3,515 research outputs found
Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements
The false data injection (FDI) attack cannot be detected by the traditional
anomaly detection techniques used in the energy system state estimators. In
this paper, we demonstrate how FDI attacks can be constructed blindly, i.e.,
without system knowledge, including topological connectivity and line reactance
information. Our analysis reveals that existing FDI attacks become detectable
(consequently unsuccessful) by the state estimator if the data contains grossly
corrupted measurements such as device malfunction and communication errors. The
proposed sparse optimization based stealthy attacks construction strategy
overcomes this limitation by separating the gross errors from the measurement
matrix. Extensive theoretical modeling and experimental evaluation show that
the proposed technique performs more stealthily (has less relative error) and
efficiently (fast enough to maintain time requirement) compared to other
methods on IEEE benchmark test systems.Comment: Keywords: Smart grid, False data injection, Blind attack, Principal
component analysis (PCA), Journal of Computer and System Sciences, Elsevier,
201
Machine Learning Methods for Attack Detection in the Smart Grid
Attack detection problems in the smart grid are posed as statistical learning
problems for different attack scenarios in which the measurements are observed
in batch or online settings. In this approach, machine learning algorithms are
used to classify measurements as being either secure or attacked. An attack
detection framework is provided to exploit any available prior knowledge about
the system and surmount constraints arising from the sparse structure of the
problem in the proposed approach. Well-known batch and online learning
algorithms (supervised and semi-supervised) are employed with decision and
feature level fusion to model the attack detection problem. The relationships
between statistical and geometric properties of attack vectors employed in the
attack scenarios and learning algorithms are analyzed to detect unobservable
attacks using statistical learning methods. The proposed algorithms are
examined on various IEEE test systems. Experimental analyses show that machine
learning algorithms can detect attacks with performances higher than the attack
detection algorithms which employ state vector estimation methods in the
proposed attack detection framework.Comment: 14 pages, 11 Figure
Information-Theoretic Attacks in the Smart Grid
Gaussian random attacks that jointly minimize the amount of information
obtained by the operator from the grid and the probability of attack detection
are presented. The construction of the attack is posed as an optimization
problem with a utility function that captures two effects: firstly, minimizing
the mutual information between the measurements and the state variables;
secondly, minimizing the probability of attack detection via the
Kullback-Leibler divergence between the distribution of the measurements with
an attack and the distribution of the measurements without an attack.
Additionally, a lower bound on the utility function achieved by the attacks
constructed with imperfect knowledge of the second order statistics of the
state variables is obtained. The performance of the attack construction using
the sample covariance matrix of the state variables is numerically evaluated.
The above results are tested in the IEEE 30-Bus test system.Comment: 2017 IEEE International Conference on Smart Grid Communications
(SmartGridComm
Sparse Malicious False Data Injection Attacks and Defense Mechanisms in Smart Grids
This paper discusses malicious false data injection attacks on the wide area measurement and monitoring system in smart grids. Firstly, methods of constructing sparse stealth attacks are developed for two typical scenarios: random attacks in which arbitrary measurements can be compromised and targeted attacks in which specified state variables are modified. It is already demonstrated that stealth attacks can always exist if the number of compromised measurements exceeds a certain value. In this paper it is found that random undetectable attacks can be accomplished by modifying only a much smaller number of measurements than this value. It is well known that protecting the system from malicious attacks can be achieved by making a certain subset of measurements immune to attacks. An efficient greedy search algorithm is then proposed to quickly find this subset of measurements to be protected to defend against stealth attacks. It is shown that this greedy algorithm has almost the same performance as the brute-force method but without the combinatorial complexity. Thirdly, a robust attack detection method is discussed. The detection method is designed based on the robust principal component analysis problem by introducing element-wise constraints. This method is shown to be able to identify the real measurements as well as attacks even when only
partial observations are collected. The simulations are conducted based on IEEE test systems
Information Theoretic Data Injection Attacks with Sparsity Constraints
Information theoretic sparse attacks that minimize simultaneously the
information obtained by the operator and the probability of detection are
studied in a Bayesian state estimation setting. The attack construction is
formulated as an optimization problem that aims to minimize the mutual
information between the state variables and the observations while guaranteeing
the stealth of the attack. Stealth is described in terms of the
Kullback-Leibler (KL) divergence between the distributions of the observations
under attack and without attack. To overcome the difficulty posed by the
combinatorial nature of a sparse attack construction, the attack case in which
only one sensor is compromised is analytically solved first. The insight
generated in this case is then used to propose a greedy algorithm that
constructs random sparse attacks. The performance of the proposed attack is
evaluated in the IEEE 30 Bus Test Case.Comment: Submitted to SGC 202
- …