Abstract
Detecting replay attacks in power systems is quite challenging, since the attackers can mimic normal power states and do not make direct damages to the system. Existing works are mostly model-based, which may either suffer from a low detection performance or induce negative side effects to power control. In this paper, we explore purely data-driven approach for good detection performance without side effects. Our basic idea is to learn a classifier using a set of labelled data (i.e., power state) samples to detect the replayed states from normal ones. We choose the Support Vector Machine (SVM) as our classifier, and a self-correlation coefficient as the data feature for detection. We evaluate and confirm the effectiveness of our approach on IEEE bus systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Zhang, Y., Wang, L., Sun, W., Green, R.C., Alam, M.: Distributed intrusion detection system in a multi-layer network architecture of smart grids. IEEE Trans. Smart Grid 2(4), 796–808 (2011)
Ericsson, G.N.: Cyber security and power system communicationessential parts of a smart grid infrastructure. IEEE Trans. Power Deliv. 25(3), 1501–1507 (2010)
Zhou, P., Jiang, S., Irissappane, A., Zhang, J., Zhou, J., Teo, J.C.M.: Toward energy-efficient trust system through watchdog optimization for WSNs. IEEE Trans. Inf. Forensics Secur. 10(3), 613–625 (2015)
Wei, D., Lu, Y., Jafari, M., Skare, P.M., Rohde, K.: Protecting smart grid automation systems against cyberattacks. IEEE Trans. Smart Grid 2(4), 782–795 (2011)
Falliere, N., Murchu, L.O., Chien, E.: Symantec Corp. Secur. Response. W32. stuxnet dossier 5, 6 (2011). White paper
Mo, Y., Weerakkody, S., Sinopoli, B.: Physical authentication of control systems: designing watermarked control inputs to detect counterfeit sensor outputs. IEEE Control Syst. 35(1), 93–109 (2015)
Mo, Y., Sinopoli, B.: Secure control against replay attacks. In: 47th Annual Allerton Conference on Communication, Control, and Computing, pp. 911–918. IEEE (2009)
Hoehn, A., Zhang, P.: Detection of replay attacks in cyber-physical systems. In: American Control Conference (ACC), pp. 290–295. American Automatic Control Council (AACC) (2016)
Zimmerman, R.D., Murillo-Sánchez, C.E., Thomas, R.J.: Matpower: steady-state operations, planning, and analysis tools for power systems research and education. IEEE Trans. Power Syst. 26(1), 12–19 (2011)
Gonen, T.: Electric Power Distribution Engineering. CRC Press, Boca Raton (2016)
Burges, C.J.: A tutorial on support vector machines for pattern recognition. Data Min. Knowl. Disc. 2(2), 121–167 (1998)
Da Silva, A.L., Do Coutto Filho, M., De Queiroz, J.: State forecasting in electric power systems. In: IEE Proceedings C (Generation, Transmission and Distribution), Vol. 130, pp. 237–244. IET (1983)
Zhou, P., Gu, X., Zhang, J., Fei, M.: A priori trust inference with context-aware stereotypical deep learning. Knowl.-Based Syst. 88, 97–106 (2015)
Laskov, P., Lippmann, R.: Machine learning in adversarial environments. Mach. Learn. 81(2), 115–119 (2010)
Acknowledgments
This work was partially supported by the National Natural Science Foundation of China (Nos. 61502293, 61633016 and 61673255), the Shanghai Young Eastern Scholar Program (No. QD2016030), the Young Teachers’ Training Program for Shanghai College & University, the Science and Technology Commission of Shanghai Municipality (Nos. 17511107002 and 15411953502) and the Shanghai Key Laboratory of Power Station Automation Technology.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Ma, M., Zhou, P., Du, D., Peng, C., Fei, M., AlBuflasa, H.M. (2017). Detecting Replay Attacks in Power Systems: A Data-Driven Approach. In: Li, K., Xue, Y., Cui, S., Niu, Q., Yang, Z., Luk, P. (eds) Advanced Computational Methods in Energy, Power, Electric Vehicles, and Their Integration. ICSEE LSMS 2017 2017. Communications in Computer and Information Science, vol 763. Springer, Singapore. https://doi.org/10.1007/978-981-10-6364-0_45
Download citation
DOI: https://doi.org/10.1007/978-981-10-6364-0_45
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6363-3
Online ISBN: 978-981-10-6364-0
eBook Packages: Computer ScienceComputer Science (R0)