DeepAI
Log In Sign Up

False Data Injection Cyber-Attack Detection

10/13/2018
by   Xingpeng Li, et al.
0

State estimation estimates the system condition in real-time and provides a base case for other energy management system (EMS) applications including real-time contingency analysis and security-constrained economic dispatch. Recent work in the literature shows malicious cyber-attack can inject false measurements that bypass traditional bad data detection and cause actual overloads. Thus, it is very important to detect such cyber-attacks. In this paper, multiple metrics are proposed to monitor abnormal load deviations and suspicious branch flow changes. A systematic two-stage approach is proposed to detect false data injection (FDI) cyber-attack. The first stage determines whether the system is under attack while the second stage identifies the target branch. Numerical simulations verify that FDI can cause severe system violations and demonstrate the effectiveness of the proposed two-stage FDI detection (FDID) method. It is concluded that the proposed FDID approach can efficiently detect FDI cyber-attacks and identify the target branch; furthermore, the associated false alarm rate and false dismissal rate are very low.

READ FULL TEXT

page 1

page 2

page 3

page 4

03/11/2020

Designing constraint-based False Data Injection attacks for unbalanced distribution smart grids

Smart grid is equipped with various kinds of smart devices such as meter...
09/26/2022

Power System Anomaly Detection and Classification Utilizing WLS-EKF State Estimation and Machine Learning

Power system state estimation is being faced with different types of ano...
11/08/2017

RCNF: Real-time Collaborative Network Forensic Scheme for Evidence Analysis

Network forensic techniques help in tracking different types of cyber at...
08/01/2020

Cyber-Resilient Transactive Energy System Design over Insecure Communication Links

In this paper, the privacy and security issues associated with transacti...
09/25/2020

Towards Reconstructing Multi-Step Cyber Attacks in Modern Cloud Environments with Tripwires

Rapidly-changing cloud environments that consist of heavily interconnect...