High-Stealth False Data Attacks on Overloading Multiple Lines in Power Systems

被引:10
作者
Du, Min [1 ]
Wang, Lianhong [1 ]
Zhou, Yicong [2 ]
机构
[1] Hunan Univ, Coll Elect & Informat Engn, Changsha 410012, Peoples R China
[2] Univ Macau, Dept Comp & Informat Sci, Macau, Peoples R China
关键词
Data models; Security; Indexes; Power systems; Power measurement; Loss measurement; Load modeling; Cyber-attacks; multiple lines overloaded; high stealth; power systems;
D O I
10.1109/TSG.2022.3209524
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this letter, we present a single mixed-integer linear programming (MILP) model for high-stealth false data attacks (FDAs) on overloading a set of lines by injecting stealthy false data. The proposed model reveals that an intelligent attacker is able to deliberately construct a valid attack vector to overload multiple transmission lines while hiding it among normal data to evade advanced anomaly detection methods. In addition, the proposed cyber-attack mode can help the attacker optimally select the targeted lines. Simulation results on multiple large-scale test systems validate the effectiveness of the proposed approach.
引用
收藏
页码:1321 / 1324
页数:4
相关论文
共 14 条
[1]   Fast Screening of High-Risk Lines Under False Data Injection Attacks [J].
Che, Liang ;
Liu, Xuan ;
Li, Zuyi .
IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (04) :4003-4014
[2]   Hybrid Robust Tri-Level Defense Model Against Multiperiod Uncertain Attacks [J].
Du, Min ;
Liu, Xuan ;
Zhou, Quan ;
Li, Zuyi .
IEEE TRANSACTIONS ON SMART GRID, 2022, 13 (04) :3255-3265
[3]   Detecting Stealthy False Data Injection Using Machine Learning in Smart Grid [J].
Esmalifalak, Mohammad ;
Liu, Lanchao ;
Nguyen, Nam ;
Zheng, Rong ;
Han, Zhu .
IEEE SYSTEMS JOURNAL, 2017, 11 (03) :1644-1652
[4]  
Goldstein M., 2012, Proceedings of the 35th German Conference on Artificial Intelligence (KI'12), P59
[5]   Outlier detection in the multiple cluster setting using the minimum covariance determinant estimator [J].
Hardin, J ;
Rocke, DM .
COMPUTATIONAL STATISTICS & DATA ANALYSIS, 2004, 44 (04) :625-638
[6]   An Enhanced Energy Management System Including a Real-Time Load-Redistribution Threat Analysis Tool and Cyber-Physical SCED [J].
Kaviani, Ramin ;
Hedman, Kory W. .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2022, 37 (05) :3346-3358
[7]  
Kriegel H. P., 2008, P KDD, P13
[8]   Dummy Data Attacks in Power Systems [J].
Liu, Xuan ;
Song, Yufei ;
Li, Zuyi .
IEEE TRANSACTIONS ON SMART GRID, 2020, 11 (02) :1792-1795
[9]   Trilevel Modeling of Cyber Attacks on Transmission Lines [J].
Liu, Xuan ;
Li, Zuyi .
IEEE TRANSACTIONS ON SMART GRID, 2017, 8 (02) :720-729
[10]   Cyber-Attack on Overloading Multiple Lines: A Bilevel Mixed-Integer Linear Programming Model [J].
Tan, Yi ;
Li, Yong ;
Cao, Yijia ;
Shahidehpour, Mohammad .
IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (02) :1534-1536