2408.02011
Isolating Signatures of Cyberattacks under Stressed Grid Conditions
Sanchita Ghosh, Syed Ahsan Raza Naqvi, Sai Pushpak Nandanoori, Soumya Kundu
incompletemedium confidence
- Category
- Not specified
- Journal tier
- Specialist/Solid
- Processed
- Sep 28, 2025, 12:56 AM
- arXiv Links
- Abstract ↗PDF ↗
Audit review
The paper defines the Δ-score as Δ_i = exp(−τ d(i,*)) with d(i,*) a probabilistic distance (KL or JS) to the centroid v* = (1/p)∑_i v_i, and uses moving windows to visualize and compare outliers; however, it provides no formal guarantees about separation, threshold selection, or time-uniform identification—explicitly noting the work is a first step and that automated detection is future work. These elements are descriptive and empirical, not theorematic . By contrast, the model’s solution gives a correct, self-contained mathematical treatment under an explicit separation assumption δ>0: it proves strict ranking (Δ_attacked < Δ_nominal), exact threshold conditions, and uniform-in-time conditions for ranking and a single threshold. The logic (monotonicity of exp(−τ·), extremal relations, and bounds) is sound. Minor caveats: the model’s ‘iff’ statement for uniform ranking should be read with the finite-window qualifier it later adds; its “conservative” band using both nominal extrema may be empty unless δ is large enough. These do not affect the core correctness.
Referee report (LaTeX)
\textbf{Recommendation:} major revisions \textbf{Journal Tier:} specialist/solid \textbf{Justification:} Promising, practically relevant methodology with clear empirical observations; however, the manuscript is a work-in-progress and lacks formal detection guarantees, thresholding principles, and rigorous treatment of time-varying detectability. Adding even stylized theorems or a systematic empirical thresholding protocol would materially strengthen the contribution.