Detection of False-Reading Attacks in the AMI Net-Metering System
- URL: http://arxiv.org/abs/2012.01983v1
- Date: Wed, 2 Dec 2020 07:40:02 GMT
- Title: Detection of False-Reading Attacks in the AMI Net-Metering System
- Authors: Mahmoud M. Badr, Mohamed I. Ibrahem, Mohamed Mahmoud, Mostafa M.
Fouda, Waleed Alasmary
- Abstract summary: In smart grid, malicious customers may compromise their smart meters (SMs) to report false readings to achieve financial gains illegally.
This paper is the first work that investigates this problem in the net-metering system, in which one SM is used to report the difference between the power consumed and the power generated.
We propose a general multi-data-source deep hybrid learning-based detector to identify the false-reading attacks.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: In smart grid, malicious customers may compromise their smart meters (SMs) to
report false readings to achieve financial gains illegally. Reporting false
readings not only causes hefty financial losses to the utility but may also
degrade the grid performance because the reported readings are used for energy
management. This paper is the first work that investigates this problem in the
net-metering system, in which one SM is used to report the difference between
the power consumed and the power generated. First, we prepare a benign dataset
for the net-metering system by processing a real power consumption and
generation dataset. Then, we propose a new set of attacks tailored for the
net-metering system to create malicious dataset. After that, we analyze the
data and we found time correlations between the net meter readings and
correlations between the readings and relevant data obtained from trustworthy
sources such as the solar irradiance and temperature. Based on the data
analysis, we propose a general multi-data-source deep hybrid learning-based
detector to identify the false-reading attacks. Our detector is trained on net
meter readings of all customers besides data from the trustworthy sources to
enhance the detector performance by learning the correlations between them. The
rationale here is that although an attacker can report false readings, he
cannot manipulate the solar irradiance and temperature values because they are
beyond his control. Extensive experiments have been conducted, and the results
indicate that our detector can identify the false-reading attacks with high
detection rate and low false alarm.
Related papers
- False Data Injection Attack Detection in Edge-based Smart Metering Networks with Federated Learning [1.2026018242953707]
This paper proposes a new privacy-preserved false data injection (FDI) attack detection by developing an efficient federated learning framework.
Distributed edge servers located at the network edge run an ML-based FDI attack detection model and share the trained model with the grid operator.
arXiv Detail & Related papers (2024-11-02T17:23:08Z) - Advancing Anomaly Detection: Non-Semantic Financial Data Encoding with LLMs [49.57641083688934]
We introduce a novel approach to anomaly detection in financial data using Large Language Models (LLMs) embeddings.
Our experiments demonstrate that LLMs contribute valuable information to anomaly detection as our models outperform the baselines.
arXiv Detail & Related papers (2024-06-05T20:19:09Z) - An Unsupervised Adversarial Autoencoder for Cyber Attack Detection in Power Distribution Grids [0.0]
This paper proposes an unsupervised adversarial autoencoder (AAE) model to detect false data injection attacks (FDIAs) in unbalanced power distribution grids.
The proposed method utilizes long short-term memory (LSTM) in the structure of the autoencoder to capture the temporal dependencies in the time-series measurements.
It is tested on IEEE 13-bus and 123-bus systems with historical meteorological data and historical real-world load data.
arXiv Detail & Related papers (2024-03-31T01:20:01Z) - A Little Leak Will Sink a Great Ship: Survey of Transparency for Large Language Models from Start to Finish [47.3916421056009]
Large Language Models (LLMs) are trained on massive web-crawled corpora.
LLMs produce leaked information in most cases despite less such data in their training set.
Self-detection method showed superior performance compared to existing detection methods.
arXiv Detail & Related papers (2024-03-24T13:21:58Z) - Federated Learning Based Distributed Localization of False Data
Injection Attacks on Smart Grids [5.705281336771011]
False data injection attack (FDIA) is one of the classes of attacks that target the smart measurement devices by injecting malicious data.
We propose a federated learning-based scheme combined with a hybrid deep neural network architecture.
We validate the proposed architecture by extensive simulations on the IEEE 57, 118, and 300 bus systems and real electricity load data.
arXiv Detail & Related papers (2023-06-17T20:29:55Z) - Can AI-Generated Text be Reliably Detected? [54.670136179857344]
Unregulated use of LLMs can potentially lead to malicious consequences such as plagiarism, generating fake news, spamming, etc.
Recent works attempt to tackle this problem either using certain model signatures present in the generated text outputs or by applying watermarking techniques.
In this paper, we show that these detectors are not reliable in practical scenarios.
arXiv Detail & Related papers (2023-03-17T17:53:19Z) - A Robust and Explainable Data-Driven Anomaly Detection Approach For
Power Electronics [56.86150790999639]
We present two anomaly detection and classification approaches, namely the Matrix Profile algorithm and anomaly transformer.
The Matrix Profile algorithm is shown to be well suited as a generalizable approach for detecting real-time anomalies in streaming time-series data.
A series of custom filters is created and added to the detector to tune its sensitivity, recall, and detection accuracy.
arXiv Detail & Related papers (2022-09-23T06:09:35Z) - Ranking-Based Physics-Informed Line Failure Detection in Power Grids [66.0797334582536]
Real-time and accurate detecting of potential line failures is the first step to mitigating the extreme weather impact and activating emergency controls.
Power balance equations nonlinearity, increased uncertainty in generation during extreme events, and lack of grid observability compromise the efficiency of traditional data-driven failure detection methods.
This paper proposes a Physics-InformEd Line failure Detector (FIELD) that leverages grid topology information to reduce sample and time complexities and improve localization accuracy.
arXiv Detail & Related papers (2022-08-31T18:19:25Z) - D-BIAS: A Causality-Based Human-in-the-Loop System for Tackling
Algorithmic Bias [57.87117733071416]
We propose D-BIAS, a visual interactive tool that embodies human-in-the-loop AI approach for auditing and mitigating social biases.
A user can detect the presence of bias against a group by identifying unfair causal relationships in the causal network.
For each interaction, say weakening/deleting a biased causal edge, the system uses a novel method to simulate a new (debiased) dataset.
arXiv Detail & Related papers (2022-08-10T03:41:48Z) - Graph Neural Networks Based Detection of Stealth False Data Injection
Attacks in Smart Grids [6.188609547699017]
False data injection attacks (FDIAs) aim to break the integrity of measurements by injecting false data into the smart metering devices in power grids.
We present a generic, localized, and stealth (unobservable) attack generation methodology and publicly accessible datasets for researchers to develop and test their algorithms.
We propose a Graph Neural Network (GNN) based, scalable and real-time detector of FDIAs that efficiently combines model-driven and data-driven approaches.
arXiv Detail & Related papers (2021-04-05T17:02:48Z) - SearchFromFree: Adversarial Measurements for Machine Learning-based
Energy Theft Detection [1.5791732557395552]
Energy theft causes large economic losses to utility companies around the world.
In this work, we demonstrate that the well-perform ML models for energy theft detection are highly vulnerable to adversarial attacks.
arXiv Detail & Related papers (2020-06-02T19:25:38Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.