Detection of Cyber-Attacks of Power Systems Through Benford's Law

被引:11
|
作者
Milano, Federico [1 ]
Gomez-Exposito, Antonio [2 ]
机构
[1] Univ Coll Dublin, Sch Elect & Elect Engn, Dublin D04 V1W8 4, Ireland
[2] Univ Seville, Elect Engn Dept, Seville 41092, Spain
基金
爱尔兰科学基金会;
关键词
Voltage measurement; Transmission line measurements; Power systems; Cyberattack; Power measurement; Computer hacking; Particle measurements; Benford’ s law; state estimation; cyber attack; bad data; FALSE DATA INJECTION;
D O I
10.1109/TSG.2020.3042897
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This letter proposes an application of the Benford's law for the detection of cyber attacks in power system state estimators. Benford's law, also known as 1st-digit law, states an unexpected property of the distribution of the first digit of certain sets of data, and has been found to apply to a surprisingly wide range of data domains. The first novel contribution of the letter is to show that the Benford's law applies to power system data as well. A relevant property of this law is its high sensitivity to manipulations and, in fact, it is often utilized to detect frauds. Based on this feature, the second contribution of the letter is to utilize the Benford's law to detect malicious data introduced by hackers in the supervisory control and data acquisition (SCADA) system of a transmission network. Tests based on power system models ranging from 9 to 21,177 buses show promising results.
引用
收藏
页码:2741 / 2744
页数:4
相关论文
共 50 条
  • [31] A Switching Multiplicative Watermarking Scheme for Detection of Stealthy Cyber-Attacks
    Ferrari, Riccardo M. G.
    Teixeira, Andre M. H.
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (06) : 2558 - 2573
  • [32] Assessment of the Impact of Cyber-Attacks and Security Breaches in Diagnostic Systems on the Healthcare Sector
    Srivastava, Kushal
    Faist, Katja
    Lickert, Benjamin
    Neville, Karen
    McCarthy, Nora
    Fehling-Kaschek, Mirjam
    Stolz, Alexander
    2024 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2024, : 531 - 536
  • [33] On Zero Dynamics and Controllable Cyber-Attacks in Cyber-Physical Systems and Dynamic Coding Schemes as Their Countermeasures
    Taheri, Mahdi
    Khorasani, Khashayar
    Meskin, Nader
    IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2024, 11 (11) : 2191 - 2203
  • [34] Design of Load Forecast Systems Resilient Against Cyber-Attacks
    Barreto, Carlos
    Koutsoukos, Xenofon
    DECISION AND GAME THEORY FOR SECURITY, 2019, 11836 : 1 - 20
  • [35] Cyber-Attacks with Resource Constraints on Discrete Event Systems Under Supervisory Control
    He, Zhaoyang
    Wu, Naiqi
    Su, Rong
    Li, Zhiwu
    IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2025, 12 (03) : 585 - 595
  • [36] Optimal Detector Placement in Networked Control Systems under Cyber-attacks with Applications to Power Networks
    Anh Tung Nguyen
    Anand, Sribalaji C.
    Teixeira, Andre M. H.
    Medvedev, Alexander
    IFAC PAPERSONLINE, 2023, 56 (02): : 1820 - 1826
  • [37] Cyber Attacks on Power System State Estimation through Topology Errors
    Ashok, Aditya
    Govindarasu, Manimaran
    2012 IEEE POWER AND ENERGY SOCIETY GENERAL MEETING, 2012,
  • [38] Fallback Control for Isochronous Energy Storage Systems in Autonomous Microgrids Under Denial-of-Service Cyber-Attacks
    Chlela, Marline
    Mascarella, Diego
    Joos, Geza
    Kassouf, Marthe
    IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (05) : 4702 - 4711
  • [39] Unsupervised concrete feature selection based on mutual information for diagnosing faults and cyber-attacks in power systems
    Hassani, Hossein
    Hallaji, Ehsan
    Razavi-Far, Roozbeh
    Saif, Mehrdad
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2021, 100
  • [40] Power Systems Decomposition for Robustifying State Estimation Under Cyber Attacks
    Ahmadi, Naime
    Chakhchoukh, Yacine
    Ishii, Hideaki
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2021, 36 (03) : 1922 - 1933