Skip to main content

Customized Attack Detection Under Power Industrial Control System

  • Conference paper
  • First Online:
Smart Grid and Internet of Things (SGIoT 2019)

Abstract

With the rapid development of information technology, the power system already has the typical characteristics of the information physical fusion system. The power industrial control system is widely used in the power industry. While improving the efficiency, the economic benefits have also been greatly improved. However, the dependence on information technology has also increased the vulnerability to malicious attacks. Power industry control system is facing a more serious threat. In this paper, we combine anomaly detection and data dimensionality reduction to propose a feature extraction method for iForest power measurement data, which not only ensures the targeting of attack detection in the data processing stage, but also takes into account the data quality of feature extraction. In addition, we use deep learning techniques to identify attack behavior characteristics and use captured features to detect attack behavior in real time. We prove the availability of the method through simulation of the IEEE 118-bus power systems.

Supported by organization State Grid XinJiang Electric Power Co. Ltd., Electric Power Research Institute.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wang, K., Xu, C., Guo, S.: Big data analytics for price forecasting in smart grids. In: IEEE GLOBECOM 2016, Washington, USA, December 2016

    Google Scholar 

  2. Wang, X.Z., Ge, Z.Q., Ge, M.H., Wang, L., Li, L.: The research on electric power control center credit monitoring and management using cloud computing and smart workflow. In: 2018 China International Conference on Electricity Distribution (CICED), Tianjin, China, September 2018

    Google Scholar 

  3. Wang, Y., Wang, K., Huang, H., Miyazaki, T., Guo, S.: Traffic and computation co-offloading with reinforcement learning in fog computing for industrial applications. IEEE Trans. Industr. Inf. 15(2), 976–986 (2019)

    Google Scholar 

  4. He, H., Liu, J.D., Jin, Y.K., Li, Z. Zhang, Z.R., et al.: Research on power quality control method of active distribution network with microgrids. In: 2018 3rd International Conference on Smart City and Systems Engineering (ICSCSE), Xiamen, China, December 2018

    Google Scholar 

  5. Wang, K., Ouyang, Z., Krishnan, R., Shu, L., He, L.: A game theory based energy management system using price elasticity for smart grids. IEEE Trans. Industr. Inf. 11(6), 1607–1616 (2015)

    Google Scholar 

  6. Zhang, J., Chen, R., Xiao, L.S., Guo, X.C., Liu, B.: Optimal control for AC and DC power quality of VSC-HVDC. In: 2017 International Conference on Computer Systems, Electronics and Control (ICCSEC), Dalian, China, December 2017

    Google Scholar 

  7. Dong, X.M., Sun, H., Wang, C.F., Yun, Z.H., Wang, Y.M., et al.: Power flow analysis considering automatic generation control for multi-area interconnection power networks. IEEE Trans. Ind. Appl. 53(6), 5200–5208 (2017)

    Google Scholar 

  8. Yu, J., Wang, K., Zeng, D., Zhu, C., Guo, S.: Privacy-preserving data aggregation computing in cyber-physical social systems. ACM Trans. Cyber Phys. Syst. 3(1), 1–23 (2018). Article 8

    Google Scholar 

  9. Wang, Y., et al.: Coordinated recovery strategy of AC and UHVDC interconnected system considering the power grid strength. In: 2017 IEEE Conference on Energy Internet and Energy System Integration, Beijing, China, November 2017

    Google Scholar 

  10. Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. 14(1), 1–33 (2011)

    Google Scholar 

  11. Li, S., Yang, Y.M., Wang, X.: Quickest detection of false data injection attack in wide-area smart grids. IEEE Trans. Smart Grid 6(6), 2725–2735 (2017)

    Google Scholar 

  12. Wang, K., Du, M., Yang, D., Zhu, C., Shen, J., Zhang, Y.: Game theory-based active defense for intrusion detection in cyber-physical embedded systems. ACM Trans. Embed. Comput. Syst. 16(1), 1–21 (2016). Article 18

    Google Scholar 

  13. Liu, X., Li, Z.: Local load redistribution attacks in power systems with incomplete network information. IEEE Trans. Smart Grid 5(4), 1665–1676 (2014)

    Google Scholar 

  14. Yang, L., Ding, C., Wu, M., Wang, K.: Robust detection of false data injection attacks for the data aggregation in Internet of things based environmental surveillance. Comput. Netw. 129(2), 410–428 (2017)

    Google Scholar 

  15. Liu, X., Bao, Z., Lu, D.: Modeling of local false data injection attacks with reduced network information. IEEE Trans. Smart Grid 6(4), 1686–1696 (2017)

    Google Scholar 

  16. Wang, K., et al.: Wireless big data computing in smart grid. IEEE Wirel. Commun. 24(2), 58–64 (2017)

    Google Scholar 

  17. Hug, G., Giampapa, J.A.: Vulnerability assessment of AC state estimation with respect to false data injection cyber-attacks. IEEE Trans. Smart Grid 3(3), 1362–1370 (2012)

    Google Scholar 

  18. He, Y.B., Mendis, G.J., Jin, W.: Real-time detection of false data injection attacks in smart grid: a deep learning-based intelligent mechanism. IEEE Trans. Smart Grid 8(5), 2505–2516 (2017)

    Google Scholar 

  19. Wang, K., Du, M., Maharjan, S., Sun, Y.: Strategic honeypot game model for distributed denial of service attacks in the smart grid. IEEE Trans. Smart Grid 8(5), 2474–2482 (2017)

    Google Scholar 

  20. Ashrafuzzaman, M., Chakhchoukh, Y., Jillepalli, A.A., Tosic, P.T., et al.: Detecting stealthy false data injection attacks in power grids using deep learning. In: 2018 14th International Wireless Communications Mobile Computing Conference, Limassol, Cyprus, June 2018

    Google Scholar 

  21. Wei, L., Gao, D.H., Cheng, L.: False data injection attacks detection with deep belief networks in smart grid. In: 2018 Chinese Automation Congress (CAC), Xian, China, December 2018

    Google Scholar 

  22. Niu, X.Y., Li, J.N., Sun, J.Y., Tomsovic, K.: Dynamic detection of false data injection attack in smart grid using deep learning. In: 2019 IEEE Power Energy Society Innovative Smart Grid Technologies Conference (ISGT), Washington, DC, USA, February 2019

    Google Scholar 

  23. Wang, K., Du, M., Sun, Y., Vinel, A., Zhang, Y.: Attack detection and distributed forensics in machine-to-machine networks. IEEE Netw. 30(6), 49–55 (2016)

    Google Scholar 

  24. Ding, Y.M., Li, K., Meng, Z.X.: CPS optimal control for interconnected power grid based on model predictive control. In: 2018 2nd IEEE Conference on Energy Internet and Energy System Integration (EI2), Beijing, China, October 2018

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jie Fan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, B., He, L., Yang, H., Li, F., Fan, J. (2020). Customized Attack Detection Under Power Industrial Control System. In: Deng, DJ., Pang, AC., Lin, CC. (eds) Smart Grid and Internet of Things. SGIoT 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 324. Springer, Cham. https://doi.org/10.1007/978-3-030-49610-4_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-49610-4_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-49609-8

  • Online ISBN: 978-3-030-49610-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics