Skip to main content

Detecting Replay Attacks in Power Systems: A Data-Driven Approach

  • Conference paper
  • First Online:
Advanced Computational Methods in Energy, Power, Electric Vehicles, and Their Integration (ICSEE 2017, LSMS 2017)

Abstract

Detecting replay attacks in power systems is quite challenging, since the attackers can mimic normal power states and do not make direct damages to the system. Existing works are mostly model-based, which may either suffer from a low detection performance or induce negative side effects to power control. In this paper, we explore purely data-driven approach for good detection performance without side effects. Our basic idea is to learn a classifier using a set of labelled data (i.e., power state) samples to detect the replayed states from normal ones. We choose the Support Vector Machine (SVM) as our classifier, and a self-correlation coefficient as the data feature for detection. We evaluate and confirm the effectiveness of our approach on IEEE bus systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhang, Y., Wang, L., Sun, W., Green, R.C., Alam, M.: Distributed intrusion detection system in a multi-layer network architecture of smart grids. IEEE Trans. Smart Grid 2(4), 796–808 (2011)

    Article  Google Scholar 

  2. Ericsson, G.N.: Cyber security and power system communicationessential parts of a smart grid infrastructure. IEEE Trans. Power Deliv. 25(3), 1501–1507 (2010)

    Article  Google Scholar 

  3. Zhou, P., Jiang, S., Irissappane, A., Zhang, J., Zhou, J., Teo, J.C.M.: Toward energy-efficient trust system through watchdog optimization for WSNs. IEEE Trans. Inf. Forensics Secur. 10(3), 613–625 (2015)

    Article  Google Scholar 

  4. Wei, D., Lu, Y., Jafari, M., Skare, P.M., Rohde, K.: Protecting smart grid automation systems against cyberattacks. IEEE Trans. Smart Grid 2(4), 782–795 (2011)

    Article  Google Scholar 

  5. Falliere, N., Murchu, L.O., Chien, E.: Symantec Corp. Secur. Response. W32. stuxnet dossier 5, 6 (2011). White paper

    Google Scholar 

  6. Mo, Y., Weerakkody, S., Sinopoli, B.: Physical authentication of control systems: designing watermarked control inputs to detect counterfeit sensor outputs. IEEE Control Syst. 35(1), 93–109 (2015)

    Article  MathSciNet  Google Scholar 

  7. Mo, Y., Sinopoli, B.: Secure control against replay attacks. In: 47th Annual Allerton Conference on Communication, Control, and Computing, pp. 911–918. IEEE (2009)

    Google Scholar 

  8. Hoehn, A., Zhang, P.: Detection of replay attacks in cyber-physical systems. In: American Control Conference (ACC), pp. 290–295. American Automatic Control Council (AACC) (2016)

    Google Scholar 

  9. Zimmerman, R.D., Murillo-Sánchez, C.E., Thomas, R.J.: Matpower: steady-state operations, planning, and analysis tools for power systems research and education. IEEE Trans. Power Syst. 26(1), 12–19 (2011)

    Article  Google Scholar 

  10. Gonen, T.: Electric Power Distribution Engineering. CRC Press, Boca Raton (2016)

    Google Scholar 

  11. Burges, C.J.: A tutorial on support vector machines for pattern recognition. Data Min. Knowl. Disc. 2(2), 121–167 (1998)

    Article  Google Scholar 

  12. Da Silva, A.L., Do Coutto Filho, M., De Queiroz, J.: State forecasting in electric power systems. In: IEE Proceedings C (Generation, Transmission and Distribution), Vol. 130, pp. 237–244. IET (1983)

    Google Scholar 

  13. Zhou, P., Gu, X., Zhang, J., Fei, M.: A priori trust inference with context-aware stereotypical deep learning. Knowl.-Based Syst. 88, 97–106 (2015)

    Article  Google Scholar 

  14. Laskov, P., Lippmann, R.: Machine learning in adversarial environments. Mach. Learn. 81(2), 115–119 (2010)

    Article  Google Scholar 

Download references

Acknowledgments

This work was partially supported by the National Natural Science Foundation of China (Nos. 61502293, 61633016 and 61673255), the Shanghai Young Eastern Scholar Program (No. QD2016030), the Young Teachers’ Training Program for Shanghai College & University, the Science and Technology Commission of Shanghai Municipality (Nos. 17511107002 and 15411953502) and the Shanghai Key Laboratory of Power Station Automation Technology.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Peng Zhou .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Ma, M., Zhou, P., Du, D., Peng, C., Fei, M., AlBuflasa, H.M. (2017). Detecting Replay Attacks in Power Systems: A Data-Driven Approach. In: Li, K., Xue, Y., Cui, S., Niu, Q., Yang, Z., Luk, P. (eds) Advanced Computational Methods in Energy, Power, Electric Vehicles, and Their Integration. ICSEE LSMS 2017 2017. Communications in Computer and Information Science, vol 763. Springer, Singapore. https://doi.org/10.1007/978-981-10-6364-0_45

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6364-0_45

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6363-3

  • Online ISBN: 978-981-10-6364-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics