Nothing Special   »   [go: up one dir, main page]

FDI attacks on Sampled Values

Citation Author(s):
Xuelei
Wang
Submitted by:
Xuelei Wang
Last updated:
Mon, 07/08/2024 - 15:58
DOI:
10.21227/9x9q-pd59
Data Format:
License:
0
0 ratings - Please login to submit your rating.

Abstract 

# Datasets for stage 3

The datasets were collected from a software-based simulation environment simulating a small-scale IEC 61850-compliant substation with both the primary plant and the process bus.

The datasets consist of 148 attack scenarios, each scenario includes two benign behaviours (fault-free behaviours and emergency behaviours) and one type of malicious behaviour. 

All attack scenarios are derived from two types of false data injection attacks (FDIAs): 1) modification of data in the original message, and 2) addition of fake messages. Different attack configurations were applied to generate a variety of datasets, such as injecting or modifying different numbers of packets, injecting packets in different frequencies, and slightly increasing original measurements with certain ratios.

 

 

Instructions: 

 

 

 

 

**The details of each dataset and attack scenario are explained and listed in "Attack Scenario details.xlsx"**

**The location and file name of each scenario or each dataset are demonstrated in "Attack Scenario details.xlsx"**

For example, attack scenario 9432 has one original dataset called **IED_TRSF1_SV.pcapng** and **IED_TRSF1_SV.csv**, one merged dataset called **Data.xlsx**, and two final datasets called **5_2.xlsx** and **6_2.xlsx**, in the location of /943/9432 (Add all 25ms).