Nothing Special   »   [go: up one dir, main page]

Skip to main content

Supervised Learning for Detecting Stealthy False Data Injection Attacks in the Smart Grid

  • Conference paper
  • First Online:
Advances in Security, Networks, and Internet of Things

Abstract

The largest and the most complex cyber-physical systems, the smart grids, are under constant threat of multi-faceted cyber-attacks. The state estimation (SE) is at the heart of a series of critical control processes in the power transmission system. The false data injection (FDI) attacks against the SE can severely disrupt the power systems operationally and economically. With knowledge of the system topology, a cyber-attacker can formulate and execute stealthy FDI attacks that are very difficult to detect. Statistical, physics-based, and more recently, data-driven machine learning-based approaches have been undertaken to detect the FDI attacks. In this chapter, we employ five supervised machine learning models to detect stealthy FDI attacks. We also use ensembles, where multiple classifiers are used and decisions by individual classifiers are further classified, to find out if ensembles give any better results. We also use feature selection method to reduce the number of features to investigate if it improves detection rate and speed up the testing process. We run experiments using simulated data from the standard IEEE 14-bus system. The simulation results show that the ensemble classifiers do not perform any better than the individual classifiers. However, feature reduction speeds up the training by manyfold without compromising the model performance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. S. McLaughlin, C. Konstantinou, X. Wang, L. Davi, A.-R. Sadeghi, M. Maniatakos, R. Karri, The cybersecurity landscape in industrial control systems. Proc. IEEE 104(5), 1039–1057 (2016)

    Article  Google Scholar 

  2. Y. Liu, P. Ning, M.K. Reiter, False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. 14(1), 13:1–13:33 (2011)

    Google Scholar 

  3. A. Abur, A. Gomez-Exposito, Power System State Estimation: Theory and Implementation (CRC Press, New York, 2004)

    Book  Google Scholar 

  4. C. Alcaraz, J. Lopez, Wide-area situational awareness for critical infrastructure protection. Computer 46(4), 30–37 (2013)

    Article  Google Scholar 

  5. Y. Xiang, L. Wang, N. Liu, Coordinated attacks on electric power systems in a cyber-physical environment. Electr. Power Syst. Res. 149, 156–168 (2017)

    Article  Google Scholar 

  6. X. Liu, Z. Li, False data attack models, impact analyses and defense strategies in the electricity grid. Electr. J. 30, 35–42 (2017)

    Google Scholar 

  7. R. Polikar, Ensemble learning in Ensemble Machine Learning (Springer, Berlin, 2012), pp. 1–34

    Book  Google Scholar 

  8. N. Moustafa, B. Turnbull, K.-K.R. Choo, An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things. IEEE Internet Things J. 6(3), 4815–4830 (2018)

    Article  Google Scholar 

  9. X. Zhang, Z. Zhao, Y. Zheng, J. Li, Prediction of taxi destinations using a novel data embedding method and ensemble learning. IEEE Trans. Intell. Transp. Syst. 21(1), 68–78 (2019)

    Article  Google Scholar 

  10. S. Das, A.M. Mahfouz, D. Venugopal, S. Shiva, DDoS intrusion detection through machine learning ensemble, in 2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion (QRS-C) (IEEE, Piscataway, 2019), pp. 471–477

    Google Scholar 

  11. R.D. Zimmerman, C.E. Murillo-Sánchez, R.J. Thomas, MATPOWER: steady-state operations, planning, and analysis tools for power systems research and education. IEEE Trans. Power Syst. 26(1), 12–19 (2011)

    Article  Google Scholar 

  12. M. Esmalifalak, L. Liu, N. Nguyen, R. Zheng, Z. Han, Detecting stealthy false data injection using machine learning in smart grid. IEEE Syst. J. 11(3), 1644–1652 (2014)

    Article  Google Scholar 

  13. M. Ozay, I. Esnaola, F.T.Y. Vural, S.R. Kulkarni, H.V. Poor, Machine learning methods for attack detection in the smart grid. IEEE Trans. Neural Netw. Learn. Syst. 27(8), 1773–1786 (2015)

    Article  MathSciNet  Google Scholar 

  14. Y. He, G.J. Mendis, J. Wei, Real-time detection of false data injection attacks in smart grid: a deep learning-based intelligent mechanism. IEEE Trans. Smart Grid 8(5), 2505–2516 (2017)

    Article  Google Scholar 

  15. Y. Wang, M. Amin, J. Fu, H. Moussa, A novel data analytical approach for false data injection cyber-physical attack mitigation in smart grids. IEEE Access 5, 26022–26033 (2017)

    Article  Google Scholar 

  16. J. Wang, W. Tu, L.C. Hui, S.-M. Yiu, E.K. Wang, Detecting time synchronization attacks in cyber-physical systems with machine learning techniques, in 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS) (IEEE, Piscataway, 2017), pp. 2246–2251

    Google Scholar 

  17. M. Ashrafuzzaman, Y. Chakhchoukh, A. Jillepalli, P. Tosic, D. Conte de Leon, F. Sheldon, B. Johnson, Detecting stealthy false data injection attacks in power grids using deep learning, in Wireless Communications and Mobile Computing Conference (IWCMC), 14th International (IEEE, Piscataway, 2018), pp. 219–225

    Google Scholar 

  18. S. Ahmed, Y. Lee, S.-H. Hyun, I. Koo, Covert cyber assault detection in smart grid networks utilizing feature selection and Euclidean distance-based machine learning. Appl. Sci. 8(5), 772–792 (2018)

    Article  Google Scholar 

  19. X. Niu, J. Li, J. Sun, K. Tomsovic, Dynamic detection of false data injection attack in smart grid using deep learning, in 2019 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT) (IEEE, Piscataway, 2019), pp. 1–6

    Google Scholar 

  20. H. Wang, J. Ruan, G. Wang, B. Zhou, Y. Liu, X. Fu, J.-C. Peng, Deep learning based interval state estimation of AC smart grids against sparse cyber attacks. IEEE Trans. Industr. Inf. 14(11), 4766–4778 (2018)

    Article  Google Scholar 

  21. M.R. Camana-Acosta, S. Ahmed, C.E. Garcia, I. Koo, Extremely randomized trees-based scheme for stealthy cyber-attack detection in smart grid networks. IEEE Access 8, 19921–19933 (2020)

    Article  Google Scholar 

  22. M. Mohammadpourfard, Y. Weng, M. Pechenizkiy, M. Tajdinian, B. Mohammadi-Ivatloo, Ensuring cybersecurity of smart grid against data integrity attacks under concept drift. Int. J. Electr. Power Energy Syst. 119, 105947 (2020)

    Article  Google Scholar 

  23. S. Ahmed, Y. Lee, S.-H. Hyun, I. Koo, Unsupervised machine learning-based detection of covert data integrity assault in smart grid networks utilizing isolation forest. IEEE Trans. Inf. Forensics Secur. 14(10), 2765–2777 (2019)

    Article  Google Scholar 

  24. J. Hao, R.J. Piechocki, D. Kaleshi, W.H. Chin, Z. Fan, Sparse malicious false data injection attacks and defense mechanisms in smart grids. IEEE Trans. Industr. Inf. 11(5), 1–12 (2015)

    Article  Google Scholar 

  25. Y. Chakhchoukh, S. Liu, M. Sugiyama, H. Ishii, Statistical outlier detection for diagnosis of cyber attacks in power state estimation, in 2016 IEEE Power and Energy Society General Meeting (PESGM) (IEEE, Piscataway, 2016), pp. 1–5

    Google Scholar 

  26. M.N. Kurt, O. Ogundijo, C. Li, X. Wang, Online cyber-attack detection in smart grid: a reinforcement learning approach. IEEE Trans. Smart Grid 10(5), 5174–5185 (2018)

    Article  Google Scholar 

  27. M.S. Thomas, J.D. McDonald, Power System SCADA and Smart Grids (CRC Press, Boca Raton, 2015)

    Google Scholar 

  28. University of Washington, Power System Test Case Archive (2018). http://www.ee.washington.edu/research/pstca/

  29. G.E. Batista, R.C. Prati, M.C. Monard, A study of the behavior of several methods for balancing machine learning training data. ACM SIGKDD Explor. Newslett. 6(1), 20–29 (2004)

    Article  Google Scholar 

  30. M. Sokolova, G. Lapalme, A systematic analysis of performance measures for classification tasks. Inf. Process. Manage. 45(4), 427–437 (2009)

    Article  Google Scholar 

Download references

Acknowledgements

This research was partially supported by an Idaho Global Entrepreneurial Mission (IGEM) grant for Security Management of Cyber-Physical Control Systems, 2016 (Grant Number IGEM17-001).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammad Ashrafuzzaman .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ashrafuzzaman, M., Das, S., Chakhchoukh, Y., Duraibi, S., Shiva, S., Sheldon, F.T. (2021). Supervised Learning for Detecting Stealthy False Data Injection Attacks in the Smart Grid. In: Daimi, K., Arabnia, H.R., Deligiannidis, L., Hwang, MS., Tinetti, F.G. (eds) Advances in Security, Networks, and Internet of Things. Transactions on Computational Science and Computational Intelligence. Springer, Cham. https://doi.org/10.1007/978-3-030-71017-0_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-71017-0_21

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-71016-3

  • Online ISBN: 978-3-030-71017-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics