恶意数据注入攻击:一种基于宽松物理模型的实时监控策略

Tierui Zou, A. Bretas, Nader Aljohani, N. Bretas
{"title":"恶意数据注入攻击:一种基于宽松物理模型的实时监控策略","authors":"Tierui Zou, A. Bretas, Nader Aljohani, N. Bretas","doi":"10.1109/NAPS46351.2019.9000397","DOIUrl":null,"url":null,"abstract":"With the rapid advances in the infrastructure of power networks, modern power systems have become vulnerable to cyber-attacks. An attacker can mislead the operators in power system control centers by introducing malicious data that affect the outputs of the state estimator which turn disrupts in the operation and control functions of many power system applications. Hence, an accurate and fast algorithm for detecting, identifying and correcting malicious data injection attacks is crucial to prevent catastrophic failures in power systems. This paper presents further contributions to power system real-time monitoring in the presence of a malicious data injection attacks. State of the art solutions consider either measurement or parameter is free of error when estimating the state variables, such as complex voltages. However, malicious data in measurements and parameters can be injected simultaneously and such assumption does not provide an accurate solution. In this work, a relaxed model strategy is proposed to handle such simultaneous data attack. The framework of measurement gross error analysis is deployed in processing and analyzing attacks. Chi-square X2 Hypothesis Testing applied to the normalized composed measurement error (CMEN) is considered for detecting cyber-attacks. The property of largest normalized error test is used for identifying malicious data injection. The correction of cyber-attack considers the type of attack and the composed normalized error (CNE) in a relaxed model strategy that takes into account the effect of the measurement in error when correcting the attacked parameter. The proposed model is validated on IEEE 14-bus system.","PeriodicalId":175719,"journal":{"name":"2019 North American Power Symposium (NAPS)","volume":"511 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Malicious data injection attacks: A relaxed physics model based strategy for real-time monitoring\",\"authors\":\"Tierui Zou, A. Bretas, Nader Aljohani, N. Bretas\",\"doi\":\"10.1109/NAPS46351.2019.9000397\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the rapid advances in the infrastructure of power networks, modern power systems have become vulnerable to cyber-attacks. An attacker can mislead the operators in power system control centers by introducing malicious data that affect the outputs of the state estimator which turn disrupts in the operation and control functions of many power system applications. Hence, an accurate and fast algorithm for detecting, identifying and correcting malicious data injection attacks is crucial to prevent catastrophic failures in power systems. This paper presents further contributions to power system real-time monitoring in the presence of a malicious data injection attacks. State of the art solutions consider either measurement or parameter is free of error when estimating the state variables, such as complex voltages. However, malicious data in measurements and parameters can be injected simultaneously and such assumption does not provide an accurate solution. In this work, a relaxed model strategy is proposed to handle such simultaneous data attack. The framework of measurement gross error analysis is deployed in processing and analyzing attacks. Chi-square X2 Hypothesis Testing applied to the normalized composed measurement error (CMEN) is considered for detecting cyber-attacks. The property of largest normalized error test is used for identifying malicious data injection. The correction of cyber-attack considers the type of attack and the composed normalized error (CNE) in a relaxed model strategy that takes into account the effect of the measurement in error when correcting the attacked parameter. The proposed model is validated on IEEE 14-bus system.\",\"PeriodicalId\":175719,\"journal\":{\"name\":\"2019 North American Power Symposium (NAPS)\",\"volume\":\"511 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 North American Power Symposium (NAPS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NAPS46351.2019.9000397\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 North American Power Symposium (NAPS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NAPS46351.2019.9000397","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

随着电网基础设施的快速发展,现代电力系统越来越容易受到网络攻击。攻击者可以通过引入影响状态估计器输出的恶意数据来误导电力系统控制中心的操作人员,从而破坏许多电力系统应用的运行和控制功能。因此,一种准确、快速的检测、识别和纠正恶意数据注入攻击的算法对于防止电力系统发生灾难性故障至关重要。本文对存在恶意数据注入攻击的电力系统实时监控作了进一步的研究。在估计状态变量(如复杂电压)时,最先进的解决方案考虑测量或参数没有误差。然而,测量和参数中的恶意数据可以同时注入,这种假设并不能提供准确的解决方案。本文提出了一种松弛模型策略来处理这种同步数据攻击。在攻击处理和分析中,采用了测量粗差分析框架。采用归一化组合测量误差(CMEN)的卡方X2假设检验来检测网络攻击。利用最大归一化错误测试的特性来识别恶意数据注入。网络攻击的校正考虑了攻击类型和组合归一化误差(CNE),在校正被攻击参数时考虑了误差测量的影响。该模型在IEEE 14总线系统上得到了验证。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Malicious data injection attacks: A relaxed physics model based strategy for real-time monitoring
With the rapid advances in the infrastructure of power networks, modern power systems have become vulnerable to cyber-attacks. An attacker can mislead the operators in power system control centers by introducing malicious data that affect the outputs of the state estimator which turn disrupts in the operation and control functions of many power system applications. Hence, an accurate and fast algorithm for detecting, identifying and correcting malicious data injection attacks is crucial to prevent catastrophic failures in power systems. This paper presents further contributions to power system real-time monitoring in the presence of a malicious data injection attacks. State of the art solutions consider either measurement or parameter is free of error when estimating the state variables, such as complex voltages. However, malicious data in measurements and parameters can be injected simultaneously and such assumption does not provide an accurate solution. In this work, a relaxed model strategy is proposed to handle such simultaneous data attack. The framework of measurement gross error analysis is deployed in processing and analyzing attacks. Chi-square X2 Hypothesis Testing applied to the normalized composed measurement error (CMEN) is considered for detecting cyber-attacks. The property of largest normalized error test is used for identifying malicious data injection. The correction of cyber-attack considers the type of attack and the composed normalized error (CNE) in a relaxed model strategy that takes into account the effect of the measurement in error when correcting the attacked parameter. The proposed model is validated on IEEE 14-bus system.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信