operations may yield
conditions [12], [13]. Thus, their maloperations initiated by
major consequences on the overall power grid performance cyberattacks may cause major consequences for power systems
possibly leading to widespread blackouts. We investigate methods such as widespread blackouts.
for the enhancement of substation cybersecurity by leveraging the Cybersecurity of protective relays has been analyzed in the
potential of machine learning for the detection of transformer
differential protective relays anomalous behavior. The proposed literature from different perspectives. In [14], the impact of
method analyses operational technology (OT) data obtained cyberattacks against protective relays has been examined from
from the substation current transformers (CTs) in order to operational point of view. An analytical reliability assessment
detect cyberattacks. Power systems simulation using OPAL-RT framework has been proposed in [15] for quantifying the
HYPERSIM is used to generate training data sets, to simulate
the cyberattacks and to assess the cybersecurity enhancement impacts of cyberattacks against intelligent electronic devices
capability of the proposed machine learning algorithms. (IEDs) and protection systems. The impact of cyber-physical
Index Terms—Cyberphysical systems, operational technology, attacks against communication-assisted protection schemes
machine learning, differential protective relays, transformers. has been studied in [16]. A rule-based intrusion detection
I. I NTRODUCTION system has been presented in [17] for IEC 61850 protocol.
Cyber-resilient designs have been proposed in [18] and [19]
R APID deployment of standard and interoperable ICT in
power systems has raised serious cybersecurity concerns
in regulatory agencies and power utilities over the past decade
respectively for distance protection and line differential pro-
tection relays. Various anomaly detection systems (ADS) have
been presented in [20], [21] for substations. A collaborative
[1]. This is mainly because the security-by-obscurity philoso-
intrusion detection system (IDS) has been presented in [22]
phy used as a defensive strategy for proprietary ICT in power
for generic object oriented substation event (GOOSE) and
systems has become obsolete in the emerging standard and
sampled value (SV) packets in IEC 61850 protocol. A machine
interoperable ICT paradigm of smart grids [2].
learning based method has been used in [24] to identify
In order to address the growing cybersecurity concerns, the
cyberattacks against phasor measurement units (PMUs).
North American Electric Reliability Corporation has estab-
lished and enforced Critical Infrastructure Protection (CIP) In this paper, a fully connected autoencoder is employed for
standards. The CIP standards demand utilities to identify, detection and mitigation of cyberattacks against transformer
categorize and protect cyber assets that are essential to the differential protective relays. The fully connected autoencoder
reliable operation of the bulk electric system [3]. Nevertheless, is trained with three-phase current measurements from current
CIP standards do not provide any guideline about the cyber- transformers (CTs) at both sides of a transformer. The fully
secuity measures/tools that should be developed to improve connected autoencoder is then used to detect anomalies in
the cyber-resiliency of the assets. As such, different standards three-phase currents. The simulation results demonstrate the
and initiatives have been launched by National Standard Insti- capability of fully connected autoencoder to detect cyberat-
tutes like ISA [4]–[6], research institutes like Electric Power tacks against transformer differential protective relays.
Research Institute (EPRI) [7] and government agencies like The main contributions of this paper are as follows.
Department of Energy (DOE) [8], [9] to develop cybersecurity • A method is presented for cybersecurity enhancement of
measures/tools for cyber assets in power systems. transformer differential protective relays using machine
The digitalization of power grids over the past decade learning.
has increased the cyberattack surfaces across several grid • The performance of the proposed machine learning
Commands code
Sc
Sce
en Differential
ari Protective Relay
nar
o2 input output
Authorized licensed use limited to: UNIVERSITY OF CONNECTICUT. Downloaded on May 18,2021 at 12:09:52 UTC from IEEE Xplore. Restrictions apply.
R87
A B C
Tr5
G1 CB1CT1 Tr1
CT2CB2
R87
CB9 L1 CB10 CB11 L2 CB12
G2
CB3CT3 Tr2
CT4CB4
are very rare incidents in power systems. This is in line is simulated for 16 randomly selected starting times to ensure
with assumption in anomaly detection systems in the literature faults occur at different parts of the current waveforms. This
[27]. Since the autoencoder has not been trained on data con- amounts to 10000 simulations. In order to be consistent with
taining cyberattacks, we hypothesize that reconstructions of SV packet specifications in IEC 61850 standard, we capture
anomalous measurements occurring during attacks may not be 4800 samples per second for current measurements per phase.
reconstructed well [27], [28]. Thus, we aim to use a threshold The 10000 simulations are performed for 1.5 seconds and
of the autoencoder reconstruction error as a means of detecting the transformer faults are initiated randomly between t=1 s
anomalous measurements that may indicate cyberattacks. to t=1.02 s. It is noteworthy that the period of one cycle is
approximately 0.0167 s in a 60Hz power system.
IV. S IMULATION R ESULTS
An important parameter for generating training data set is
A. Test System the input data length, i.e., number of samples in each training
Fig. 3 illustrates the IEEE power system relaying committee data. In this paper, a sliding window of 10-ms, i.e., 48 samples
(PSRC) D6 benchmark test system [29], [30]. The benchmark of current for each phase is considered. Thus, each training
test system represents a power plant with four generators G1- data contains 288 current samples, i.e., 144 three-phase current
G4 that are connected to the main grid through a 500kV samples from each side of the transformer. In order to generate
transmission system. The 500kV transmission system consists a 10-ms sliding window, we first extract a 20-ms window from
of four transmission lines L1-L4 and the main grid is modeled the 1.5 s simulation results containing 48 samples before the
as an infinite bus S1. The power plant transformers Tr1-Tr4 starting point of the fault and 47 samples after the starting
are protected by differential protective relays. point of the fault. Next, a sliding window of 10-ms slides
sample by sample till it covers the 20-ms window. This
B. Training Data Set amounts to 48 10-ms windows per simulation. Considering
We employed OPAL-RT HYPERSIM to implement and 10000 simulations, 2000 simulations data are used for testing.
simulate PSRC D6 test system and generate the data set for Hence, the training data set contains 48*8000=384000 10-ms
machine learning. The operating points of the generators G1- current measurement data.
G4 are changed between 200 MW and 400 MW in 50 MW
step size. The three-phase internal fault of the transformer Tr1
C. Cyberattack Test Sets
input output
layer layer
In a real world, the anomaly detection data is heavily
imbalanced and attacks are rare events. As we mentioned,
code we have 2000 simulation data sequences for test. To make
layer an imbalanced data set, for each scenario, we replace 100 of
the sequences with malicious data sequences. As discussed in
Section II. B, we consider two cyberattack scenarios against
transformer differential protective relay. Malicious data se-
size: 16
quences are generated based on the aforementioned cyberat-
neurons
size: 32 size: 32 tack scenarios. In Scenario 1, the current measurements from
neurons neurons
size: 64
neurons
size: 64
neurons
the current transformer CT1 are scaled to trigger the trans-
size: 48*6
=288
size: 48*6
=288
former differential protective relay. In Scenario 2, the current
measurements from current transformer CT1 are replaced by
Fig. 4. Proposed Fully Connected Autoencoder Structure false data.
Authorized licensed use limited to: UNIVERSITY OF CONNECTICUT. Downloaded on May 18,2021 at 12:09:52 UTC from IEEE Xplore. Restrictions apply.
&