PMU Spoof Detection via Image Classification Methodology against Repeated Value Attacks by using Deep Learning

Alvin Huseinović, Yusuf Korkmaz, Halil Bisgin, S. Mrdović, S. Uludag
{"title":"PMU Spoof Detection via Image Classification Methodology against Repeated Value Attacks by using Deep Learning","authors":"Alvin Huseinović, Yusuf Korkmaz, Halil Bisgin, S. Mrdović, S. Uludag","doi":"10.1109/ICAT54566.2022.9811128","DOIUrl":null,"url":null,"abstract":"Various devices and monitoring systems have been developed and deployed in order to monitor the power grid. Indeed, several real-world cyberattacks on power grid systems have been publicly reported. For the transmission and distribution, Phasor Measurement Units (PMUs) constitute the main sensing equipment of the overall wide area monitoring and situational awareness systems by collecting high-resolution data and sending them to Phasor Data Concentrators (PDCs). In this paper, we consider data spoofing attacks against PMU networks. The data between PMUs and PDC(s) are sent through the legacy networks, which are subject to many attack scenarios under with no, or inadequate, countermeasures in protocols, such as IEEE 37.118-2. We consider one potential attack, where an adversary may simply keep injecting a repeated measurement through a compromised PMU to disrupt the monitoring system. This attack is referred to as a Repeated Last Value (RLV) attack. We develop and evaluate countermeasures against RLV attacks using a 2D Convolutional Neural Network (CNN)-based approach, which operates in frames for each second mimicking images, in order to avoid the computational overhead of the classical sample-based classification algorithms, such as SVM. Further, we take this frame-based approach and use it with Support Vector Machine (SVM) for performance evaluation. Our preliminary results show that frame-based CNN as well as SVM provide promising results for RLV attacks while the efficacy of CNN over SVM frame becomes more pronounced as the attack intensity increases.","PeriodicalId":414786,"journal":{"name":"2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"193 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAT54566.2022.9811128","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Various devices and monitoring systems have been developed and deployed in order to monitor the power grid. Indeed, several real-world cyberattacks on power grid systems have been publicly reported. For the transmission and distribution, Phasor Measurement Units (PMUs) constitute the main sensing equipment of the overall wide area monitoring and situational awareness systems by collecting high-resolution data and sending them to Phasor Data Concentrators (PDCs). In this paper, we consider data spoofing attacks against PMU networks. The data between PMUs and PDC(s) are sent through the legacy networks, which are subject to many attack scenarios under with no, or inadequate, countermeasures in protocols, such as IEEE 37.118-2. We consider one potential attack, where an adversary may simply keep injecting a repeated measurement through a compromised PMU to disrupt the monitoring system. This attack is referred to as a Repeated Last Value (RLV) attack. We develop and evaluate countermeasures against RLV attacks using a 2D Convolutional Neural Network (CNN)-based approach, which operates in frames for each second mimicking images, in order to avoid the computational overhead of the classical sample-based classification algorithms, such as SVM. Further, we take this frame-based approach and use it with Support Vector Machine (SVM) for performance evaluation. Our preliminary results show that frame-based CNN as well as SVM provide promising results for RLV attacks while the efficacy of CNN over SVM frame becomes more pronounced as the attack intensity increases.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于图像分类方法的PMU欺骗检测,利用深度学习对抗重复价值攻击
为了监测电网,已经开发和部署了各种设备和监测系统。事实上,公开报道了几起针对电网系统的真实网络攻击。对于传输和分配,相量测量单元(pmu)通过收集高分辨率数据并将其发送到相量数据集中器(PDCs),构成了整个广域监测和态势感知系统的主要传感设备。在本文中,我们考虑针对PMU网络的数据欺骗攻击。pmu和配电柜之间的数据是通过传统的网络发送的,而传统的网络在协议(如IEEE 37.118-2)没有应对措施或应对措施不足的情况下,会受到许多攻击场景的影响。我们考虑一种潜在的攻击,攻击者可以简单地通过受损的PMU注入重复的测量来破坏监控系统。这种攻击被称为重复最后值(RLV)攻击。我们使用基于2D卷积神经网络(CNN)的方法开发和评估针对RLV攻击的对策,该方法以每秒帧的方式模拟图像,以避免经典的基于样本的分类算法(如SVM)的计算开销。此外,我们采用这种基于框架的方法,并将其与支持向量机(SVM)一起用于性能评估。我们的初步结果表明,基于帧的CNN和SVM对RLV攻击都有很好的效果,并且随着攻击强度的增加,CNN在SVM帧上的效果更加明显。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Methodology to Develop Extended Reality Applications for Exhibition Spaces in Museums Prediction of cardiovascular disease Mitigating Power Peaks in Automotive Power Networks by Exploitation of Flexible Loads Volt-Var Control for Smart Cities with Integrated Public Transportation System Graph Theory as an Engine for Real-Time Advanced Distribution Management System Enhancements
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1