Zain ul Abdeen, Padmaksha Roy, Ahmad Al-Tawaha, Rouxi Jia, Laura Freeman, Peter Beling, Chen-Ching Liu, Alberto Sangiovanni-Vincentelli, Ming Jin
{"title":"Defense against Joint Poison and Evasion Attacks: A Case Study of DERMS","authors":"Zain ul Abdeen, Padmaksha Roy, Ahmad Al-Tawaha, Rouxi Jia, Laura Freeman, Peter Beling, Chen-Ching Liu, Alberto Sangiovanni-Vincentelli, Ming Jin","doi":"arxiv-2405.02989","DOIUrl":null,"url":null,"abstract":"There is an upward trend of deploying distributed energy resource management\nsystems (DERMS) to control modern power grids. However, DERMS controller\ncommunication lines are vulnerable to cyberattacks that could potentially\nimpact operational reliability. While a data-driven intrusion detection system\n(IDS) can potentially thwart attacks during deployment, also known as the\nevasion attack, the training of the detection algorithm may be corrupted by\nadversarial data injected into the database, also known as the poisoning\nattack. In this paper, we propose the first framework of IDS that is robust\nagainst joint poisoning and evasion attacks. We formulate the defense mechanism\nas a bilevel optimization, where the inner and outer levels deal with attacks\nthat occur during training time and testing time, respectively. We verify the\nrobustness of our method on the IEEE-13 bus feeder model against a diverse set\nof poisoning and evasion attack scenarios. The results indicate that our\nproposed method outperforms the baseline technique in terms of accuracy,\nprecision, and recall for intrusion detection.","PeriodicalId":501062,"journal":{"name":"arXiv - CS - Systems and Control","volume":"27 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Systems and Control","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2405.02989","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
There is an upward trend of deploying distributed energy resource management
systems (DERMS) to control modern power grids. However, DERMS controller
communication lines are vulnerable to cyberattacks that could potentially
impact operational reliability. While a data-driven intrusion detection system
(IDS) can potentially thwart attacks during deployment, also known as the
evasion attack, the training of the detection algorithm may be corrupted by
adversarial data injected into the database, also known as the poisoning
attack. In this paper, we propose the first framework of IDS that is robust
against joint poisoning and evasion attacks. We formulate the defense mechanism
as a bilevel optimization, where the inner and outer levels deal with attacks
that occur during training time and testing time, respectively. We verify the
robustness of our method on the IEEE-13 bus feeder model against a diverse set
of poisoning and evasion attack scenarios. The results indicate that our
proposed method outperforms the baseline technique in terms of accuracy,
precision, and recall for intrusion detection.