Matrix-Completion-Based False Data Injection Attacks Against Machine Learning Detectors

IEEE TRANSACTIONS ON SMART GRID(2024)

引用 0|浏览1
暂无评分
摘要
False data injection (FDI) attacks can manipulate power system measurements, leading to system economic losses and security issues. Although machine-learning (ML) detectors can effectively detect FDI attacks, the current methods used to construct FDI attacks do not take into account the presence of ML detectors. To tackle this problem, we propose novel convex matrix-completion-based FDI (MC-FDI) attacks on DC and AC power flow models from an attacker's perspective, accounting for the temporal correlation between compromised and historical measurements. The proposed attacks minimize the nuclear norm of the compromised measurement matrix to make the compromised measurement consistent with the historical measurements, and also maximize the L1-norm of the incremental voltage angle to ensure a sufficient negative impact on the power system operation. Moving target defense (MTD) is proposed to detect the proposed MC-FDI attacks from the defender's standpoint. The idea is to actively change the line impedance to corrupt the spatial and temporal correlation of the compromised measurements in the MC-FDI attacks. Numerical results on the IEEE 14-bus and IEEE 118-bus systems show the stealthiness of the proposed attacks to both the Chi-square detector and ML detectors as well as the efficacy of MTD in detecting the MC-FDI attacks.
更多
查看译文
关键词
Detectors,Voltage measurement,Correlation,Power systems,Machine learning,State estimation,Power measurement,False data injection,matrix completion,machine learning detector,moving target defense,state estimation
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要