Towards Fast and Semi-supervised Identification of Smart Meters Launching Data Falsification Attacks

被引:19
作者
Bhattacharjee, Shameek [1 ]
Thakur, Aditya [1 ]
Das, Sajal K. [1 ]
机构
[1] Missouri Univ Sci & Technol, Rolla, MO 65409 USA
来源
PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18) | 2018年
关键词
Data Falsification; Advanced Metering Infrastructure; Smart Grid Security; Anomaly Detection; False Data Injection; Cyber-Physical System Security; THEFT DETECTION;
D O I
10.1145/3196494.3196551
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Compromised smart meters sending false power consumption data in Advanced Metering Infrastructure (AMI) may have drastic consequences on the smart grid's operation. Most existing defense models only deal with electricity theft from individual customers (isolated attacks) using supervised classification techniques that do not offer scalable or real time solutions. Furthermore, the cyber and interconnected nature of AMIs can also be exploited by organized adversaries who have the ability to orchestrate simultaneous data falsification attacks after compromising several meters, and also have more complex goals than just electricity theft. In this paper, we first propose a real time semi-supervised anomaly based consensus correction technique that detects the presence and type of smart meter data falsification, and then performs a consensus correction accordingly. Subsequently, we propose a semi-supervised consensus based trust scoring model, that is able to identify the smart meters injecting false data. The main contribution of the proposed approach is to provide a practical framework for compromised smart meter identification that (i) is not supervised (ii) enables quick identification (iii) scales classification error rates better for larger sized AMIs; (iv) counters threats from both isolated and orchestrated attacks; and (v) simultaneously works for a variety of data falsification types. Extensive experimental validation using two real datasets from USA and Ireland, demonstrates the ability of our proposed method to identify compromised meters in near real time across different datasets.
引用
收藏
页码:173 / 185
页数:13
相关论文
共 25 条
[1]   A normal-distribution based rating aggregation method for generating product reputations [J].
Abdel-Hafez, Ahmad ;
Xu, Yue ;
Josang, Audun .
WEB INTELLIGENCE, 2015, 13 (01) :43-51
[2]  
[Anonymous], 2016, CCS, DOI [DOI 10.1145/2976749, DOI 10.1145/2976749.2978388]
[3]  
BHATTACHARJEE R, 2017, ACM CODASPY, P35
[4]   AN ANALYSIS OF TRANSFORMATIONS [J].
BOX, GEP ;
COX, DR .
JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES B-STATISTICAL METHODOLOGY, 1964, 26 (02) :211-252
[5]   A Framework for Evaluating Intrusion Detection Architectures in Advanced Metering Infrastructures [J].
Cardenas, Alvaro A. ;
Berthier, Robin ;
Bobba, Rakesh B. ;
Huh, Jun Ho ;
Jetcheva, Jorjeta G. ;
Grochocki, David ;
Sanders, William H. .
IEEE TRANSACTIONS ON SMART GRID, 2014, 5 (02) :906-915
[6]   Trust Management for Defending On-Off Attacks [J].
Chae, Younghun ;
DiPippo, Lisa Cingiser ;
Sun, Yan Lindsay .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (04) :1178-1191
[7]   Detection and Identification of Abnormalities in Customer Consumptions in Power Distribution Systems [J].
dos Angelos, Eduardo Werley S. ;
Saavedra, Osvaldo R. ;
Carmona Cortes, Omar A. ;
de Souza, Andre Nunes .
IEEE TRANSACTIONS ON POWER DELIVERY, 2011, 26 (04) :2436-2442
[8]  
Harrison WK, 2009, 2009 IEEE INFORMATION THEORY WORKSHOP (ITW 2009), P173, DOI 10.1109/ITW.2009.5351256
[9]   Non-Technical Loss Detection Using State Estimation and Analysis of Variance [J].
Huang, Shih-Che ;
Lo, Yuan-Liang ;
Lu, Chan-Nan .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2013, 28 (03) :2959-2966
[10]   Energy-Theft Detection Issues for Advanced Metering Infrastructure in Smart Grid [J].
Jiang, Rong ;
Lu, Rongxing ;
Wang, Ye ;
Luo, Jun ;
Shen, Changxiang ;
Shen, Xuemin .
TSINGHUA SCIENCE AND TECHNOLOGY, 2014, 19 (02) :105-120