Abstract
Considering a variety of sampled value (SV) attacks on busbar differential protection (BDP) which poses challenges to conventional learning algorithms, an algorithm to detect SV attacks based on the immune system of negative selection is developed in this paper. The healthy SV data of BDP are defined as self-data composed of spheres of the same size, whereas the SV attack data, i.e., the nonself data, are preserved in the nonself space covered by spherical detectors of different sizes. To avoid the confusion between busbar faults and SV attacks, a self-shape optimization algorithm is introduced, and the improved self-data are verified through a power-frequency fault-component-based differential protection criterion to avoid false negatives. Based on the difficulty of boundary coverage in traditional negative selection algorithms, a self-data-driven detector generation algorithm is proposed to enhance the detector coverage. A testbed of differential protection for a 110 kV double busbar system is then established. Typical SV attacks of BDP such as amplitude and current phase tampering, fault replays, and the disconnection of the secondary circuits of current transformers are considered, and the delays of differential relay operation caused by detection algorithms are investigated.
HIGHLY advanced smart grids are characterized by the interconnection of numerous intelligent electric devices (IEDs) through high-speed networks such as Ethernet and Internet, leading to a high-degree integration among physical power systems and cyber systems. Communication systems play a major role in maintaining the reliability and security of power systems. In recent years, the number of malicious attacks on the cyber components of power systems, which result in blackouts, increases globally, and the security of smart grids is facing severe challenges [
Currently, the security of relay protection has received considerable attention [
The biological immune system is an effective organic system that protects the body from invasion. To date, artificial immune models based on biological immune system such as the immune network [
In view of these problems, we present an improved NSA and develop a detection algorithm for SV attacks on BDP. The main contributions of this paper are as follows.
1) Based on the immune system of negative selection, SV attack detection by BDP is developed. Compared with traditional learning algorithms, this algorithm has greater potential to identify unknown SV attacks of differential relays according to the sample deficiency experiment.
2) The results prove that SV attack detection can cause delays in differential relay operations. However, these delays can be reduced by the proposed self-shape optimization (SSO) algorithm by decreasing the confusion between busbar faults and SV attacks.
3) A self-data-driven (SDD) detector algorithm is proposed to generate optimal detectors and overcome the difficulty of boundary coverage in traditional NSAs.
A bus is a critical power component in a substations, whose primary protection typically employs current differential relay with restraint characteristics. The basic operation principle of current differential relay is:
(1) |
where Id is the differential current; It is the threshold current; Iset,min is the minimum threshold current, which can be 50% to 150% of the maximum rated value of the current transformers (CTs); Kres is the restraint coefficient with a typical range of 0.3-0.7; Ii is the line current; and the restraint current is equal to , where n is the number of lines connected to the protected bus.

Fig. 1 Typical SV attack tree mode for busbar protection.
NSAs, which imitate the immune tolerance behavior of T- cells in biological immune system (BIS), are first introduced in [
Step 1: define the self-model according to the characteristics of the SV data, and then obtain the self-set that represents the normal operation of the busbars.
Step 2: generate a set of detectors through the self-tolerance process.
Step 3: monitor the attack behavior by matching the detectors with new data. When an SV data point is covered by a detector, it is regarded as attack data.
The main goal of NSAs is to cover the entire nonself region with detectors. However, the coverage close to the boundary between the self and nonself regions is a difficult problem for current algorithms [
For differential relay, the synchronous current data for a multiline in the same phase can be divided into three groups: increased, decreased, and unchanged current amplitudes. Correspondingly, the three characteristic attributes used to determine the coordinates of the SV data point in the shape space are defined as follows.
1) Increment attribute . This attribute is determined by the current data with an increased amplitude as:
(2) |
where , is the current amplitude at time t for the
2) Decrement attribute . This attribute is determined by the current data with a decreased amplitude as:
(3) |
3) Constant attribute . This attribute is used to reflect the steady-state characteristics. It is determined by the current data with an unchanged amplitude as:
(4) |
In the aforementioned model, should not be less than the transient time of the fault current to extract as much transient information as possible from the sampled data.
A self-set is composed of nonattack samples during various operations, including normal operation during internal and external faults. The self-sample is a sphere with a fixed radius. The normalized self-sample diameter should not exceed the composite error of the CTs for the optimization of the self-set. The coordinates of the sphere center are determined by the three characteristic attributes proposed in section III-A. Self-samples can be easily prepared through a simulation experiment. However, obtaining a perfect self-set for continuous sampling data is impossible. If the space of vacant self-samples, e.g., internal fault samples, is covered by detectors, the corresponding self-samples will be mistaken for attack data, which may cause delay in the operation of differential relay or even maloperations. To address this problem, the self-set is rearranged using an optimization algorithm with the goal of covering the self-space as completely as possible with a minimum number of samples.
SSO is realized by performing multiple proliferation and inhibition operations on the sample set. If a sample set Sm exists prior to the
(5) |
where S is the current sample set; is the Euclidean distance between two data points with three dimensions (characteristic attributes); is a new sample; and Rs is the radius of a self-sample.
An orthogonal mutation cloning strategy is considered to further enhance proliferation coverage. The variant of a new sample Xn is generated on a plane in which any vector is perpendicular to the vector . Let , where a, b, and c are coordinates, , and . Then, the variant coordinates are expressed as:
(6) |
where is the coordinate of Xn; t is the time of mutation; and is the probability of variation, which can be calculated by:
(7) |
where p is the total number of samples intersecting Xn.
Inhibition operations are performed after the proliferation operations. For any three samples Xi, Xj, and Xk, if the Euclidean distance between any two samples is less than 2RS, the samples covered by the minimum sphere tangent to the triangle determined by the three samples can be deleted. Let the center of the minimum sphere be Xo; then, its radius ro can be solved by:
(8) |
The aforementioned proliferation and inhibition operations are executed alternately and terminated when a stable status is reached.
For optimization, the self-set should be divided into three classes associated with normal operation, internal faults, and external faults. In the proliferation operation, new samples must be verified to avoid false negatives, which decrease the detection rate. In BDP, power-frequency fault components can be used to increase relay sensitivity. A common power-frequency fault-component-based differential protection criterion is expressed as:
(9) |
where is the power-frequency fault component of the current for the
Since , (9) can be used to determine whether the samples are types of internal faults.
The sequence-component-based differential protection is not considered because the positive-, negative-, and zero-sequence components cannot be calculated based on the characteristic attributes.
According to (9), the judgment equations for an external fault and normal operation can be expressed as:
(10) |
(11) |
Detector generation can be implemented by using random generation algorithm, a genetic algorithm, or a deterministic algorithm. The random generation algorithm is simple but has difficulty in covering a narrow region due to blind generation, and the genetic algorithm is too complicated for a 3D model. The proposed SDD algorithm is a deterministic algorithm for generating spherical detectors. In this algorithm, each self-sample determines a set of detectors that are tangential to the outer surface of the self-sample. The tangency points are uniformly distributed on the surface of the self-sample to ensure the coverage in each direction. As shown in Fig.

Fig. 2 Distribution of detectors. (a) Single-sample driven. (b) Two-sample driven.

Fig. 3 Solution process of optimal detector based on SBH.

Fig. 4 Grid model for detector searching.

Fig. 5 110 kV double busbar system.

Fig. 6 Distributions of self-samples for normal operation. (a) Without SSO. (b) With SSO.

Fig. 7 Distributions of self-samples for external faults. (a) Without SSO. (b) With SSO.

Fig. 8 Distributions of self-samples for internal faults. (a) Without SSO. (b) With SSO.

Fig. 9 Measurement data for SV attack. (a) C1. (b) C2. (c) C3. (d) C4. (e) C5. (f) C6.

Fig. 10 Curves of nonself coverage rate with time for up-to-date NSAs.

Fig. 11 Online testbed for SV attack detection.

Fig. 12 Normal operation under SV attacks.
According to the proposed SDD algorithm, the detector generation for a self-sample in 3D space includes the following three steps.
Step 1: determine the boundary points of the detectors around the self-sample. First, randomly select a plane crossing the center of the self-sample, and then determine m boundary points with a rotation step of θ () on the circle section. Finally, rotate the m points around a local axis from 0° to 180° with a rotation step of θ.
Step 2: validate the self-tolerance. Eliminate the boundary points that fall in any self-sample. Checking all self-samples for a boundary point is not necessary because removable boundary points exist only at the intersections between the self-samples. Only samples close to the driven self-sample must be considered.
Step 3: solve the radius of the detector. Assume that the center and boundary point of a detector are Xc and Xb, respectively. Thus, the radius of the detector can be expressed as . The optimal radius of the detector is the maximum value when the detector remains outside the self-set. In other words, we can obtain:
(12) |
where Xz is the center of the reference sample z; S is the self-set; Xv is the center of the self-sample v on which Xb is generated; and Lh is the size of the data space.
With a blind search, the efficiency of the aforementioned model is very low for numerous samples, which is a common shortcoming of deterministic generation algorithms. Thus, we introduce a self-boundary heuristic (SBH) that uses the boundary information of historical records as the current search guide. We then define the subdomain model, i.e., the minimum grid cell of the data space, and the number is written as:
(13) |
where Wg is the data space set of subdomain g; (x,y,z) are 3D coordinates; and is the mapping function that satisfies the following conditions.
(14) |
where and are the data space self of subdomains i and j, respectively.
The optimal reference sample of the boundary point of the self-sample is recorded in the corresponding number of subdomain models. The optimal reference sample model of boundary point b of self-sample v is:
(15) |
The solution process of the optimal detector based on SBH is shown in
In the detection of SV attacks, if an SV data point is covered by a detector, it is regarded as attack data. We used a grid-based detector searching algorithm to quickly find the matching detector.
The process of searching for a matched detector is as follows:
1) Convert the SV data into the characteristic attribute data and determine the coordinates in the power system.
2) Identify the node nearest the SV data coordinates as the center and sequentially search the memory detectors from the vertices of eight adjacent subcubes.
3) If the Euclidean distance between the data point and the center of the detector is less than the detector radius, the SV data are regarded as attack data.
The proposed matched detector searching algorithm employs mapping table technology. In the worst case, only 27 nodes must be checked for a data point.
To verify the performance of the proposed NSA, we first conduct a comparison test on a benchmark dataset and then implement the NSA for double-bus protection. Finally, we build an online testbed to investigate the performance of the NSA by considering various conditions including normal operation, external faults, and internal faults.
The compared algorithms include the real-valued negative selection algorithm (RVNSA) [
Algorithm | 20% of known self-set | 80% of known self-set | ||
---|---|---|---|---|
TPR (%) | FPR (%) | TPR (%) | FPR (%) | |
SDD | 98.22 | 19.75 | 96.89 | 3.70 |
RVNSA | 81.33 | 38.27 | 84.89 | 7.41 |
INSA | 86.22 | 79.01 | 86.22 | 17.28 |
KN | 85.44 | 76.54 | 85.44 | 16.05 |
AINSA | 97.33 | 28.40 | 97.78 | 6.17 |
The test case is a 110 kV double busbar system, as shown in
In the proposed NSA, considering the composite error of the CT, the normalized self-radius is set to be 0.025, and the rotation step is 30°. The time window Δt in the SV data model is a fundamental cycle. Characteristic attribute data are normalized using:
(16) |
where Ires,max is the maximum restraint current of differential relay under normal operation.
Self-samples are selected from the recorded data of a power system based on a PSCAD simulation conducted at a sampling rate of 2400 Hz. The feeders adopt a stochastic load model that is evenly distributed between the two sources. The fault sample set mainly consists of various metallic short-circuit faults such as single-line-to-ground faults (1-LGF), double-line-to-ground faults (2-LGF), three-line-to-ground faults (3-LGF), and line-to-line faults (LLF). The sampling time for the fault samples spans from the moment of fault occurrence to the relay operation moment. In total, 5327 self-samples are prepared for the LDR and SDRs.
According to the attack tree model, many possibilities exist for data attack against differential relay. We illustrate several types of data attacks that can be easily performed by attackers. However, our proposed algorithm can be applied to other attack types.
The SV attacks studied include the following six types:
Class 1 (C1): the MU corresponding to the CT on line 10 replays the SV data of the CT on line 10 for a 3-LGF on bus 1 during normal operation.
Class 2 (C2): the MU corresponding to the CT on line 11 replays the SV data of the CT on line 11 for an LLF on bus 2 during normal operation.
Class 3 (C3): the MU corresponding to the CT on line 9 replays the SV data of the CT on line 9 for a 1-LGF on line 9 during normal operation.
Class 4 (C4): the MU corresponding to the CT on line 11 reduces the line current to mimic a disconnection fault of the secondary circuit of the CT when a 1-LGF occurs on bus 2.
Class 5 (C5): the MU corresponding to the CT on line 11 modifies the current phase angle through a rotation of 180° when a 1-LGF occurs on bus 2.
Class 6 (C6): the MU corresponding to the CT on line 11 replays the saturation current data of the CT on line 11 when a 1-LGF occurs on bus 2.
In NSAs, generating a large number of detectors is typically time-consuming because each generated detector must undergo self-tolerance and be checked against the existing detectors to remove redundancies. To verify the performance of the proposed algorithm, the same initial self-set is used with other algorithms, including RVNSA [
An online testbed based on a real-time digital simulator (RTDS) is established, as shown in
The performance of the detection algorithm is tested by investigating the action of the differential relays for busbar 1 under SV attacks during normal operation and external faults and the effects on protection during internal faults. To verify the advantages of the proposed algorithm, common algorithms including CNN [
Under normal operation, the maloperation rates under SV attacks are shown in

Fig. 13 Maloperation rates under SV attacks. (a) LDR. (b) SDR.
Algorithm | LDR | SDR | ||
---|---|---|---|---|
TPR (%) | FNR (%) | TPR (%) | FNR (%) | |
CPMA | 89.58 | 10.42 | 89.56 | 10.44 |
CNN | 91.51 | 8.49 | 91.60 | 8.40 |
SVM | 88.47 | 11.53 | 88.44 | 11.56 |
KN | 91.49 | 8.51 | 91.51 | 8.49 |
SDD | 92.58 | 7.42 | 92.60 | 7.40 |
It should be noted that the aforementioned results rely on the known training samples. In fact, BDP may encounter unknown attacks, which should be the focus of our study.

Fig. 14 Maloperation rates of SDR for various detection algorithms. (a) With training. (b) Without training.
Currently, the maloperation of the differential current relay caused by the secondary circuit disconnection of CT or core saturation during the external faults may occur. Thus, investigating the defense against the attacks with C4 and C6 on external faults is of great significance. In this experiment, the external fault is set at point f on line 1 close to busbar 1. And for each type of fault, the number of C4 instances is 11, which is related to the disconnection of phase A CTs on the lines connected to busbar 1. The number of C6 instances is 50, corresponding to different saturation degrees of CT for line 1.
Algorithm | Training or not | Attack class | Maloperation rate (%) | |||
---|---|---|---|---|---|---|
1-LGF | 2-LGF | LLF | 3-LGF | |||
SDD | Yes | C4 | 0 | 0 | 0 | 0 |
C6 | 0 | 0 | 0 | 0 | ||
No | C4 | 0 | 0 | 0 | 0 | |
C6 | 0 | 0 | 0 | 0 | ||
KN | Yes | C4 | 0 | 0 | 0 | 0 |
C6 | 0 | 0 | 0 | 0 | ||
No | C4 | 0 | 0 | 0 | 0 | |
C6 | 0 | 0 | 0 | 0 | ||
CNN | Yes | C4 | 0 | 0 | 0 | 0 |
C6 | 68 | 72 | 70 | 72 | ||
No | C4 | 0 | 0 | 0 | 0 | |
C6 | 90 | 96 | 92 | 94 | ||
CPMA | Yes | C4 | 0 | 0 | 0 | 0 |
C6 | 52 | 50 | 52 | 56 | ||
No | C4 | 0 | 0 | 0 | 0 | |
C6 | 92 | 96 | 94 | 92 | ||
SVM | Yes | C4 | 0 | 0 | 0 | 0 |
C6 | 66 | 64 | 68 | 68 | ||
No | C4 | 0 | 0 | 0 | 0 | |
C6 | 94 | 98 | 96 | 96 |
The average maloperation rates provided by the CNN, CPMA, and SVM are 71%, 53%, and 67%, respectively. In contrast to normal operation, CT saturation during external faults is very similar to internal faults for differential relay. Therefore, the learning algorithms may regard SV attacks as internal faults, which reduces the detection performance. In the absence of training, the average maloperation rates provided by the learning algorithms reach 90% or higher, whereas for SDD and KN, differential relay remains silent. Regarding the surface area of the self, the external fault is smaller than that of the normal operation, which means that the probability of the boundary effect is smaller. Thus, the immune algorithms perform better against external attacks.
The aforementioned results show that the detection performance of learning algorithms for unknown attacks will be greatly reduced due to the absence of training, whereas that of immune algorithms is not affected. In addition, to detect the attacks with complex characteristics, learning algorithms underperform compared with the proposed algorithm because of the limitations of the data model.
To investigate the influence of the detection algorithm on the protection operation, many simulations with differential protection for various faults on busbar 1 have been previously conducted. The FPR can reflect the failure rate of a relay and is defined as the ratio of the number of internal fault instances detected as an attack to the total number of internal fault instances.
Algorithm | Adopt SSO or not | FPR (%) | ||
---|---|---|---|---|
Hz | Hz | Hz | ||
SDD | Yes | 3.69 | 3.82 | 4.02 |
No | 10.44 | 10.51 | 10.58 | |
KN | Yes | 3.69 | 3.81 | 4.02 |
No | 10.19 | 10.35 | 10.46 | |
CNN | 4.83 | 4.96 | 5.12 | |
CPMA | 5.17 | 5.28 | 5.29 | |
SVM | 5.36 | 5.54 | 5.82 |
In the case of busbar faults, false positives in SV samples will cause protection action delays. In

Fig. 15 Recording data of SDR with SDD at a sampling rate of 4800 Hz.
Algorithm | Adopt SSO or not | The maximum operation delays of SDR (ms) | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Hz | Hz | Hz | |||||||||||
1-LGF | 2-LGF | LLF | 3-LGF | 1-LGF | 2-LGF | LLF | 3-LGF | 1-LGF | 2-LGF | LLF | 3-LGF | ||
SDD | Yes | 1.73 | 2.54 | 2.55 | 3.37 | 1.72 | 2.56 | 2.56 | 2.98 | 0.48 | 1.11 | 1.10 | 1.31 |
No | 5.06 | 8.41 | 8.42 | 9.21 | 3.81 | 7.11 | 7.11 | 7.95 | 3.18 | 4.43 | 4.42 | 7.01 | |
KN | Yes | 1.72 | 2.56 | 2.55 | 3.37 | 1.31 | 2.14 | 2.14 | 2.56 | 0.27 | 0.89 | 0.89 | 1.10 |
No | 4.24 | 7.53 | 7.54 | 8.35 | 2.98 | 5.47 | 5.46 | 7.14 | 2.35 | 4.01 | 4.01 | 6.52 | |
CNN | 3.34 | 4.17 | 4.17 | 5.01 | 2.12 | 2.94 | 2.94 | 3.35 | 1.49 | 2.32 | 2.32 | 2.73 | |
CPMA | 4.17 | 5.01 | 5.01 | 5.84 | 2.95 | 3.77 | 3.77 | 4.52 | 1.69 | 3.14 | 3.14 | 3.35 | |
SVM | 5.02 | 5.85 | 5.85 | 6.68 | 3.35 | 4.59 | 4.59 | 5.01 | 2.52 | 3.97 | 3.97 | 4.18 |
Identifying SV attacks of BDP is difficult because of high dimensionality. In this paper, a detection algorithm based on an NSA is developed to identify SV attacks of BDP. Two improvements are proposed: ① recovering the self-data of differential relay using shape-space optimization algorithm; and ② generating the detectors by self-driven algorithm to enhance the boundary coverage. Compared with up-to-date NSAs, our detector generation algorithm has a shorter computation time and higher nonself coverage. The online test results show that the traditional learning algorithms suffer from a decreased detection performance due to lack of training samples, whereas the performance of SDD is not affected by training samples. Therefore, our detection algorithm has great potential for detecting unknown SV attacks of BDP. Compared with fully trained learning algorithms, the proposed algorithm also has some advantages. For example, during normal operation, when the load is not too small, SDD exhibits stronger performance in preventing a differential relay operation. For busbar faults, the delays of differential relay operation using SDD and KN are significantly higher than those of the learning algorithms, indicating that NSAs are still deficient in distinguishing busbar faults from SV attacks. After SSO, the delays of the differential relay operation are greatly reduced, and SDD outperforms the traditional learning algorithms. However, compared with KN, the delays of differential relay operation are still slightly higher. The comparison between SDD and KN proves that the detection performance of SV attacks is improved and the conflict for the delays of differential relay operation is reduced. To ensure the rapid action of BDP, developing an optimization scheme is necessary, which aims at the maximum detection rate of SV attacks and is constrained by differential relay operation delays. The development of this type of scheme is the future research goal.
References
O. Kosut, L. Jia, R. J. Thomas et al., “Malicious data attacks on the smart grid,” IEEE Transactions on Smart Grid, vol. 2, no. 4, pp. 645-658, Dec. 2011. [Baidu Scholar]
X. Yu and Y. Xue, “Smart grids: a cyber-physical systems perspective,” Proceedings of the IEEE, vol. 104, no. 5, pp. 1058-1070, May 2016. [Baidu Scholar]
J. Yang, C. Zhou, and S. Yang, “Anomaly detection based on zone partition for security protection of industrial cyber-physical systems,” IEEE Transactions on Industrial Electronics, vol. 65, no. 5, pp. 4257-4267, May 2018. [Baidu Scholar]
A. Ashok, M. Govindarasu, and J. Wang, “Cyber-physical attack-resilient wide-area monitoring, protection, and control for the power grid,” Proceedings of the IEEE, vol. 105, no. 7, pp. 1389-1407, Jul. 2017. [Baidu Scholar]
C. Ten, C. Liu, and G. Manimaran, “Vulnerability assessment of cybersecurity for SCADA systems,” IEEE Transactions on Power Systems, vol. 23, no. 4, pp. 1836-1846, Nov. 2008. [Baidu Scholar]
J. Gao, J. Liu, B. Rajan et al., “SCADA communication and security issues,” Security and Communication Networks, vol. 7, no. 1, pp. 175-194, Jan. 2014. [Baidu Scholar]
Y. Yang, K. McLaughlin, S. Sezer et al., “Multiattribute SCADA-specific intrusion detection system for power networks,” IEEE Transactions on Power Delivery, vol. 29, no. 3, pp. 1092-1102, Jun. 2014. [Baidu Scholar]
S. Soltan, M. Yannakakis, and G. Zussman, “Power grid state estimation following a joint cyber and physical attack,” IEEE Transactions on Control of Network Systems, vol. 5, no. 1, pp. 499-512, Mar. 2018. [Baidu Scholar]
A. Alireza, S. Arman, and F. Parisa, “Resilient control design for load frequency control system under false data injection attacks,” IEEE Transactions on Industrial Electronics, vol. 67, no. 9, pp. 7951-7962, Sept. 2020. [Baidu Scholar]
V. S. Rajkumar, M. Tealane, A. Ştefanov et al., “Cyber attacks on power system automation and protection and impact analysis,” in Proceedings of IEEE PES Innovative Smart Grid Technologies Europe, Hague, Netherlands, Oct. 2020, pp. 247-254 [Baidu Scholar]
X. Liu, M. Shahidehpoer, Z. Li et al., “Power system risk assessment in cyber attacks considering the role of protection systems,” IEEE Transactions on Smart Grid, vol. 8, no. 2, pp. 572-580, Mar. 2017. [Baidu Scholar]
R. Bulbul, Y. Gong, C. Ten et al., “Impact quantification of hypothesized attack scenarios on bus differential relays,” in Proceedings of Power Systems Computation conference, Wroclaw, Poland, Aug. 2014, pp. 1-7. [Baidu Scholar]
P. Wang, A. Ashok, and M. Govindarasu, “Cyber-physical risk assessment for smart grid system protection scheme,” in Proceedings of IEEE PES General Meeting, Denver, USA, Jul. 2015, pp. 1-5. [Baidu Scholar]
F. Wang, H. Wang, D. Chen et al., “Substation communication security research based on hybrid encryption of DES and RSA,” in Proceedings of 9th IEEE Intelligent Information Hiding and Multimedia Signal Processing, Beijing, China, Jul. 2014, pp. 437-441. [Baidu Scholar]
J. Hong, C. Liu, and M. Govindarasu, “Integrated anomaly detection for cyber security of the substations,” IEEE Transactions on Smart Grid, vol. 5, no. 4, pp. 1643-1653, Jul. 2014 [Baidu Scholar]
S. Sheng, W. Chan, K. Li et al., “Context information-based cyber security defense of protection system,” IEEE Transactions on Power Delivery, vol. 22, no. 3, pp. 1477-1481, Jul. 2007. [Baidu Scholar]
K. J. Ross, K. M. Hopkinson, and M. Pachter, “Using a distributed agent-based communication enabled special protection system to enhance smart grid security,” IEEE Transactions on Smart Grid, vol. 4, no. 2, pp. 1216-1224, Jun. 2013. [Baidu Scholar]
M. S. Rahman, A. M. T. Oo, M. A. Mahmud et al., “A multi-agent approach for security of future power grid protection systems,” in Proceedings of IEEE PES General Meeting, Boston, USA, Nov. 2016, pp. 17-21. [Baidu Scholar]
M. S. Rahman, M. A. Mahumd, A. M. T. Oo et al., “Multi-agent approach for enhancing security of protection schemes in cyber-physical energy systems,” IEEE Transactions on Industrial Informatics, vol. 13, no. 2, pp. 436-447, Apr. 2017. [Baidu Scholar]
A. Ameli, A. Hooshyar, E. F. El-Saadany et al., “An intrusion detection method for line current differential relays,” IEEE Transactions on Information and Forensics and Security, vol. 15, pp. 329-344, May 2019. [Baidu Scholar]
V. Dave and A. Sharma, “Operation of differential relay for power transformer using support vector machine,” in Proceedings of IEEE PES Transmission & Distribution Conference & Exposition, Chicago, USA, May 2008, pp.1-8. [Baidu Scholar]
S. Pan, T. Morris, and U. Adhikari, “Developing a hybrid intrusion detection system using data mining for power systems,” IEEE Transactions on Smart Grid, vol. 6, no. 6, pp. 3104-3113, Nov. 2015. [Baidu Scholar]
S. Basumallik, R. Ma, and S. Eftekharnejad, “Packet-data anomaly detection in PMU-based state estimator using convolutional neural network,” International Journal of Electrical Power and Energy Systems, vol. 107, pp. 690-702, May 2019. [Baidu Scholar]
H. Xiong and C. Sun, “Artificial immune network classification algorithm for fault diagnosis of power transformer,” IEEE Transactions on Power Delivery, vol. 22, no. 2, pp. 930-935, Apr. 2007. [Baidu Scholar]
W. Tang, X. Yang, X. Xie et al., “Avidity-model based clonal selection algorithm for network intrusion detection,” in Proceedings of 18th IEEE International Workshop on Quality of Service, Beijing, China, Aug. 2010, pp. 1-5. [Baidu Scholar]
E. Alizadeh, N. Meskin, and K. Khorasani, “A negative selection immune system inspired methodology for fault diagnosis of wind turbines,” IEEE Transactions on Cybernetics, vol. 47, no. 11, pp. 3788-3813, Nov. 2017. [Baidu Scholar]
D. Dasguptaa, S. Yua, and F. Ninob, “Recent advances in artificial immune systems: models and applications,” Applied Soft Computing, vol. 11, no. 2, pp.1574-1587, Mar. 2011. [Baidu Scholar]
F. Selahshoor, H. Jazayeriy, and H. Omranpour, “Intrusion detection systems using real-valued negative selection algorithm with optimized detectors,” in Proceedings of 5th Iranian Conference on Signal Processing and Intelligent Systems, Shahrood, Iran, Dec. 2019, pp. 1-5. [Baidu Scholar]
Y. Ren, X. Wang, and C. Zhang, “A novel fault diagnosis method based on improved negative selection algorithm,” IEEE Transactions on Instrumentation and Measurement, vol. 70, pp. 1-8, Oct. 2020 [Baidu Scholar]
Z. Li and T. Li, “Using known nonself samples to improve negative selection algorithm,” Applied Intelligence, doi: 10.1007/s10489-021-02323-4 [Baidu Scholar]
H. Deng and T. Yang, “A negative selection algorithm based on adaptive immunoregulation,” in Proceedings of 5th International Conference on Computational Intelligence and Applications, Beijing, China, Jun. 2020, pp. 177-182. [Baidu Scholar]
H. Alrubayyi, G. Goteng, M. Jaber et al., “A novel negative and positive selection algorithm to detect unknown malware in the IoT,” In Proceedings of IEEE Conference on Computer Communications Workshops, Vancouver, Canada, May 2021, pp. 1-6. [Baidu Scholar]
S. Forrest, A. S. Perelson, L. Allen et al., “Self-nonself discrimination in a computer,” in Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, USA, May 1994, pp. 202-212. [Baidu Scholar]
J. Zhou and D. Dasgupta, “V-detector: an efficient negative selection algorithm with ‘probably adequate’ detector coverage,” Information Sciences, vol. 179, no. 10, pp. 1390-1406, Apr. 2009. [Baidu Scholar]
J. Zhou, “A boundary-aware negative selection algorithm,” in Proceedings of 9th IASTED International Conference on Artificial Intelligence and Soft Computing, Benidorm, Spain, Sept. 2005, pp. 12-14. [Baidu Scholar]
Lim T-S. (2021, Jan.). Haberman’s survival data set, UCI machine learning repository. [Online]. Available: https://archive-beta.ics.uci.edu/ml/datasets/haberman+s+survival [Baidu Scholar]