{"title":"Enhancing the Stealth of Load Redistribution Attacks: A Novel Cluster-Driven Approach","authors":"Rohini Haridas;Chenghong Gu;Satish Sharma;Rohit Bhakar","doi":"10.1109/JSYST.2025.3554205","DOIUrl":null,"url":null,"abstract":"This letter proposes a novel cluster-driven bilevel Load Redistribution (LR) attack model in cyber physical power systems. The main goal is on overloading multiple transmission lines while maintaining a high level of stealth. The proposed model employs cluster-based approach to form distinct clusters, each representing different load patterns within the power system. This enables the design of attack vectors that seamlessly blend with these load patterns, thereby challenging advanced anomaly detection systems. The stealth of the attack is quantified by the Stealth Distance Index (SDI), ensuring that injected false data remain within the maximum permissible distance from the centroid of its corresponding cluster. The proposed model is validated on the modified IEEE 14-bus and 30-bus systems, demonstrating enhanced stealth capabilities in LR attacks.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 2","pages":"712-715"},"PeriodicalIF":4.0000,"publicationDate":"2025-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Systems Journal","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10959112/","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
This letter proposes a novel cluster-driven bilevel Load Redistribution (LR) attack model in cyber physical power systems. The main goal is on overloading multiple transmission lines while maintaining a high level of stealth. The proposed model employs cluster-based approach to form distinct clusters, each representing different load patterns within the power system. This enables the design of attack vectors that seamlessly blend with these load patterns, thereby challenging advanced anomaly detection systems. The stealth of the attack is quantified by the Stealth Distance Index (SDI), ensuring that injected false data remain within the maximum permissible distance from the centroid of its corresponding cluster. The proposed model is validated on the modified IEEE 14-bus and 30-bus systems, demonstrating enhanced stealth capabilities in LR attacks.
期刊介绍:
This publication provides a systems-level, focused forum for application-oriented manuscripts that address complex systems and system-of-systems of national and global significance. It intends to encourage and facilitate cooperation and interaction among IEEE Societies with systems-level and systems engineering interest, and to attract non-IEEE contributors and readers from around the globe. Our IEEE Systems Council job is to address issues in new ways that are not solvable in the domains of the existing IEEE or other societies or global organizations. These problems do not fit within traditional hierarchical boundaries. For example, disaster response such as that triggered by Hurricane Katrina, tsunamis, or current volcanic eruptions is not solvable by pure engineering solutions. We need to think about changing and enlarging the paradigm to include systems issues.