Detection of Cyber-Attacks of Power Systems Through Benford's Law

被引:11
作者
Milano, Federico [1 ]
Gomez-Exposito, Antonio [2 ]
机构
[1] Univ Coll Dublin, Sch Elect & Elect Engn, Dublin D04 V1W8 4, Ireland
[2] Univ Seville, Elect Engn Dept, Seville 41092, Spain
基金
爱尔兰科学基金会;
关键词
Voltage measurement; Transmission line measurements; Power systems; Cyberattack; Power measurement; Computer hacking; Particle measurements; Benford’ s law; state estimation; cyber attack; bad data; FALSE DATA INJECTION;
D O I
10.1109/TSG.2020.3042897
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This letter proposes an application of the Benford's law for the detection of cyber attacks in power system state estimators. Benford's law, also known as 1st-digit law, states an unexpected property of the distribution of the first digit of certain sets of data, and has been found to apply to a surprisingly wide range of data domains. The first novel contribution of the letter is to show that the Benford's law applies to power system data as well. A relevant property of this law is its high sensitivity to manipulations and, in fact, it is often utilized to detect frauds. Based on this feature, the second contribution of the letter is to utilize the Benford's law to detect malicious data introduced by hackers in the supervisory control and data acquisition (SCADA) system of a transmission network. Tests based on power system models ranging from 9 to 21,177 buses show promising results.
引用
收藏
页码:2741 / 2744
页数:4
相关论文
共 50 条
  • [41] Impact of Crash Override and Tampering Communication Data Cyber-Attacks on the Power Quality of the Hybrid System
    Ghosh, Sagnika
    Ali, Mohd Hasan
    2018 IEEE INTERNATIONAL CONFERENCE ON POWER ELECTRONICS, DRIVES AND ENERGY SYSTEMS (PEDES), 2018,
  • [42] Transient Stability Enhancement of Power Grid by Neural Network Controlled BFCL Considering Cyber-Attacks
    Sadi, Mohammad Ashraf Hossain
    Zheng, Huaxi
    Ali, Mohd. Hasan
    SOUTHEASTCON 2017, 2017,
  • [43] Research on Power Communication Network Planning Based on Information Transmission Reachability Against Cyber-Attacks
    Wu, Yingjun
    Chen, Jinfan
    Ru, Yingtao
    Xu, Hao
    Roger, Mbonyineza
    Ni, Ming
    IEEE SYSTEMS JOURNAL, 2021, 15 (02): : 2883 - 2894
  • [44] Detection of data-driven blind cyber-attacks on smart grid: A deep learning approach
    Mukherjee, Debottam
    SUSTAINABLE CITIES AND SOCIETY, 2023, 92
  • [45] Secure Control of DC Microgrids for Instant Detection and Mitigation of Cyber-Attacks Based on Artificial Intelligence
    Habibi, Mohammad Reza
    Baghaee, Hamid Reza
    Blaabjerg, Frede
    Dragicevic, Tomislav
    IEEE SYSTEMS JOURNAL, 2022, 16 (02): : 2580 - 2591
  • [46] Likelihood of Cyber Data Injection Attacks to Power Systems
    Hao, Yingshuai
    Wang, Meng
    Chow, Joe
    2015 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP), 2015, : 657 - 661
  • [47] Multi-agent-based hierarchical detection and mitigation of cyber attacks in power systems
    Zhou, T. L.
    Xiahou, K. S.
    Zhang, L. L.
    Wu, Q. H.
    INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2021, 125
  • [48] A comprehensive review of cyber-attacks and defense mechanisms for improving security in smart grid energy systems: Past, present and future
    Ghiasi M.
    Niknam T.
    Wang Z.
    Mehrandezh M.
    Dehghani M.
    Ghadimi N.
    Electric Power Systems Research, 2023, 215
  • [49] Detection of False Data Injection Cyber-Attacks in DC Microgrids Based on Recurrent Neural Networks
    Habibi, Mohammad Reza
    Baghaee, Hamid Reza
    Dragicevic, Tomislav
    Blaabjerg, Frede
    IEEE JOURNAL OF EMERGING AND SELECTED TOPICS IN POWER ELECTRONICS, 2021, 9 (05) : 5294 - 5310
  • [50] An IoT-Based Deep Learning Approach for Online Fault Detection Against Cyber-Attacks
    Rajkumar S.
    Sheeba S.L.
    Sivakami R.
    Prabu S.
    Selvarani A.
    SN Computer Science, 4 (4)