2021
DOI: 10.1109/tifs.2020.3027148
|View full text |Cite
|
Sign up to set email alerts
|

Stealthy MTD Against Unsupervised Learning-Based Blind FDI Attacks in Power Systems

Abstract: This paper examines how moving target defenses (MTD) implemented in power systems can be countered by unsupervised learning-based false data injection (FDI) attack and how MTD can be combined with physical watermarking to enhance the system resilience. A novel intelligent attack, which incorporates dimensionality reduction and density-based spatial clustering, is developed and shown to be effective in maintaining stealth in the presence of traditional MTD strategies. In resisting this new type of attack, a nov… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

3
5

Authors

Journals

citations
Cited by 40 publications
(18 citation statements)
references
References 35 publications
0
18
0
Order By: Relevance
“…Esmalifalak et al [70] proposed an independent component analysis (ICA) algorithm to speculate the matrix H from power flow measurements. Higgins et al [71] proposed a data prepossessing before the ICA process. The proposed data classification is through T-distributed stochastic neighbor embedding (T-SNE) for dimensional reduction.…”
Section: ) Blind Fdi Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Esmalifalak et al [70] proposed an independent component analysis (ICA) algorithm to speculate the matrix H from power flow measurements. Higgins et al [71] proposed a data prepossessing before the ICA process. The proposed data classification is through T-distributed stochastic neighbor embedding (T-SNE) for dimensional reduction.…”
Section: ) Blind Fdi Attacksmentioning
confidence: 99%
“…When the attacker knows the historical bus power injections and relative voltage phase angles, the measurement matrix H can be estimated. In cases where attackers can not distinguish the eavesdropped measurement corresponding to the current system topology, Higgins et al [71] proposed an unsupervised learning method to cluster the data set via the density based spatial clustering of application with noise (DBSCAN) algorithm.…”
Section: ) Blind Fdi Attacksmentioning
confidence: 99%
“…MTD can also be enhanced to camouflage its existence to minimise the potential for attackers circumventing MTD [22,23]. However, as shown in [24], the cost of application will mean the system operator will want to minimise the overall use of MTD to only those times when the system is potentially under attack.…”
Section: Moving Target Defencementioning
confidence: 99%
“…Moreover, Higgins et.al. [22] suggests to perturb the reactance through Gaussian watermarking to prevent the attacker from inferring the new system parameters.…”
Section: A Related Workmentioning
confidence: 99%
“…Hidden MTD is recently proposed by [19]- [22] to design MTD that cannot be detected by the attacker. After triggering MTD, the new measurement z N is no longer in H N .…”
Section: Hiddenness Of Mtdmentioning
confidence: 99%