skip to main content
10.1145/3638584.3638652acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsaiConference Proceedingsconference-collections
research-article

False Data Injection Attacks Intrusion Simulation Applying Semi-Supervised for Power System Based on Knowledge Graph

Published: 14 March 2024 Publication History

Abstract

With the increased risk of power systems facing external attacks, the all-round simulation of conventional attack patterns has become an important demand for current power system security protection against conventional cyber attacks. This paper proposes a false data injection attack (FDIA) simulation method for power systems, which is safer, faster, more comprehensive and more accurate than the traditional FDIA monitoring and defense methods. The proposed method requires firstly to simulate the key parameters of the actual power system equipment, the actual operation process, the equipment interactions, the simulation and the actual equipment operation status to maintain consistency. Then, the simulated system is subjected to the "black-box attack" and "white-box attack" defined in this paper. After that, we obtain the key equipment parameters, state changes, and system alarms of the system after the attack. Finally, two semi-supervised learning algorithms XGboost and support vector machine(SVM) are required to improve the accuracy of this attack method. The advantage of the proposed method in this paper is that the attack can be identified by tracing the root cause in reverse, and furthermore, mutual verification can be done by the original initiated attack, and finally, the all-round analysis of the attack and the impact of the intrusion can be accomplished from the attacker’s point of view by using the knowledge graph visualization.

References

[1]
[1] A. Parizad and C. Hatziadoniu, "A Laboratory Set-Up for Cyber Attacks Simulation Using Protocol Analyzer and RTU Hardware Applying Semi-Supervised Detection Algorithm," 2021 IEEE Texas Power and Energy Conference (TPEC), College Station, TX, USA, 2021, pp. 1-6.
[2]
[2] R. Sharma, A. M. Joshi, C. Sahu, G. Sharma, K. T. Akindeji and S. Sharma, "Semi Supervised Cyber Attack Detection System For Smart Grid," 2022 30th Southern African Universities Power Engineering Conference (SAUPEC), Durban, South Africa, 2022, pp. 1-5.
[3]
[3] Debottam Mukherjee, Samrat Chakraborty, Almoataz Y. Abdelaziz, Adel El-Shahat, Deep learning-based identification of false data injection attacks on modern smart grids, Energy Reports, Volume 8, Supplement 15, 2022, pp. 919-930.
[4]
[4] R. Xu, R. Wang, Z. Guan, L. Wu, J. Wu and X. Du, "Achieving Efficient Detection Against False Data Injection Attacks in Smart Grid," in IEEE Access, vol. 5, pp. 13787-13798, 2017.
[5]
[5] J. Zhao, G. Zhang, M. La Scala, Z. Y. Dong, C. Chen and J. Wang, "Short-Term State Forecasting-Aided Method for Detection of Smart Grid General False Data Injection Attacks," in IEEE Transactions on Smart Grid, vol. 8, no. 4, pp. 1580-1590, July 2017.
[6]
[6] H. T. Reda, A. Anwar, A. Mahmood and N. Chilamkurti, "Data-driven Approach for State Prediction and Detection of False Data Injection Attacks in Smart Grid," in Journal of Modern Power Systems and Clean Energy, vol. 11, no. 2, pp. 455-467, March 2023.
[7]
[7] Lee, Dong-Hyun, et al. Pseudo-label: The simple and efficient semi-supervised learning method for deep neural networks. In: Workshop on challenges in representation learning, ICML. 2013. p. 896.
[8]
[8] Wang, Z., Yang, L., Yin, F., Lin, K., Shi, Q., & Luo, Z. Q. (2020). Optimally combining classifiers for semi-supervised learning. arXiv preprint arXiv:2006.04097, 2020.
[9]
[9] Mohammad Amin Morid, Michael Lau, Guilherme Del Fiol, Predictive analytics for step-up therapy: Supervised or semi-supervised learning?. Journal of Biomedical Informatics, Volume 119, 2021.
[10]
[10] Aleum Kim, Sung-Bae Cho, An ensemble semi-supervised learning method for predicting defaults in social lending. Engineering Applications of Artificial Intelligence, Volume 81, 2019, pp. 193-199.
[11]
[11] Ons Aouedi, Kandaraj Piamrat, Dhruvjyoti Bagadthey, Handling partially labeled network data: A semi-supervised approach using stacked sparse autoencoder, Computer Networks, Volume 207, 2022.
[12]
[12] E. Drayer and T. Routtenberg, "Detection of False Data Injection Attacks in Power Systems with Graph Fourier Transform," 2018 IEEE Global Conference on Signal and Information Processing (GlobalSIP), Anaheim, CA, USA, 2018, pp. 890-894.
[13]
[13] R. Ramakrishna and A. Scaglione, "Detection of False Data Injection Attack Using Graph Signal Processing for the Power Grid," 2019 IEEE Global Conference on Signal and Information Processing (GlobalSIP), Ottawa, ON, Canada, 2019, pp. 1-5.
[14]
[14] Li, Z., Zeng, J., Chen, Y., & Liang, Z. AttacKG: Constructing technique knowledge graph from cyber threat intelligence reports. In: European Symposium on Research in Computer Security. Cham: Springer International Publishing, 2022. p. 589-609.
[15]
[15] Pingle, A., Piplai, A., Mittal, S., Joshi, A., Holt, J., & Zak, R. (2019, August). Relext: Relation extraction using deep learning approaches for cybersecurity knowledge graph improvement. In: Proceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. 2019. p. 879-886.

Index Terms

  1. False Data Injection Attacks Intrusion Simulation Applying Semi-Supervised for Power System Based on Knowledge Graph

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      CSAI '23: Proceedings of the 2023 7th International Conference on Computer Science and Artificial Intelligence
      December 2023
      563 pages
      ISBN:9798400708688
      DOI:10.1145/3638584
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 14 March 2024

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. False Data Injection Attack (FDIA)
      2. Knowledge Graph.
      3. Semi-Supervised Learning

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      CSAI 2023

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 32
        Total Downloads
      • Downloads (Last 12 months)32
      • Downloads (Last 6 weeks)5
      Reflects downloads up to 07 Mar 2025

      Other Metrics

      Citations

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format.

      HTML Format

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media