Cyber–physical risk assessment for false data injection attacks considering moving target defences
نویسندگان
چکیده
Abstract In this paper, we examine the factors that influence success of false data injection (FDI) attacks in context both cyber and physical styles reinforcement. Existing research considers FDI attack ability to change a measurement static system only. However, successful will require first intrusion into followed by construction an vector can bypass bad detection cause consequence (such as overloading). Furthermore, recent development moving target defences (MTD) introduces dynamically changing topology, which is beyond capability existing assess. way, develop full service framework for risk assessment. The costs via weighted graph assessment combination with physical, line overload-based vulnerability under existence MTD. We present our simulations on IEEE 14-bus overlain RTU network model true intrusion. multiple methods entry including meter intrusion, combined style attacks. Post-intrusion, reinforcement analyses required level topology divergence protect against branch overload from optimised vector. index used represent FDIA.
منابع مشابه
False Data Injection Attacks in Control Systems
This paper analyzes the effects of false data injection attacks on Control System. We assume that the system, equipped with a Kalman filter and LQG controller, is used to monitor and control a discrete linear time invariant Gaussian system. We further assume that the system is equipped with a failure detector. An attacker wishes to destabilize the system by compromising a subset of sensors and ...
متن کاملResilient Configuration of Distribution System versus False Data Injection Attacks Against State Estimation
State estimation is used in power systems to estimate grid variables based on meter measurements. Unfortunately, power grids are vulnerable to cyber-attacks. Reducing cyber-attacks against state estimation is necessary to ensure power system safe and reliable operation. False data injection (FDI) is a type of cyber-attack that tampers with measurements. This paper proposes network reconfigurati...
متن کاملDefending collaborative false data injection attacks in wireless sensor networks
False data filtering is an important issue in wireless sensor networks. In this paper, we consider a new type of false data injection attacks called collaborative false data injection, and propose two schemes to defend such attacks. In collaborative false data injection attacks, multiple compromised nodes collaboratively forge a fake report and inject the report into the network. This type of a...
متن کاملFalse Data Injection Attacks in Smart Grid: Challenges and Solutions
Smart Grid, as an energy-based Cyber-Physical Sys tem (CPS), is a new type of power grid that will provide reliable, secure, and efficient energy transmission and distribution. As the quality of assurance of monitoring data is essential to smart grid, in this talk we will first present two dangerous false data injection attacks, which target the state estimation and energy distribution in smar...
متن کاملDetecting False Data Injection Attacks on DC State Estimation
State estimation is an important power system application that is used to estimate the state of the power transmission networks using (usually) a redundant set of sensor measurements and network topology information. Many power system applications such as contingency analysis rely on the output of the state estimator. Until recently it was assumed that the techniques used to detect and identify...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Information Security
سال: 2022
ISSN: ['1615-5262', '1615-5270']
DOI: https://doi.org/10.1007/s10207-022-00621-7