A Novel Data Integrity Attack Detection Algorithm Based on Improved Grey Relational Analysis

被引:19
|
作者
Zhang, Zhengdao [1 ]
Wang, Yunfei [1 ]
Xie, Linbo [1 ]
机构
[1] Jiangnan Univ, Sch IoT Engn, Minist Educ, Engn Res Ctr Internet Things Appl Technol, Wuxi 214122, Peoples R China
来源
IEEE ACCESS | 2018年 / 6卷
基金
国家重点研发计划;
关键词
Industry control systems; false data injection; attack detection; grey correlation analysis; SVM; FALSE DATA INJECTION; SYSTEMS;
D O I
10.1109/ACCESS.2018.2884504
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
False data injection (FDI) attack is the most common data integrity attack, and it is also one of the most serious threats in industrial control systems (ICSs). Although many detection approaches are developed with burgeoning research interests, the technical capability of existing detection methods is still insufficient because the stealth FDI attacks have been proven to bypass bad data detector. In this paper, a novel data analytical algorithm is proposed to identify the stealth FDI attacks in ICSs according to the correlation analysis. First, we evaluate the correlation between measurements and control variables based on an improved grey relational analysis. Then, SVM is used to classify the FDI attack according to the values of correlation. Through a reliable semi-physical simulation testbed whose virtual plant corresponds to a 330 MW boiler-turbine unit, two FDI attacks that can bypass the detection system are studied. A dataset, which contains the normal data and attack data, is created from the testbed to verify the effectiveness of the proposed algorithm. In addition, the performance of the proposed algorithm is also studied based on the new gas pipeline dataset that is collected by the distributed analytics and security institute in Mississippi State University. Such a novel algorithm, which has better accuracy and reliability, is compared with the state of the art based on the data analysis.
引用
收藏
页码:73423 / 73433
页数:11
相关论文
共 50 条
  • [21] Colour matching design method in product visual communication based on grey relational analysis
    Wu, Fan
    Chen, Huaxi
    International Journal of Product Development, 2024, 28 (04) : 257 - 271
  • [22] A novel LDoS attack detection method based on reconstruction anomaly
    Tang, Dan
    Yan, Yudong
    Dai, Rui
    Qin, Zheng
    Chen, Jingwen
    Zhang, Dongshuo
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (02): : 1373 - 1392
  • [23] A novel LDoS attack detection method based on reconstruction anomaly
    Dan Tang
    Yudong Yan
    Rui Dai
    Zheng Qin
    Jingwen Chen
    Dongshuo Zhang
    Cluster Computing, 2022, 25 : 1373 - 1392
  • [24] The OX Optimizer: A Novel Optimization Algorithm and Its Application in Enhancing Support Vector Machine Performance for Attack Detection
    Al Hwaitat, Ahmad K.
    Fakhouri, Hussam N.
    SYMMETRY-BASEL, 2024, 16 (08):
  • [25] A novel online detection method of data injection attack against dynamic state estimation in smart grid
    Chen, Rui
    Li, Xue
    Zhong, Huixin
    Fei, Minrui
    NEUROCOMPUTING, 2019, 344 : 73 - 81
  • [26] Cost analysis of the false data injection attack based on nonlinear state estimation
    Zhao L.
    Liu Z.
    Sun G.
    Ni M.
    Dianli Xitong Baohu yu Kongzhi/Power System Protection and Control, 2019, 47 (19): : 38 - 45
  • [27] Optimal Operation Analysis of the Distribution Network Comprising a Micro Energy Grid Based on an Improved Grey Wolf Optimization Algorithm
    Zhang, Xin
    Yang, Jianhua
    Wang, Weizhou
    Jing, Tianjun
    Zhang, Man
    APPLIED SCIENCES-BASEL, 2018, 8 (06):
  • [28] Machine Learning-based False Data Injection Attack Detection and Localization in Power Grids
    Leao, Bruno P.
    Vempati, Jagannadh
    Muenz, Ulrich
    Shekhar, Shashank
    Pandey, Amit
    Hingos, David
    Bhela, Siddharth
    Wang, Jing
    Bilby, Chris
    2022 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2022,
  • [29] Risk assessment method of power grid construction project investment based on grey relational analysis
    Chen F.
    Sun M.
    Shen L.
    International Journal of Information Technology and Management, 2024, 23 (3-4) : 244 - 260
  • [30] Incentive edge-based federated learning for false data injection attack detection on power grid state estimation: A novel mechanism design approach
    Lin, Wen-Ting
    Chen, Guo
    Huang, Yuhan
    APPLIED ENERGY, 2022, 314