Topology perturbation for detecting malicious data injection

Kate L. Morrow, Erich Heine, Katherine M. Rogers, Rakesh B. Bobba, Thomas J. Overbye

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Bad measurement data exists in power systems for a number of reasons. Malicious data injection attacks, which alter the values of measurements without being detected, are one potential cause of bad data and may have serious consequences. A solution for bad data detection in power systems is proposed in this work, particularly designed to detect malicious data attacks. By applying known perturbations to the system and measuring the changes elsewhere, the approach 'probes' the system for unexpected responses in terms of measurement values. Using a developed 'keyspace' approach, the perturbation used is rendered unpredictable to the attacker, making it difficult for the attacker to adapt his attacks. Thus, unexpected measurement values after a probe provide an indication of both bad and malicious data. The proposed approach is analyzed for sample systems using MATLAB.

Original languageEnglish (US)
Title of host publicationProceedings of the 45th Annual Hawaii International Conference on System Sciences, HICSS-45
PublisherIEEE Computer Society
Pages2104-2113
Number of pages10
ISBN (Print)9780769545257
DOIs
StatePublished - Jan 1 2012
Event2012 45th Hawaii International Conference on System Sciences, HICSS 2012 - Maui, HI, United States
Duration: Jan 4 2012Jan 7 2012

Publication series

NameProceedings of the Annual Hawaii International Conference on System Sciences
ISSN (Print)1530-1605

Other

Other2012 45th Hawaii International Conference on System Sciences, HICSS 2012
CountryUnited States
CityMaui, HI
Period1/4/121/7/12

ASJC Scopus subject areas

  • Engineering(all)

Fingerprint Dive into the research topics of 'Topology perturbation for detecting malicious data injection'. Together they form a unique fingerprint.

  • Cite this

    Morrow, K. L., Heine, E., Rogers, K. M., Bobba, R. B., & Overbye, T. J. (2012). Topology perturbation for detecting malicious data injection. In Proceedings of the 45th Annual Hawaii International Conference on System Sciences, HICSS-45 (pp. 2104-2113). [6149267] (Proceedings of the Annual Hawaii International Conference on System Sciences). IEEE Computer Society. https://doi.org/10.1109/HICSS.2012.594