Can attackers with limited information exploit historical data to mount successful false data injection attacks on power systems?

Jiazi Zhang, Zhigang Chu, Lalitha Sankar, Oliver Kosut

Research output: Contribution to journalArticlepeer-review

42 Scopus citations

Abstract

This paper studies physical consequences of unobservable false data injection (FDI) attacks designed only with information inside a subnetwork of the power system. The goal of this attack is to overload a chosen target line without being detected via measurements. To overcome the limited information, a multiple linear regression model is developed to learn the relationship between the external network and the attack subnetwork from historical data. The worst possible consequences of such FDI attacks are evaluated by solving a bi-level optimization problem wherein the first level models the limited attack resources, while the second level formulates the system response to such attacks via dc optimal power flow (OPF). The attack model with limited information is reflected in the dc OPF formulation that only takes into account the system information for the attack subnetwork. The vulnerability of this attack model is illustrated on the IEEE 24-bus reliability test system and the IEEE 118-bus systems.

Original languageEnglish (US)
Article number8323244
Pages (from-to)4775-4786
Number of pages12
JournalIEEE Transactions on Power Systems
Volume33
Issue number5
DOIs
StatePublished - Sep 2018

Keywords

  • Cyber-physical system
  • bi-level optimization
  • cyber-security
  • false data injection attacks
  • multiple linear regression
  • state estimation

ASJC Scopus subject areas

  • Energy Engineering and Power Technology
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Can attackers with limited information exploit historical data to mount successful false data injection attacks on power systems?'. Together they form a unique fingerprint.

Cite this