Modified Matrix Completion-Based Detection of Stealthy Data Manipulation Attacks in Low Observable Distribution Systems

被引:0
|
作者
Rajasekaran, James Ranjith Kumar [1 ]
Natarajan, Balasubramaniam [1 ]
Pahwa, Anil [1 ]
机构
[1] Kansas State Univ, Elect & Comp Engn Dept, Manhattan, KS 66506 USA
关键词
Bad data detection; distribution system; matrix completion; moving target defence; state estimation; DATA INJECTION ATTACKS; STATE ESTIMATION; D-FACTS; PERTURBATION; DEFENSE;
D O I
10.1109/TSG.2023.3266834
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A composite detection technique against stealthy data manipulations is developed in this paper for distribution networks that are low observable. Attack detection strategies typically rely on state estimation which becomes challenging when limited measurements are available. In this paper, a modified matrix completion approach provides estimates of the system state and its error variances for the locations in the network where measurements are unavailable. Using the error statistics and their corresponding state estimates, bad data detection can be carried out using the chi-squared test. The proposed approach employs a moving target defence strategy (MTD) where the network parameters are perturbed through distributed flexible AC transmission system (D-FACTS) devices such that stealthy data manipulation attacks can be exposed in the form of bad data. Thus, the bad data detection approach developed in this paper can detect stealthy attacks using the MTD strategy. This technique is implemented on 37-bus and 123-bus three-phase unbalanced distribution networks to demonstrate the attack detection accuracy even for a low observable system.
引用
收藏
页码:4851 / 4862
页数:12
相关论文
共 50 条
  • [21] Truth Will Out: Departure-Based Process-Level Detection of Stealthy Attacks on Control Systems
    Aoudi, Wissam
    Iturbe, Mikel
    Almgren, Magnus
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 817 - 831
  • [22] Real-time detection of stealthy IoT-based cyber-attacks on power distribution systems: A novel anomaly prediction approach
    Sawas, Abdullah
    Farag, Hany E. Z.
    ELECTRIC POWER SYSTEMS RESEARCH, 2023, 223
  • [23] Chance-constrained vulnerability assessment of smart water distribution systems against stealthy false data injection attacks
    Raza, Nazia
    Moazeni, Faegheh
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2024, 44
  • [24] Matrix-Completion-Based False Data Injection Attacks Against Machine Learning Detectors
    Liu, Bo
    Wu, Hongyu
    Yang, Qihui
    Zhang, Hang
    Liu, Yajing
    Zhang, Yingchen
    IEEE TRANSACTIONS ON SMART GRID, 2024, 15 (02) : 2146 - 2163
  • [25] False Data Injection Attacks against Low Voltage Distribution Systems
    Radoglou-Grammatikis, Panagiotis
    Dalamagkas, Christos
    Lagkas, Thomas
    Zafeiropoulou, Magda
    Atanasova, Maria
    Zlatev, Pencho
    Boulogeorgos, Alexandros-Apostolos A.
    Argyriou, Vasileios
    Markakis, Evangelos K.
    Moscholios, Ioannis
    Sarigiannidis, Panagiotis
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 1856 - 1861
  • [26] Stealthy False Data Injection Attacks Detection and Classification in Cyber-Physical Systems Using Deep Reinforcement Learning
    Xin, Liang
    He, Guang
    Long, Zhiqiang
    IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2024, : 1 - 13
  • [27] Data Falsification Attacks on Consensus-Based Detection Systems
    Kailkhura, Bhavya
    Brahma, Swastik
    Varshney, Pramod K.
    IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2017, 3 (01): : 145 - 158
  • [28] Geometry-Based Data-Driven Complete Stealthy Attacks Against Cyber-Physical Systems
    Wang, Kaiyu
    Ye, Dan
    IEEE Transactions on Network Science and Engineering, 2024, 11 (06): : 5839 - 5849
  • [29] An Intrusion Detection Method Based on Self-Generated Coding Technology for Stealthy False Data Injection Attacks in Train-Ground Communication Systems
    Kong, Xiang-Yu
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2023, 70 (08) : 8468 - 8476
  • [30] Model-Based Detection of Coordinated Attacks (DCA) in Distribution Systems
    Sahani, Nitasha
    Liu, Chen-Ching
    IEEE Open Access Journal of Power and Energy, 2024, 11 : 558 - 570