Detecting Subspace Malicious Vectors Attack Against Smart Grid Using Sequence-Alignment Method

Khaled F. Alotaibi, Rafat Rob, Dana Nour, Doaa Zamzami
{"title":"Detecting Subspace Malicious Vectors Attack Against Smart Grid Using Sequence-Alignment Method","authors":"Khaled F. Alotaibi, Rafat Rob, Dana Nour, Doaa Zamzami","doi":"10.1109/CSR57506.2023.10224936","DOIUrl":null,"url":null,"abstract":"The energy sector is moving toward the new Digital Substation Architecture which will introduce new opportunities for the smart grid, applications, monitoring and control. Nevertheless, the new advancements come with its own risk, such as the creation of new security attack surfaces. For example, targeting the data integrity of system, the attacker can manipulate the critical operational data using sophisticated algorithms resulting in incorrect operation decision making. This attack method is aimed to create subspace malicious vectors according to the system configuration to be launched as augmented vectors to the actual field data. This attack will impose the operators to take actions based on altered data which will lead to system failure or blackout. The malicious subspaces vectors will impact the state variables of power grid buses and bypass integrity data validation test. This paper used IEEE-9 bus system to demonstrate the methods for generating malicious subspace vectors to be used and alter the data integrity. The corrupted data can be applied to the integrity validation test and assure the operator that the data integrity has been verified successfully. This paper is proposing a practical solution to detect such an attack scenario by comparing sequences of malicious behaviors used in the analysis of attack activity patterns. Therefore, the proposed method is to evaluate behavior method which is employed on IEEE 9-bus system, and the result has demonstrated the effectiveness of using sequence-alignment methods to detect certain behaviors of generating subspace attacking vectors against smart Grid.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSR57506.2023.10224936","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The energy sector is moving toward the new Digital Substation Architecture which will introduce new opportunities for the smart grid, applications, monitoring and control. Nevertheless, the new advancements come with its own risk, such as the creation of new security attack surfaces. For example, targeting the data integrity of system, the attacker can manipulate the critical operational data using sophisticated algorithms resulting in incorrect operation decision making. This attack method is aimed to create subspace malicious vectors according to the system configuration to be launched as augmented vectors to the actual field data. This attack will impose the operators to take actions based on altered data which will lead to system failure or blackout. The malicious subspaces vectors will impact the state variables of power grid buses and bypass integrity data validation test. This paper used IEEE-9 bus system to demonstrate the methods for generating malicious subspace vectors to be used and alter the data integrity. The corrupted data can be applied to the integrity validation test and assure the operator that the data integrity has been verified successfully. This paper is proposing a practical solution to detect such an attack scenario by comparing sequences of malicious behaviors used in the analysis of attack activity patterns. Therefore, the proposed method is to evaluate behavior method which is employed on IEEE 9-bus system, and the result has demonstrated the effectiveness of using sequence-alignment methods to detect certain behaviors of generating subspace attacking vectors against smart Grid.
基于序列比对的智能电网子空间恶意向量攻击检测
能源行业正朝着新的数字化变电站架构发展,这将为智能电网、应用、监测和控制带来新的机遇。然而,新的进步也伴随着自身的风险,例如创建新的安全攻击面。例如,攻击者以系统的数据完整性为目标,利用复杂的算法操纵关键的操作数据,导致错误的操作决策。该攻击方法的目的是根据系统配置创建子空间恶意向量,将其作为增广向量投放到实际的现场数据中。这种攻击将迫使运营商根据改变的数据采取行动,这将导致系统故障或停电。恶意子空间向量会影响电网母线状态变量,绕过完整性数据验证测试。本文以IEEE-9总线系统为例,演示了生成恶意子空间向量的方法。损坏的数据可以用于完整性验证测试,并向操作员保证数据完整性已成功验证。本文提出了一种实用的解决方案,通过比较攻击活动模式分析中使用的恶意行为序列来检测这种攻击场景。因此,本文提出的方法是对IEEE 9总线系统中使用的行为方法进行评估,结果证明了使用序列比对方法检测针对智能电网生成子空间攻击向量的某些行为的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信