Detecting Stealthy False Data Injection Using Machine Learning in Smart Grid

被引:400
作者
Esmalifalak, Mohammad [1 ]
Liu, Lanchao [1 ]
Nguyen, Nam [2 ]
Zheng, Rong [3 ]
Han, Zhu [1 ]
机构
[1] Univ Houston, Dept Elect & Comp Engn, Cullen Coll Engn, Houston, TX 77004 USA
[2] Schlumberger Informat Solut, Houston, TX 77056 USA
[3] McMaster Univ, Fac Engn, Dept Elect & Comp Engn, Hamilton, ON L8S 4K1, Canada
来源
IEEE SYSTEMS JOURNAL | 2017年 / 11卷 / 03期
基金
美国国家科学基金会;
关键词
Anomaly detection; bad data detection (BDD); power system state estimation; support vector machines (SVMs); ATTACKS; SYSTEM; SECURITY; TOPOLOGY; SCHEMES;
D O I
10.1109/JSYST.2014.2341597
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Aging power industries, together with the increase in demand from industrial and residential customers, are the main incentive for policy makers to define a road map to the next-generation power system called the smart grid. In the smart grid, the overall monitoring costs will be decreased, but at the same time, the risk of cyber attacks might be increased. Recently, a new type of attacks (called the stealth attack) has been introduced, which cannot be detected by the traditional bad data detection using state estimation. In this paper, we show how normal operations of power networks can be statistically distinguished from the case under stealthy attacks. We propose two machine-learning-based techniques for stealthy attack detection. The first method utilizes supervised learning over labeled data and trains a distributed support vector machine (SVM). The design of the distributed SVM is based on the alternating direction method of multipliers, which offers provable optimality and convergence rate. The second method requires no training data and detects the deviation in measurements. In both methods, principal component analysis is used to reduce the dimensionality of the data to be processed, which leads to lower computation complexities. The results of the proposed detection methods on IEEE standard test systems demonstrate the effectiveness of both schemes.
引用
收藏
页码:1644 / 1652
页数:9
相关论文
共 33 条
[1]  
[Anonymous], 2009, P 28 ANN IEEE INFOCO
[2]  
[Anonymous], 2002, Principal components analysis
[3]  
[Anonymous], 2010, P IEEE WIREL COMM NE
[4]  
[Anonymous], P 24 ANN JOINT C IEE
[5]  
[Anonymous], 2011, ACM T INTEL SYST TEC
[6]  
[Anonymous], IEEE PRESS UNDERSTAN
[7]  
[Anonymous], 2010, Tech. Rep.
[8]   Prerforrnance comparison of detection schemes for MAC layer misbehaviorl [J].
Cardenas, Alvaro A. ;
Radosavac, Svetlana ;
Baras, John S. .
INFOCOM 2007, VOLS 1-5, 2007, :1496-+
[9]   Anomaly Detection: A Survey [J].
Chandola, Varun ;
Banerjee, Arindam ;
Kumar, Vipin .
ACM COMPUTING SURVEYS, 2009, 41 (03)
[10]   Communication system for distribution automation using CDMA [J].
Choi, Tae-Il ;
Lee, Kwang Y. ;
Lee, Dong Ryul ;
Ahn, Jeong Kil .
IEEE TRANSACTIONS ON POWER DELIVERY, 2008, 23 (02) :650-656