False data injection attack (FDIA): an overview and new metrics for fair evaluation of its countermeasure

被引:65
作者
Ahmed, Mohiuddin [1 ]
Pathan, Al-Sakib Khan [2 ]
机构
[1] Edith Cowan Univ, Sch Sci, Acad Ctr Cyber Secur Excellence, Joondalup, Australia
[2] Independent Univ, Dept Comp Sci & Engn, Dhaka, Bangladesh
关键词
Anomaly; Countermeasure; Cyber attacks; False data injection; Internet; Metric; Network traffic;
D O I
10.1186/s40294-020-00070-w
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The concept of false data injection attack (FDIA) was introduced originally in the smart grid domain. While the term sounds common, it specifically means the case when an attacker compromises sensor readings in such tricky way that undetected errors are introduced into calculations of state variables and values. Due to the rapid growth of the Internet and associated complex adaptive systems, cyber attackers are interested in exploiting similar attacks in other application domains such as healthcare, finance, defense, governance, etc. In today's increasingly perilous cyber world of complex adaptive systems, FDIA has become one of the top-priority issues to deal with. It is a necessity today for greater awareness and better mechanism to counter such attack in the cyberspace. Hence, this work presents an overview of the attack, identifies the impact of FDIA in critical domains, and talks about the countermeasures. A taxonomy of the existing countermeasures to defend against FDIA is provided. Unlike other works, we propose some evaluation metrics for FDIA detection and also highlight the scarcity of benchmark datasets to validate the performance of FDIA detection techniques.
引用
收藏
页数:14
相关论文
共 27 条
[1]   Efficient Prevention Technique for False Data Injection Attack in Smart Grid [J].
Abdallah, Asmaa ;
Shen, Xuemin .
2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016, :68-73
[2]   Trusted service manager (TSM) based privacy preserving and secure mobile commerce framework with formal verification [J].
Ahamad, Shaik Shakeel ;
Pathan, Al-Sakib Khan .
COMPLEX ADAPTIVE SYSTEMS MODELING, 2019, 7 (01)
[3]   False Data Injection Attacks in Healthcare [J].
Ahmed, Mohiuddin ;
Ullah, Abu S. S. M. Barkat .
DATA MINING, AUSDM 2017, 2018, 845 :192-202
[4]  
Ahmed M, 2020, DEEP LEARNING HOPE H
[5]   Blockchain: Can It Be Trusted? [J].
Ahmed, Mohiuddin ;
Pathan, Al-Sakib Khan .
COMPUTER, 2020, 53 (04) :31-35
[6]   False Image Injection Prevention Using iChain [J].
Ahmed, Mohiuddin .
APPLIED SCIENCES-BASEL, 2019, 9 (20)
[7]   Data summarization: a survey [J].
Ahmed, Mohiuddin .
KNOWLEDGE AND INFORMATION SYSTEMS, 2019, 58 (02) :249-273
[8]   A survey of network anomaly detection techniques [J].
Ahmed, Mohiuddin ;
Mahmood, Abdun Naser ;
Hu, Jiankun .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 :19-31
[9]  
[Anonymous], 2010, FIN CRIM REP
[10]  
[Anonymous], 2019, BACKGR INS FRAUD