Online Detection of Stealthy False Data Injection Attacks in Power System State Estimation

被引:217
作者
Ashok, Aditya [1 ]
Govindarasu, Manimaran [2 ]
Ajjarapu, Venkataramana [2 ]
机构
[1] Pacific Northwest Natl Lab, Richland, WA 99352 USA
[2] Iowa State Univ, Dept Elect & Comp Engn, Ames, IA 50011 USA
基金
美国国家科学基金会;
关键词
State estimation; cyber attacks; anomaly detection; load forecasts; synchrophasors; PROTECTION;
D O I
10.1109/TSG.2016.2596298
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
State estimation is one of the fundamental functions in modern power grid operations that provide operators with situational awareness and is used by several applications like contingency analysis and power markets. Several research in the recent past have highlighted the vulnerability of state estimators to stealthy false data injection attacks that bypass bad data detection mechanisms. They primarily focused on identifying stealthy attack vectors and characterizing their impacts on state estimates. Existing mitigation measures either focus on masking the effect of attacks through redundant measurements or prevent attacks by increasing the cyber security of associated sensors and communication channels. The solutions based on these offline approaches make specific assumptions about the nature of attacks and of the system, which are often restrictive and grossly inadequate to deal with dynamically evolving cyber threats and changing system configurations. In this paper, we propose an online anomaly detection algorithm that utilizes load forecasts, generation schedules, and synchrophasor data to detect measurement anomalies. We provide some insight into the factors that affect the performance of the proposed algorithm. We also describe an empirical method to obtain the minimum attack magnitudes and the detection thresholds for meeting specified false positive and true positive rates. Finally, we evaluated the performance of the proposed algorithm using the IEEE 14 bus power system model for several measures (false positive, false negative, and thresholds). We observed that the best performance of the proposed algorithm relies on finding the right balance between the minimum attack magnitude and detection thresholds. We also observed that the minimum attack magnitudes and detection thresholds could be further improved through the use of a combination of more accurate forecasts and PMU measurements.
引用
收藏
页码:1636 / 1646
页数:11
相关论文
共 24 条
[11]  
Dán G, 2010, INT CONF SMART GRID, P214, DOI 10.1109/SMARTGRID.2010.5622046
[12]  
Fawcett T., 2003, ROC graphs: notes and practical considerations for data mining researchers
[13]   Smart Grid Data Integrity Attacks [J].
Giani, Annarita ;
Bitar, Eilyan ;
Garcia, Manuel ;
McQueen, Miles ;
Khargonekar, Pramod ;
Poolla, Kameshwar .
IEEE TRANSACTIONS ON SMART GRID, 2013, 4 (03) :1244-1253
[14]  
Huang Y., 2011, PROC 45 ANN C INF SC, P1
[15]   Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks [J].
Hug, Gabriela ;
Giampapa, Joseph Andrew .
IEEE TRANSACTIONS ON SMART GRID, 2012, 3 (03) :1362-1370
[16]  
KEMA, 2006, Tech. Rep.
[17]   Strategic Protection Against Data Injection Attacks on Power Grids [J].
Kim, Tung T. ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON SMART GRID, 2011, 2 (02) :326-333
[18]   Malicious Data Attacks on the Smart Grid [J].
Kosut, Oliver ;
Jia, Liyan ;
Thomas, Robert J. ;
Tong, Lang .
IEEE TRANSACTIONS ON SMART GRID, 2011, 2 (04) :645-658
[19]  
Kosut O, 2010, INT CONF SMART GRID, P220, DOI 10.1109/SMARTGRID.2010.5622045
[20]   False Data Injection Attacks against State Estimation in Electric Power Grids [J].
Liu, Yao ;
Ning, Peng ;
Reiter, Michael K. .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (01)