A Novel Data Integrity Attack Detection Algorithm Based on Improved Grey Relational Analysis

被引:19
|
作者
Zhang, Zhengdao [1 ]
Wang, Yunfei [1 ]
Xie, Linbo [1 ]
机构
[1] Jiangnan Univ, Sch IoT Engn, Minist Educ, Engn Res Ctr Internet Things Appl Technol, Wuxi 214122, Peoples R China
来源
IEEE ACCESS | 2018年 / 6卷
基金
国家重点研发计划;
关键词
Industry control systems; false data injection; attack detection; grey correlation analysis; SVM; FALSE DATA INJECTION; SYSTEMS;
D O I
10.1109/ACCESS.2018.2884504
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
False data injection (FDI) attack is the most common data integrity attack, and it is also one of the most serious threats in industrial control systems (ICSs). Although many detection approaches are developed with burgeoning research interests, the technical capability of existing detection methods is still insufficient because the stealth FDI attacks have been proven to bypass bad data detector. In this paper, a novel data analytical algorithm is proposed to identify the stealth FDI attacks in ICSs according to the correlation analysis. First, we evaluate the correlation between measurements and control variables based on an improved grey relational analysis. Then, SVM is used to classify the FDI attack according to the values of correlation. Through a reliable semi-physical simulation testbed whose virtual plant corresponds to a 330 MW boiler-turbine unit, two FDI attacks that can bypass the detection system are studied. A dataset, which contains the normal data and attack data, is created from the testbed to verify the effectiveness of the proposed algorithm. In addition, the performance of the proposed algorithm is also studied based on the new gas pipeline dataset that is collected by the distributed analytics and security institute in Mississippi State University. Such a novel algorithm, which has better accuracy and reliability, is compared with the state of the art based on the data analysis.
引用
收藏
页码:73423 / 73433
页数:11
相关论文
共 50 条
  • [41] Cyber attack detection in healthcare data using cyber-physical system with optimized algorithm
    Alrowais, Fadwa
    Mohamed, Heba G.
    Al-Wesabi, Fahd N.
    Al Duhayyim, Mesfer
    Hilal, Anwer Mustafa
    Motwakel, Abdelwahed
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 108
  • [42] The empirical study of executive compensation in China port and shipping listed companies based on the grey relational analysis
    Chen, Jiajia
    Zhang, Rong
    Liu, Bin
    GREY SYSTEMS-THEORY AND APPLICATION, 2016, 6 (02) : 259 - 269
  • [43] Research on Attack Detection of Cyber Physical Systems Based on Improved Support Vector Machine
    Liu, Fengchun
    Zhang, Sen
    Ma, Weining
    Qu, Jingguo
    MATHEMATICS, 2022, 10 (15)
  • [44] Malicious URLs Detection Based on a Novel Optimization Algorithm
    Wang, Bo
    Zhang, B. Fang
    Liu, X. Wei
    Zou, F. Cheng
    Zhang, X. Hua
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2021, E104D (04): : 513 - 516
  • [45] Enhanced resilience in smart grids: A neural network-based detection of data integrity attacks using improved war strategy optimization
    Aghajari, H. Asadi
    Niknam, T.
    Sharifhosseini, S. M.
    Taabodi, M. H.
    Pourbehzadi, Motahareh
    ELECTRIC POWER SYSTEMS RESEARCH, 2025, 239
  • [46] Cyber Attack Detection Based on Wavelet Singular Entropy in AC Smart Islands: False Data Injection Attack
    Dehghani, Moslem
    Ghiasi, Mohammad
    Niknam, Taher
    Kavousi-Fard, Abdollah
    Tajik, Elham
    Padmanaban, Sanjeevikumar
    Aliev, Hamdulah
    IEEE ACCESS, 2021, 9 : 16488 - 16507
  • [47] Low-rate DoS Attack Detection Based on WPD-EE Algorithm
    Wang, Xiaocai
    Yang, Qiuwei
    Xie, Zichao
    Zheng, Zhiqing
    Yan, Yudong
    Tang, Dan
    2020 IEEE INTL SYMP ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, INTL CONF ON BIG DATA & CLOUD COMPUTING, INTL SYMP SOCIAL COMPUTING & NETWORKING, INTL CONF ON SUSTAINABLE COMPUTING & COMMUNICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2020), 2020, : 384 - 391
  • [48] ADS-B Data Attack Detection Based on Generative Adversarial Networks
    Li, Tengyao
    Wang, Buhong
    Shang, Fute
    Tian, Jiwei
    Cao, Kunrui
    CYBERSPACE SAFETY AND SECURITY, PT I, 2020, 11982 : 323 - 336
  • [49] EXCLF: A LDoS attack detection & mitigation model based on programmable data plane☆ ☆
    Tang, Dan
    Cao, Hongbo
    Zhang, Jiliang
    Qin, Zheng
    Liang, Wei
    Ma, Xiaopu
    COMPUTER NETWORKS, 2024, 252
  • [50] False data injection attack in smart grid: Attack model and reinforcement learning-based detection method
    Lin, Xixiang
    An, Dou
    Cui, Feifei
    Zhang, Feiye
    FRONTIERS IN ENERGY RESEARCH, 2023, 10