Detection of Cyber-Attacks of Power Systems Through Benford's Law

被引:11
|
作者
Milano, Federico [1 ]
Gomez-Exposito, Antonio [2 ]
机构
[1] Univ Coll Dublin, Sch Elect & Elect Engn, Dublin D04 V1W8 4, Ireland
[2] Univ Seville, Elect Engn Dept, Seville 41092, Spain
基金
爱尔兰科学基金会;
关键词
Voltage measurement; Transmission line measurements; Power systems; Cyberattack; Power measurement; Computer hacking; Particle measurements; Benford’ s law; state estimation; cyber attack; bad data; FALSE DATA INJECTION;
D O I
10.1109/TSG.2020.3042897
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This letter proposes an application of the Benford's law for the detection of cyber attacks in power system state estimators. Benford's law, also known as 1st-digit law, states an unexpected property of the distribution of the first digit of certain sets of data, and has been found to apply to a surprisingly wide range of data domains. The first novel contribution of the letter is to show that the Benford's law applies to power system data as well. A relevant property of this law is its high sensitivity to manipulations and, in fact, it is often utilized to detect frauds. Based on this feature, the second contribution of the letter is to utilize the Benford's law to detect malicious data introduced by hackers in the supervisory control and data acquisition (SCADA) system of a transmission network. Tests based on power system models ranging from 9 to 21,177 buses show promising results.
引用
收藏
页码:2741 / 2744
页数:4
相关论文
共 50 条
  • [31] Toward Detection and Attribution of Cyber-Attacks in IoT-Enabled Cyber-Physical Systems
    Jahromi, Amir Namavar
    Karimipour, Hadis
    Dehghantanha, Ali
    Choo, Kim-Kwang Raymond
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (17) : 13712 - 13722
  • [32] Cyber-attacks against cyber-physical power systems security: State estimation, attacks reconstruction and defense strategy
    Su, Qingyu
    Wang, Handong
    Sun, Chaowei
    Li, Bo
    Li, Jian
    APPLIED MATHEMATICS AND COMPUTATION, 2022, 413
  • [33] Secure SCADA Communication Network for Detecting and Preventing Cyber-Attacks on Power Systems
    Chalamasetty, Goutham K.
    Mandal, Paras
    Tseng, Tzu-Liang
    2016 CLEMSON UNIVERSITY POWER SYSTEMS CONFERENCE (PSC), 2016,
  • [34] ExtHT: A hybrid tracing method for cyber-attacks in power industrial control systems
    Chen, Yang-Rong
    Wang, Yu
    Huang, Gui-Rong
    Li, Jun-E
    ISA TRANSACTIONS, 2023, 136 : 1 - 15
  • [35] A stacked deep learning approach to cyber-attacks detection in industrial systems: application to power system and gas pipeline systems
    Wu Wang
    Fouzi Harrou
    Benamar Bouyeddou
    Sidi-Mohammed Senouci
    Ying Sun
    Cluster Computing, 2022, 25 : 561 - 578
  • [36] ANTIFORENSICS ATTACKS TO BENFORD'S LAW FOR THE DETECTION OF DOUBLE COMPRESSED IMAGES
    Milani, Simone
    Tagliasacchi, Marco
    Tubaro, Stefano
    2013 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2013, : 3053 - 3057
  • [37] A stacked deep learning approach to cyber-attacks detection in industrial systems: application to power system and gas pipeline systems
    Wang, Wu
    Harrou, Fouzi
    Bouyeddou, Benamar
    Senouci, Sidi-Mohammed
    Sun, Ying
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (01): : 561 - 578
  • [38] An Algebraic Detection Approach for Control Systems under Multiple Stochastic Cyber-attacks
    Yumei Li
    Holger Voos
    Mohamed Darouach
    Changchun Hua
    IEEE/CAA Journal of Automatica Sinica, 2015, 2 (03) : 258 - 266
  • [39] An algebraic detection approach for control systems under multiple stochastic cyber-attacks
    Li, Yumei
    Voos, Holger
    Darouach, Mohamed
    Hua, Changchun
    IEEE/CAA Journal of Automatica Sinica, 2015, 2 (03) : 258 - 266
  • [40] Detection of Cyber-attacks to indoor real time localization systems for autonomous robots
    Manuel Guerrero-Higueras, Angel
    DeCastro-Garcia, Noemi
    Matellan, Vicente
    ROBOTICS AND AUTONOMOUS SYSTEMS, 2018, 99 : 75 - 83