Modified Matrix Completion-Based Detection of Stealthy Data Manipulation Attacks in Low Observable Distribution Systems

被引:1
|
作者
Rajasekaran, James Ranjith Kumar [1 ]
Natarajan, Balasubramaniam [1 ]
Pahwa, Anil [1 ]
机构
[1] Kansas State Univ, Elect & Comp Engn Dept, Manhattan, KS 66506 USA
关键词
Bad data detection; distribution system; matrix completion; moving target defence; state estimation; DATA INJECTION ATTACKS; STATE ESTIMATION; D-FACTS; PERTURBATION; DEFENSE;
D O I
10.1109/TSG.2023.3266834
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A composite detection technique against stealthy data manipulations is developed in this paper for distribution networks that are low observable. Attack detection strategies typically rely on state estimation which becomes challenging when limited measurements are available. In this paper, a modified matrix completion approach provides estimates of the system state and its error variances for the locations in the network where measurements are unavailable. Using the error statistics and their corresponding state estimates, bad data detection can be carried out using the chi-squared test. The proposed approach employs a moving target defence strategy (MTD) where the network parameters are perturbed through distributed flexible AC transmission system (D-FACTS) devices such that stealthy data manipulation attacks can be exposed in the form of bad data. Thus, the bad data detection approach developed in this paper can detect stealthy attacks using the MTD strategy. This technique is implemented on 37-bus and 123-bus three-phase unbalanced distribution networks to demonstrate the attack detection accuracy even for a low observable system.
引用
收藏
页码:4851 / 4862
页数:12
相关论文
共 50 条
  • [31] Geometry-Based Data-Driven Complete Stealthy Attacks Against Cyber-Physical Systems
    Wang, Kaiyu
    Ye, Dan
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (06): : 5839 - 5849
  • [32] An Intrusion Detection Method Based on Self-Generated Coding Technology for Stealthy False Data Injection Attacks in Train-Ground Communication Systems
    Kong, Xiang-Yu
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2023, 70 (08) : 8468 - 8476
  • [33] Clustering-based detection algorithm of remote state estimation under stealthy innovation-based attacks with historical data
    Chen, Shan
    Ni, Yuqing
    Huang, Lingying
    Luan, Xiaoli
    Liu, Fei
    NEUROCOMPUTING, 2025, 616
  • [34] Model-Based Detection of Coordinated Attacks (DCA) in Distribution Systems
    Sahani, Nitasha
    Liu, Chen-Ching
    IEEE OPEN ACCESS JOURNAL OF POWER AND ENERGY, 2024, 11 : 558 - 570
  • [35] Detection of Perfect Stealthy Attacks on Cyber-Physical Systems Subject to Measurement Quantizations: A Watermark-Based Strategy
    YuAng Wang
    Zidong Wang
    Lei Zou
    Bo Shen
    Hongli Dong
    IEEE/CAA Journal of Automatica Sinica, 2025, 12 (01) : 114 - 125
  • [36] Deep Latent Space Clustering for Detection of Stealthy False Data Injection Attacks Against AC State Estimation in Power Systems
    Bhattacharjee, Arnab
    Mondal, Arnab Kumar
    Verma, Ashu
    Mishra, Sukumar
    Saha, Tapan K.
    IEEE TRANSACTIONS ON SMART GRID, 2023, 14 (03) : 2338 - 2351
  • [37] Abnormal Monitoring Data Detection Based on Matrix Manipulation and the Cuckoo Search Algorithm
    Meng, Zhenzhu
    Wang, Yiren
    Zheng, Sen
    Wang, Xiao
    Liu, Dan
    Zhang, Jinxin
    Shao, Yiting
    MATHEMATICS, 2024, 12 (09)
  • [38] Detection of Perfect Stealthy Attacks on Cyber-Physical Systems Subject to Measurement Quantizations: A Watermark-Based Strategy
    Wang, Yu-Ang
    Wang, Zidong
    Zou, Lei
    Shen, Bo
    Dong, Hongli
    IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2025, 12 (01) : 114 - 125
  • [39] Event-Based Optimal Stealthy False Data-Injection Attacks Against Remote State Estimation Systems
    Guo, Haibin
    Sun, Jian
    Pang, Zhong-Hua
    Liu, Guo-Ping
    IEEE TRANSACTIONS ON CYBERNETICS, 2023, 53 (10) : 6714 - 6724
  • [40] Detection of Side Channel Attacks Based on Data Tainting in Android Systems
    Graa, Mariem
    Cuppens-Boulahia, Nora
    Cuppens, Frederic
    Lanet, Jean-Louis
    Moussaileb, Routa
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2017, 2017, 502 : 205 - 218