skip to main content
research-article

Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learning

Published: 01 October 2020 Publication History

Highlights

Detection of stealthy false data injection attacks in the smart grid.
Supervised and unsupervised machine learning methods.
Ensemble-based machine learning methods.

Abstract

Stealthy false data injection attacks target state estimation in energy management systems in smart power grids to adversely affect operations of the power transmission systems. This paper presents a data-driven machine learning based scheme to detect stealthy false data injection attacks on state estimation. The scheme employs ensemble learning, where multiple classifiers are used and decisions by individual classifiers are further classified. Two ensembles are used in this scheme, one uses supervised classifiers while the other uses unsupervised classifiers. The scheme is validated using simulated data on the standard IEEE 14-bus system. Experimental results show that the performance of both supervised individual and ensemble models are comparable. However, for unsupervised models, the ensembles performed better than the individual classifiers.

References

[1]
A. Abur, A. Gomez-Exposito, Power System State Estimation: Theory and Implementation, CRC Press, New York, 2004,.
[2]
S. Ahmed, Y. Lee, S.-H. Hyun, I. Koo, Covert cyber assault detection in smart grid networks utilizing feature selection and Euclidean distance-based machine learning, Appl. Sci. 8 (5) (2018) 772–792,.
[3]
S. Ahmed, Y. Lee, S.-H. Hyun, I. Koo, Feature selection–based detection of covert cyber deception assaults in smart grid communications networks using machine learning, IEEE Access 6 (2018) 27518–27529,.
[4]
S. Ahmed, Y. Lee, S.-H. Hyun, I. Koo, Unsupervised machine learning-based detection of covert data integrity assault in smart grid networks utilizing isolation forest, IEEE Trans. Inf. Forens. Secur. 14 (10) (2019) 2765–2777,.
[5]
O.A. Alimi, K. Ouahada, A.M. Abu-Mahfouz, Real time security assessment of the power system using a hybrid support vector machine and multilayer perceptron neural network algorithms, Sustainability 11 (13) (2019) 3586,.
[6]
m. Ashrafuzzaman, Y. Chakhchoukh, A. Jillepalli, P. Tosic, D. Conte de Leon, F. Sheldon, B. Johnson, Detecting stealthy false data injection attacks in power grids using deep learning, Proceedings of the Fourteenth International Wireless Communications and Mobile Computing Conference (IWCMC), IEEE, 2018, pp. 219–225,.
[7]
A. Ayad, H.E. Farag, A. Youssef, E.F. El-Saadany, Detection of false data injection attacks in smart grids using recurrent neural networks, 2018 Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT), IEEE, 2018, pp. 1–5,.
[8]
G.E. Batista, R.C. Prati, M.C. Monard, A study of the behavior of several methods for balancing machine learning training data, ACM SIGKDD Explor. Newslett. 6 (1) (2004) 20–29,.
[9]
M.M. Breunig, H.-P. Kriegel, R.T. Ng, J. Sander, LOF: identifying density-based local outliers, Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, 2000, pp. 93–104,.
[10]
E. Byres, The air gap: SCADA’s enduring security myth, Commun. ACM 56 (8) (2013) 29–31,.
[11]
M.R. Camana-Acosta, S. Ahmed, C.E. Garcia, I. Koo, Extremely randomized trees-based scheme for stealthy cyber-attack detection in smart grid networks, IEEE Access 8 (2020) 19921–19933,.
[12]
Y. Chakhchoukh, H. Lei, B.K. Johnson, Diagnosis of outliers and cyber attacks in dynamic PMU-based power state estimation, IEEE Trans. Power Syst. (2019),.
[13]
Y. Chakhchoukh, S. Liu, M. Sugiyama, H. Ishii, Statistical outlier detection for diagnosis of cyber attacks in power state estimation, Proceedings of the 2016 IEEE Power and Energy Society General Meeting (PESGM), IEEE, 2016, pp. 1–5.
[14]
G. Chaojun, P. Jirutitijaroen, M. Motani, Detecting false data injection attacks in AC state estimation, IEEE Trans. Smart Grid 6 (5) (2015) 2476–2483,.
[15]
Christianini, N., Shawe-Taylor, J., 2000. Support vector machines and other kernel-based learning methods, Cambridge UP.
[16]
C. Cortes, V. Vapnik, Support-vector networks, Mach. Learn. 20 (3) (1995) 273–297,.
[17]
G. Cybenko, C.E. Landwehr, Security analytics and measurements, IEEE Secur. Privacy 10 (3) (2012) 5–8,.
[18]
S. Das, D. Venugopal, S. Shiva, A holistic approach for detecting DDoS attacks by using ensemble unsupervised machine learning, Proceedings of the Future of Information and Communication Conference, Springer, 2020, pp. 721–738,.
[19]
T.G. Dietterich, Ensemble methods in machine learning, Proceedings of the International Workshop on Multiple Classifier Systems, Springer, 2000, pp. 1–15,.
[20]
M. Esmalifalak, L. Liu, N. Nguyen, R. Zheng, Z. Han, Detecting stealthy false data injection using machine learning in smart grid, IEEE Syst. J. 11 (3) (2017) 1644–1652,.
[21]
S.A. Foroutan, F.R. Salmasi, Detection of false data injection attacks against state estimation in smart grids based on a mixture Gaussian distribution learning method, IET Cyber-Phys. Syst.: Theory Appl. (2017),.
[22]
J. Hao, R.J. Piechocki, D. Kaleshi, W.H. Chin, Z. Fan, Sparse malicious false data injection attacks and defense mechanisms in smart grids, IEEE Transactions on Industrial Informatics 11 (5) (2015) 1–12,.
[23]
T. Hastie, R. Tibshirani, J. Friedman, The Elements of Statistical Learning: Data Mining, Inference, and Prediction, 2nd, New York: Springer-Verlag, 2008.
[24]
Y. He, G.J. Mendis, J. Wei, Real-time detection of false data injection attacks in smart grid: a deep learning-based intelligent mechanism, IEEE Trans. Smart Grid (2017),.
[25]
M. Hubert, M. Debruyne, Minimum Covariance Determinant, 2, Wiley Interdisciplinary Reviews: Computational Statistics, 2010, pp. 36–43,.
[26]
G. Hug, J.A. Giampapa, Vulnerability assessment of AC state estimation with respect to false data injection cyber-attacks, IEEE Trans. Smart Grid 3 (3) (2012) 1362–1370,.
[27]
S.S. Khan, M.G. Madden, A survey of recent trends in one class classification, Proceedings of the Irish Conference on Artificial Intelligence and Cognitive Science, Springer, 2009, pp. 188–197,.
[28]
O. Kosut, L. Jia, R.J. Thomas, L. Tong, Malicious data attacks on the smart grid, IEEE Trans. Smart Grid 2 (4) (2011) 645–658,.
[29]
M.N. Kurt, O. Ogundijo, C. Li, X. Wang, Online cyber-attack detection in smart grid: a reinforcement learning approach, IEEE Trans. Smart Grid 10 (5) (2018) 5174–5185,.
[30]
B. Li, R. Lu, W. Wang, K.-K.R. Choo, Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system, J. Parall. Distrib. Comput. 103 (2017) 32–41,.
[31]
G. Liang, S.R. Weller, J. Zhao, F. Luo, Z.Y. Dong, The 2015 Ukraine blackout: implications for false data injection attacks, IEEE Trans. Power Syst. 32 (4) (2017) 3317–3318,.
[32]
F.T. Liu, K.M. Ting, Z.-H. Zhou, Isolation-based anomaly detection, ACM Trans. Knowl. Discov. Data (TKDD) 6 (1) (2012) 1–39,.
[33]
X. Liu, Z. Li, False data attack models, impact analyses and defense strategies in the electricity grid, Electr. J. 30 (2017) 35–42,.
[34]
Y. Liu, P. Ning, M.K. Reiter, False data injection attacks against state estimation in electric power grids, ACM Trans. Inf. Syst. Secur. 14 (1) (2011) 13:1–13:33,.
[35]
S. Marsland, Machine Learning: An Algorithmic Perspective, CRC press, 2015.
[36]
M. Mohammadpourfard, Y. Weng, M. Pechenizkiy, M. Tajdinian, B. Mohammadi-Ivatloo, Ensuring cybersecurity of smart grid against data integrity attacks under concept drift, Int. J. Electr. Power Energy Syst. 119 (2020) 105947,.
[37]
N. Moustafa, B. Turnbull, K.-K.R. Choo, An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things, IEEE Internet Things J. 6 (3) (2018) 4815–4830,.
[38]
X. Niu, J. Li, J. Sun, K. Tomsovic, Dynamic detection of false data injection attack in smart grid using deep learning, Proceeding of the 2019 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT), IEEE, 2019, pp. 1–6,.
[39]
M. Ozay, I. Esnaola, F.T.Y. Vural, S.R. Kulkarni, H.V. Poor, Machine learning methods for attack detection in the smart grid, IEEE Trans. Neural Netw. Learn. Syst. 27 (8) (2015) 1773–1786,.
[40]
F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, E. Duchesnay, Scikit-learn: machine learning in Python, J. Mach. Learn. Res. 12 (2011) 2825–2830.
[41]
R. Polikar, Ensemble learning, Ensemble Machine Learning, Springer, 2012, pp. 1–34,.
[42]
Ponemon Institute, 2019. Cybersecurity in operational technology: 7 insights you need to know. Accessed on April 10, 2020.
[43]
P.J. Rousseeuw, K.V. Driessen, A fast algorithm for the minimum covariance determinant estimator, Technometrics 41 (3) (1999) 212–223.
[44]
J. Schmidhuber, Deep learning in neural networks: an overview, Neural Netw. 61 (2015) 85–117,.
[45]
B. Schölkopf, R.C. Williamson, A.J. Smola, J. Shawe-Taylor, J.C. Platt, Support vector method for novelty detection, Advances in Neural Information Processing Systems, 2000, pp. 582–588.
[46]
M. Sokolova, G. Lapalme, A systematic analysis of performance measures for classification tasks, Inf. Process. Manag. 45 (4) (2009) 427–437,.
[47]
M. Sugiyama, T. Suzuki, T. Kanamori, Density Ratio Estimation in Machine Learning, Cambridge University Press, 2012.
[48]
S. Tan, D. De, W.-Z. Song, J. Yang, S.K. Das, Survey of security advances in smart grid: A data driven approach, IEEE Commun. Surv. Tutorials 19 (1) (2017) 397–422,.
[49]
M.S. Thomas, J.D. McDonald, Power System SCADA and Smart Grids, CRC Press, 2015.
[50]
University of Washington, 2018. Power System Test Case Archive. [Online]. Available: http://www.ee.washington.edu/research/pstca/.
[51]
M. Verleysen, D. François, The curse of dimensionality in data mining and time series prediction, Proceeding of the International Work-Conference on Artificial Neural Networks, Springer, 2005, pp. 758–770,.
[52]
D. Wang, X. Wang, Y. Zhang, L. Jin, Detection of power grid disturbances and cyber-attacks based on machine learning, J. Inf. Secur. Appl. 46 (2019) 42–52,.
[53]
H. Wang, J. Ruan, G. Wang, B. Zhou, Y. Liu, X. Fu, J.-C. Peng, Deep learning based interval state estimation of AC smart grids against sparse cyber attacks, IEEE Trans. Ind. Inf. (2018),.
[54]
J. Wang, W. Tu, L.C. Hui, S.-M. Yiu, E.K. Wang, Detecting time synchronization attacks in cyber-physical systems with machine learning techniques, Proceeding of the 2017 IEEE Thirty-seventh International Conference on Distributed Computing Systems (ICDCS), IEEE, 2017, pp. 2246–2251,.
[55]
Y. Wang, M. Amin, J. Fu, H. Moussa, A novel data analytical approach for false data injection cyber-physical attack mitigation in smart grids, IEEE Access (2017),.
[56]
Y. Xiang, L. Wang, N. Liu, Coordinated attacks on electric power systems in a cyber-physical environment, Electr. Power Syst. Res. 149 (2017) 156–168,.
[57]
L. Xie, Y. Mo, B. Sinopoli, Integrity data attacks in power market operations, IEEE Trans. Smart Grid 2 (4) (2011) 659–666,.
[58]
C. Yang, Y. Wang, Y. Zhou, J. Ruan, W. Liu, et al., False data injection attacks detection in power system using machine learning method, J. Comput. Commun. 6 (11) (2018) 276,.
[59]
X. Zhang, Z. Zhao, Y. Zheng, J. Li, Prediction of taxi destinations using a novel data embedding method and ensemble learning, IEEE Trans. Intell. Transp. Syst. (2019),.
[60]
R.D. Zimmerman, C.E. Murillo-Sánchez, R.J. Thomas, MATPOWER: Steady-state operations, planning, and analysis tools for power systems research and education, IEEE Trans. Power Syst. 26 (1) (2011) 12–19,.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Computers and Security
Computers and Security  Volume 97, Issue C
Oct 2020
747 pages

Publisher

Elsevier Advanced Technology Publications

United Kingdom

Publication History

Published: 01 October 2020

Author Tags

  1. Smart grid security
  2. Stealthy false data injection attack
  3. Ensemble-based machine learning
  4. Cyber-physical system security
  5. Critical infrastructure protection

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 26 Dec 2024

Other Metrics

Citations

Cited By

View all

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media