A Mechanism for Detecting Data Manipulation Attacks on PMU Data

被引:0
|
作者
Pal, Seemita [1 ]
Sikdar, Biplab
机构
[1] Rensselaer Polytech Inst, Dept ECSE, Troy, NY 12180 USA
关键词
Cyber-security; smart grid; synchrophasor network;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The fundamental role of the measurement and control information in the normal operation of smart grids makes cyber-security a critical necessity for existing and future power systems. This paper addresses the problem of detecting data manipulation attacks on smart grids, in the particular context of the data from Phasor Measurement Units (PMUs). The proposed methodology is based on comparing the estimates of the transmission line parameters as obtained from the PMU data with their known values. Data modification attacks are then detected when a statistically significant deviation is observed in the estimated and nominal values. In this proof-of-concept, workin-progress paper, we verify the proposed detection methodology using mathematical analysis.
引用
收藏
页码:253 / 257
页数:5
相关论文
共 50 条
  • [21] Security in Process: Detecting Attacks in Industrial Process Data
    Anton, Simon D. Duque
    Lohfink, Anna Pia
    Garth, Christoph
    Schotten, Hans Dieter
    THIRD CENTRAL EUROPEAN CYBERSECURITY CONFERENCE (CECC 2019), 2019,
  • [22] Distributed Data Fusion for Detecting Sybil Attacks in VANETs
    El Zoghby, Nicole
    Cherfaoui, Veronique
    Ducourthial, Bertrand
    Denoeux, Thierry
    BELIEF FUNCTIONS: THEORY AND APPLICATIONS, 2012, 164 : 351 - 358
  • [23] DETECTING ADVERSARIAL ATTACKS IN TIME-SERIES DATA
    Abdu-Aguye, Mubarak G.
    Gomaa, Walid
    Makihara, Yasushi
    Yagi, Yasushi
    2020 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2020, : 3092 - 3096
  • [24] A Data Normalization Technique for Detecting Cyber Attacks on UAVs
    Basan, Elena
    Basan, Alexandr
    Nekrasov, Alexey
    Fidge, Colin
    Abramov, Evgeny
    Basyuk, Anatoly
    DRONES, 2022, 6 (09)
  • [25] Detecting impact factor manipulation with data mining techniques
    Dong-Hui Yang
    Xin Li
    Xiaoxia Sun
    Jie Wan
    Scientometrics, 2016, 109 : 1989 - 2005
  • [26] Detecting impact factor manipulation with data mining techniques
    Yang, Dong-Hui
    Li, Xin
    Sun, Xiaoxia
    Wan, Jie
    SCIENTOMETRICS, 2016, 109 (03) : 1989 - 2005
  • [27] A behavioral model to detect data manipulation attacks of synchrophasor measurements
    Stylianou, Leonidas
    Hadjidemetriou, Lenos
    Asprou, Markos
    Zacharia, Lazaros
    Michael, Maria K.
    2021 IEEE PES INNOVATIVE SMART GRID TECHNOLOGY EUROPE (ISGT EUROPE 2021), 2021, : 383 - 388
  • [28] RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks
    Cohen, Shai
    Levy, Efrat
    Shaked, Avi
    Cohen, Tair
    Elovici, Yuval
    Shabtai, Asaf
    SENSORS, 2022, 22 (11)
  • [29] DeFiRanger: Detecting DeFi Price Manipulation Attacks
    Wu, Siwei
    Yu, Zhou
    Wang, Dabao
    Zhou, Yajin
    Wu, Lei
    Wang, Haoyu
    Yuan, Xingliang
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 4147 - 4161
  • [30] Data Relation Analysis Focusing on Plural Data Transition for Detecting Attacks on Vehicular Network
    Yajima, Jun
    Hasebe, Takayuki
    Okubo, Takao
    ADVANCES IN NETWORKED-BASED INFORMATION SYSTEMS, NBIS-2019, 2020, 1036 : 270 - 280