Detection of Cyber-Attacks of Power Systems Through Benford's Law

被引:11
|
作者
Milano, Federico [1 ]
Gomez-Exposito, Antonio [2 ]
机构
[1] Univ Coll Dublin, Sch Elect & Elect Engn, Dublin D04 V1W8 4, Ireland
[2] Univ Seville, Elect Engn Dept, Seville 41092, Spain
基金
爱尔兰科学基金会;
关键词
Voltage measurement; Transmission line measurements; Power systems; Cyberattack; Power measurement; Computer hacking; Particle measurements; Benford’ s law; state estimation; cyber attack; bad data; FALSE DATA INJECTION;
D O I
10.1109/TSG.2020.3042897
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This letter proposes an application of the Benford's law for the detection of cyber attacks in power system state estimators. Benford's law, also known as 1st-digit law, states an unexpected property of the distribution of the first digit of certain sets of data, and has been found to apply to a surprisingly wide range of data domains. The first novel contribution of the letter is to show that the Benford's law applies to power system data as well. A relevant property of this law is its high sensitivity to manipulations and, in fact, it is often utilized to detect frauds. Based on this feature, the second contribution of the letter is to utilize the Benford's law to detect malicious data introduced by hackers in the supervisory control and data acquisition (SCADA) system of a transmission network. Tests based on power system models ranging from 9 to 21,177 buses show promising results.
引用
收藏
页码:2741 / 2744
页数:4
相关论文
共 50 条
  • [41] Design of a Cosimulation Platform With Hardware-in-the-Loop for Cyber-Attacks on Cyber-Physical Power Systems
    Liu, Zengji
    Wang, Qi
    Tang, Yi
    IEEE ACCESS, 2020, 8 (08): : 95997 - 96005
  • [42] A Review on Research of Cyber-attacks and Defense in Cyber Physical Power Systems Part One Modelling and Evaluation
    Wang Q.
    Li M.
    Tang Y.
    Ni M.
    Dianli Xitong Zidonghua/Automation of Electric Power Systems, 2019, 43 (09): : 9 - 21
  • [43] Sequential Detection of Cyber-attacks Using a Classification Filter
    Cai, Xiaojuan
    Feng, Yaokai
    Sakurai, Kouichi
    2021 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS DASC/PICOM/CBDCOM/CYBERSCITECH 2021, 2021, : 659 - 666
  • [44] Cyber-Attacks Detection & Protection in Kuwait government sectors
    Al-Enezi, Khalid Abdulkareem
    Al-shaikhli, Imad Fakhri
    Al-kandari, Abdul Rahman
    Aldabbagh, Sufyan Salim Mahmood
    3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES ACSAT 2014, 2014, : 50 - 55
  • [45] Modeling Network Systems Under Simultaneous Cyber-Attacks
    Da, Gaofeng
    Xu, Maochao
    Zhao, Peng
    IEEE TRANSACTIONS ON RELIABILITY, 2019, 68 (03) : 971 - 984
  • [46] Distributed Quickest Detection of Cyber-Attacks in Smart Grid
    Kurt, Mehmet Necip
    Yilmaz, Yasin
    Wang, Xiaodong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (08) : 2015 - 2030
  • [47] Reliability Analysis of Cyber-Physical Systems Considering Cyber-Attacks
    Fang, Z. H.
    Mo, H. D.
    Wang, Y.
    2017 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM), 2017, : 364 - 368
  • [48] On Resilient Design of Cooperative Systems in Presence of Cyber-Attacks
    Sadabadi, Mahdieh S.
    Gusrialdi, Azwirman
    2021 EUROPEAN CONTROL CONFERENCE (ECC), 2021, : 946 - 951
  • [49] Robust H∞ cyber-attacks estimation for control systems
    Li Yumei
    Holger, Voos
    Mohamed, Daroijach
    2014 33RD CHINESE CONTROL CONFERENCE (CCC), 2014, : 3124 - 3129
  • [50] A model of deception during cyber-attacks on information systems
    Rowe, NC
    2004 IEEE 1ST SYMPOSIUM ON MULTI-AGENT SECURITY & SURVIVABILITY, 2004, : 21 - 30