Detection of Cyber-Attacks of Power Systems Through Benford's Law

被引:11
|
作者
Milano, Federico [1 ]
Gomez-Exposito, Antonio [2 ]
机构
[1] Univ Coll Dublin, Sch Elect & Elect Engn, Dublin D04 V1W8 4, Ireland
[2] Univ Seville, Elect Engn Dept, Seville 41092, Spain
基金
爱尔兰科学基金会;
关键词
Voltage measurement; Transmission line measurements; Power systems; Cyberattack; Power measurement; Computer hacking; Particle measurements; Benford’ s law; state estimation; cyber attack; bad data; FALSE DATA INJECTION;
D O I
10.1109/TSG.2020.3042897
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This letter proposes an application of the Benford's law for the detection of cyber attacks in power system state estimators. Benford's law, also known as 1st-digit law, states an unexpected property of the distribution of the first digit of certain sets of data, and has been found to apply to a surprisingly wide range of data domains. The first novel contribution of the letter is to show that the Benford's law applies to power system data as well. A relevant property of this law is its high sensitivity to manipulations and, in fact, it is often utilized to detect frauds. Based on this feature, the second contribution of the letter is to utilize the Benford's law to detect malicious data introduced by hackers in the supervisory control and data acquisition (SCADA) system of a transmission network. Tests based on power system models ranging from 9 to 21,177 buses show promising results.
引用
收藏
页码:2741 / 2744
页数:4
相关论文
共 50 条
  • [21] A Control and Attack Detection Scheme for Fuzzy Systems against Cyber-attacks
    Zhang, Haili
    Li, Linlin
    Qiao, Liang
    2023 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, FUZZ, 2023,
  • [22] Detection of Cyber-Attacks to Water Systems through Machine-Learning-Based Anomaly Detection in SCADA Data
    Chandy, Sarin E.
    Rasekh, Amin
    Barker, Zachary A.
    Campbell, Bruce
    Shafiee, M. Ehsan
    WORLD ENVIRONMENTAL AND WATER RESOURCES CONGRESS 2017: HYDRAULICS AND WATERWAYS AND WATER DISTRIBUTION SYSTEMS ANALYSIS, 2017, : 611 - 616
  • [23] Detection of Cyber-Attacks in Collaborative Intersection Control
    Keijzer, Twan
    Jarmolowitz, Fabian
    Ferrari, Riccardo M. G.
    2021 EUROPEAN CONTROL CONFERENCE (ECC), 2021, : 62 - 67
  • [24] Enhancing Robustness to Cyber-Attacks in Power Systems Through Multiple Least Trimmed Squares State Estimations
    Chakhchoukh, Yacine
    Ishii, Hideaki
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2016, 31 (06) : 4395 - 4405
  • [25] Detection of Cyber-Attacks with Zone Dividing and PCA
    Morita, T.
    Yogo, S.
    Koike, M.
    Hamaguchi, T.
    Jung, S.
    Koshijima, I.
    Hashimoto, Y.
    17TH INTERNATIONAL CONFERENCE IN KNOWLEDGE BASED AND INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS - KES2013, 2013, 22 : 727 - 736
  • [26] Detection of collaborative misbehaviour in distributed cyber-attacks
    Thoma, Marios
    Hadjicostis, Christoforos N.
    COMPUTER COMMUNICATIONS, 2021, 174 : 28 - 41
  • [27] A Comprehensive Review of the Cyber-Attacks and Cyber-Security on Load Frequency Control of Power Systems
    Mohan, Athira M.
    Meskin, Nader
    Mehrjerdi, Hasan
    ENERGIES, 2020, 13 (15)
  • [28] Modeling cyber-attacks on Industrial Control Systems
    Paliath, Vivin
    Shakarian, Paulo
    IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: CYBERSECURITY AND BIG DATA, 2016, : 316 - 318
  • [29] Cyber-attacks on health-care systems
    Devi, Sharmila
    LANCET ONCOLOGY, 2023, 24 (04): : 148 - 148
  • [30] TAXONOMY OF SEVERITY OF CYBER-ATTACKS IN CYBER-MANUFACTURING SYSTEMS
    Espinoza-Zelaya, Carlos
    Moon, Young
    PROCEEDINGS OF ASME 2022 INTERNATIONAL MECHANICAL ENGINEERING CONGRESS AND EXPOSITION, IMECE2022, VOL 2B, 2022,