Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon openaccess Detection of false data injection attacks against state estimation in smart grids based on a mixture Gaussian distribution learning method

One of the most addressed attacks in power networks is false data injection (FDI) which affects monitoring, fault detection, and state estimation integrity by tampering measurement data. To detect such devastating attack, the authors propose a statistical anomaly detection approach based on Gaussian mixture model, while some appropriate machine learning approaches are evaluated for detecting FDI. It should be noted that a finite mixture model is a convex combination of some probability density functions and combining the properties of several probability functions, making the mixture models capable of approximating any arbitrary distribution. Simulations results confirm superior performance of the proposed method over conventional bad data detection (BDD) tests and other learning approaches that studied in this article. It should be noted that using data which change significantly over a day can be highly clustered, and therefore, detected much easier compared with small changes in the loads. So without loss of generality, in the simulations it is assumed that the power demand follows a uniform distribution in a small range. However, the detector can be trained regularly based on the updated load profile.

References

    1. 1)
      • 23. Bobba, R.B., Rogers, K.M., Wang, Q., et al: ‘Detecting false data injection attacks on dc state estimation’. Preprints of the First Workshop on Secure Control Systems, CPSWEEK, 2010.
    2. 2)
      • 44. McLachlan, G., Peel, D.: ‘Finite mixture models’ (John Wiley & Sons, 2004).
    3. 3)
      • 43. Chandola, V., Banerjee, A., Kumar, V.: ‘Anomaly detection: a survey’, ACM computing surveys (CSUR), 2009, 41, p. 15.
    4. 4)
      • 28. Hink, R.C.B., Beaver, J.M., Buckner, M.A., et al: ‘Machine learning for power system disturbance and cyber-attack discrimination’. 2014 7th Int. Symp. Resilient Control Systems (ISRCS), 2014, pp. 18.
    5. 5)
      • 29. Yan, J., He, H., Zhong, X., et al: ‘Q-learning based vulnerability analysis of smart grid against sequential topology attacks’, IEEE Trans. Inf. Forensics Sec., 2017, 12, (1), pp. 200210.
    6. 6)
      • 5. Liu, Y., Ning, P., Reiter, M.K.: ‘False data injection attacks against state estimation in electric power grids’, ACM Trans. Inf. Syst. Secur., 2011, 14, p. 13.
    7. 7)
      • 21. Huang, H., Yan, Q., Zhao, Y., et al: ‘False data separation for data security in smart grids’, Knowl. Inf. Syst., 2017, 52, (3), pp. 815834.
    8. 8)
      • 37. Schweppe, F.: ‘Power system state estimation, parts I, II and III’, IEEE Trans. Power Apparatus Syst., 1970, 89, pp. 120135.
    9. 9)
      • 51. Salmasi, F.: ‘A self-healing induction motor drive with model free sensor tampering and sensor fault detection, isolation, and compensation’, IEEE Trans. Ind. Electron., 2017, 8, (64), pp. 61056115.
    10. 10)
      • 45. Costa Filho, I.G.: ‘Mixture models for the analysis of gene expression: integration of multiple experiments and cluster validation’, Citeseer, 2008.
    11. 11)
      • 41. Kulkarni, S., Harman, G.: ‘An elementary introduction to statistical learning theory’ (John Wiley & Sons, 2011), vol. 853.
    12. 12)
      • 34. Zimmerman, R.D., Murillo-Sánchez, C.E., Thomas, R.J.: ‘MATPOWER: Steady-state operations, planning, and analysis tools for power systems research and education’, IEEE Trans. Power Syst., 2011, 26, pp. 1219.
    13. 13)
      • 20. Ozay, M., Esnaola, I., Vural, F.T.Y., et al: ‘Distributed models for sparse attack construction and state vector estimation in the smart grid’. 2012 IEEE Third Int. Conf. Smart Grid Communications (SmartGridComm), 2012, pp. 306311.
    14. 14)
      • 7. Huang, Y., Esmalifalak, M., Nguyen, H., et al: ‘Bad data injection in smart grid: attack and defense mechanisms’, IEEE Commun. Mag., 2013, 51, pp. 2733.
    15. 15)
      • 40. Williams, C.K., Rasmussen, C.E.: ‘Smoothing, weight functions and equivalent kernels’, in (Eds): ‘Gaussian processes for machine learning’ (The MIT Press, Cambridge, 2006), pp. 2426.
    16. 16)
      • 12. Manandhar, K., Cao, X., Hu, F., et al: ‘Detection of faults and attacks including false data injection attack in smart grid using kalman filter’, IEEE Trans. Control Netw. Syst., 2014, 1, pp. 370379.
    17. 17)
      • 1. Zhan, Z., Xu, M., Xu, S.: ‘Characterizing honeypot-captured cyber attacks: statistical framework and case study’, IEEE Trans. Inf. Forensics Sec., 2013, 8, pp. 17751789.
    18. 18)
      • 38. Cristianini, N., Shawe-Taylor, J.: ‘An introduction to support vector machines and other kernel-based learning methods’ (Cambridge University Press, 2000).
    19. 19)
      • 30. Ozay, M., Esnaola, I., Vural, F.T.Y., et al: ‘Machine learning methods for attack detection in the smart grid’, IEEE Trans. Neural Netw. Learn. Syst., 2016, 27, pp. 17731786.
    20. 20)
      • 8. Liang, G., Zhao, J., Luo, F., et al: ‘A review of false data injection attacks against modern power systems’, IEEE Trans. Smart Grid, 2017, 8, (4), pp. 16301638.
    21. 21)
      • 17. Yu, Z.-H., Chin, W.-L.: ‘Blind false data injection attack using pca approximation method in smart grid’, IEEE Trans. Smart Grid, 2015, 6, pp. 12191226.
    22. 22)
      • 42. Kuusela, M., Vatanen, T., Malmi, E., et al: ‘Semi-supervised anomaly detection-towards model-independent searches of new physics’. J. Phys. Conf. Ser., 2012, p. 012032.
    23. 23)
      • 49. Chinchor, N., Sundheim, B.: ‘MUC-5 evaluation metrics’. Proc. 5th Conf. Message Understanding, 1993, pp. 6978.
    24. 24)
      • 2. Yan, Y., Qian, Y., Sharif, H., et al: ‘A survey on cyber security for smart grid communications’, IEEE Commun. Surv. Tutor., 2012, 14, pp. 9981010.
    25. 25)
      • 47. Bordes, A., Ertekin, S., Weston, J., et al: ‘Fast kernel classifiers with online and active learning’, J. Mach. Learn. Res., 2005, 6, pp. 15791619.
    26. 26)
      • 13. Sedghi, H., Jonckheere, E.: ‘Statistical structure learning to ensure data integrity in smart grid’, IEEE Trans. Smart Grid, 2015, 6, pp. 19241933.
    27. 27)
      • 15. Qi, J., Hahn, A., Lu, X., et al: ‘Cybersecurity for distributed energy resources and smart inverters’, IET Cyber Physical Syst. Theory Appl., 2016, 1, pp. 2839.
    28. 28)
      • 10. Li, S., Yılmaz, Y., Wang, X.: ‘Quickest detection of false data injection attack in wide-area smart grids’, IEEE Trans. Smart Grid, 2015, 6, pp. 27252735.
    29. 29)
      • 18. Liu, X., Li, Z.: ‘Local load redistribution attacks in power systems with incomplete network information’, IEEE Trans. Smart Grid, 2014, 5, pp. 16651676.
    30. 30)
      • 25. Candès, E.J., Li, X., Ma, Y., et al: ‘Robust principal component analysis?’, J. ACM, 2011, 58, p. 11.
    31. 31)
      • 46. Bottou, L., Lin, C.-J.: ‘Support vector machine solvers’, in Bottou, L., Chapelle, O., DeCoste, D., et al (Ed.), ‘Large Scale Kernel Machines’ (MIT Press, 2007), pp. 301320.
    32. 32)
      • 24. Bi, S., Zhang, Y.J.: ‘Graphical methods for defense against false-data injection attacks on power system state estimation’, IEEE Trans. Smart Grid, 2014, 5, pp. 12161227.
    33. 33)
      • 48. Weng, Y., Negi, R., Faloutsos, C., et al: ‘Robust data-driven state estimation for smart grid’, IEEE Trans. Smart Grid, 2017, 8, (4), pp. 19561967.
    34. 34)
      • 31. Yan, J., Tang, B., He, H.: ‘Detection of false data attacks in smart grid with supervised learning’. 2016 Int. Joint Conf. Neural Networks (IJCNN), 2016, pp. 13951402.
    35. 35)
      • 36. Wood, A.J., Wollenberg, B.F.: ‘Power generation, operation, and control’ (John Wiley & Sons, 2012).
    36. 36)
      • 14. Ahmadloo, F., Salmasi, F.R.: ‘A cyber-attack on communication link in distributed systems and detection scheme based on H-infinity filtering’. 2017 IEEE Int. Conf. Industrial Technology (ICIT), Toronto, ON, 2017, pp. 698703.
    37. 37)
      • 26. Fadlullah, Z.M., Fouda, M.M., Kato, N., et al: ‘An early warning system against malicious activities for smart grid communications’, IEEE Netw., 2011, 25, pp. 5055.
    38. 38)
      • 39. Steinwart, I., Christmann, A.: ‘Support vector machines’ (Springer Science & Business Media, 2008).
    39. 39)
      • 6. Cheniae, M., Mili, L., Rousseeuw, P.: ‘Identification of multiple interacting bad data via power system decomposition’, IEEE Trans. Power Syst., 1996, 11, pp. 15551563.
    40. 40)
      • 35. Grainger, J.J., Stevenson, W.D.: ‘Power system analysis’ (McGraw-Hill, 1994).
    41. 41)
      • 33. Hendrickx, J.M., Johansson, K.H., Jungers, R.M., et al: ‘Efficient computations of a security index for false data attacks in power networks’, IEEE Trans. Autom. Control, 2014, 59, pp. 31943208.
    42. 42)
      • 9. He, H., Yan, J.: ‘Cyber-physical attacks and defences in the smart grid: a survey’, IET Cyber-Physical Syst. Theory Appl., 2016, 1, pp. 1327.
    43. 43)
      • 32. Kosut, O., Jia, L., Thomas, R.J., et al: ‘Malicious data attacks on the smart grid’, IEEE Trans. Smart Grid, 2011, 2, pp. 645658.
    44. 44)
      • 4. Ericsson, G.N.: ‘Cyber security and power system communication—essential parts of a smart grid infrastructure’, IEEE Trans. Power Deliv., 2010, 25, pp. 15011507.
    45. 45)
      • 22. Yang, Q., Yang, J., Yu, W., et al: ‘On false data-injection attacks against power system state estimation: modeling and countermeasures’, IEEE Trans. Parallel Distrib. Syst., 2014, 25, pp. 717729.
    46. 46)
      • 11. Liu, L., Esmalifalak, M., Ding, Q., et al: ‘Detecting false data injection attacks on power grid by sparse optimization’, IEEE Trans. Smart Grid, 2014, 5, pp. 612621.
    47. 47)
      • 16. Li, Z., Jin, D., Hannon, C., et al: ‘Assessing and mitigating cybersecurity risks of traffic light systems in smart cities’, IET Cyber-Physical Syst. Theory Appl., 2016, 1, pp. 6069.
    48. 48)
      • 27. Zhang, Y., Wang, L., Sun, W., et al: ‘Distributed intrusion detection system in a multi-layer network architecture of smart grids’, IEEE Trans. Smart Grid, 2011, 2, pp. 796808.
    49. 49)
      • 19. Liu, X., Bao, Z., Lu, D., et al: ‘Modeling of local false data injection attacks with reduced network information’, IEEE Trans. Smart Grid, 2015, 6, pp. 16861696.
    50. 50)
      • 3. Wang, W., Lu, Z.: ‘Cyber security in the smart grid: survey and challenges’, Comput. Netw., 2013, 57, pp. 13441371.
    51. 51)
      • 50. Aitkin, M., Vu, D., Francis, B.: ‘A new bayesian approach for determining the number of components in a finite mixture’, Metron, 2015, 73, pp. 155176.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-cps.2017.0013
Loading

Related content

content/journals/10.1049/iet-cps.2017.0013
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address