TY - GEN
T1 - Topology perturbation for detecting malicious data injection
AU - Morrow, Kate L.
AU - Heine, Erich
AU - Rogers, Katherine M.
AU - Bobba, Rakesh B.
AU - Overbye, Thomas J.
PY - 2012
Y1 - 2012
N2 - Bad measurement data exists in power systems for a number of reasons. Malicious data injection attacks, which alter the values of measurements without being detected, are one potential cause of bad data and may have serious consequences. A solution for bad data detection in power systems is proposed in this work, particularly designed to detect malicious data attacks. By applying known perturbations to the system and measuring the changes elsewhere, the approach 'probes' the system for unexpected responses in terms of measurement values. Using a developed 'keyspace' approach, the perturbation used is rendered unpredictable to the attacker, making it difficult for the attacker to adapt his attacks. Thus, unexpected measurement values after a probe provide an indication of both bad and malicious data. The proposed approach is analyzed for sample systems using MATLAB.
AB - Bad measurement data exists in power systems for a number of reasons. Malicious data injection attacks, which alter the values of measurements without being detected, are one potential cause of bad data and may have serious consequences. A solution for bad data detection in power systems is proposed in this work, particularly designed to detect malicious data attacks. By applying known perturbations to the system and measuring the changes elsewhere, the approach 'probes' the system for unexpected responses in terms of measurement values. Using a developed 'keyspace' approach, the perturbation used is rendered unpredictable to the attacker, making it difficult for the attacker to adapt his attacks. Thus, unexpected measurement values after a probe provide an indication of both bad and malicious data. The proposed approach is analyzed for sample systems using MATLAB.
UR - http://www.scopus.com/inward/record.url?scp=84857951113&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84857951113&partnerID=8YFLogxK
U2 - 10.1109/HICSS.2012.594
DO - 10.1109/HICSS.2012.594
M3 - Conference contribution
AN - SCOPUS:84857951113
SN - 9780769545257
T3 - Proceedings of the Annual Hawaii International Conference on System Sciences
SP - 2104
EP - 2113
BT - Proceedings of the 45th Annual Hawaii International Conference on System Sciences, HICSS-45
PB - IEEE Computer Society
T2 - 2012 45th Hawaii International Conference on System Sciences, HICSS 2012
Y2 - 4 January 2012 through 7 January 2012
ER -