Joint Detection and Localization of Stealth False Data Injection Attacks
in Smart Grids using Graph Neural Networks
- URL: http://arxiv.org/abs/2104.11846v1
- Date: Sat, 24 Apr 2021 00:33:45 GMT
- Title: Joint Detection and Localization of Stealth False Data Injection Attacks
in Smart Grids using Graph Neural Networks
- Authors: Osman Boyaci, Mohammad Rasoul Narimani, Katherine Davis, Muhammad
Ismail, Thomas J Overbye, and Erchin Serpedin
- Abstract summary: False data injection attacks (FDIA) are more frequently encountered in power systems.
This paper proposes an approach based on the graph neural network (GNN) to identify the presence and location of the FDIA.
To the best of our knowledge, this is the first work based on GNN that automatically detects and localizes FDIA in power systems.
- Score: 7.718169412279379
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: False data injection attacks (FDIA) are becoming an active avenue of research
as such attacks are more frequently encountered in power systems. Contrary to
the detection of these attacks, less attention has been paid to identifying the
attacked units of the grid. To this end, this work jointly studies detecting
and localizing the stealth FDIA in modern power grids. Exploiting the inherent
graph topology of power systems as well as the spatial correlations of smart
meters' data, this paper proposes an approach based on the graph neural network
(GNN) to identify the presence and location of the FDIA. The proposed approach
leverages the auto-regressive moving average (ARMA) type graph convolutional
filters which offer better noise robustness and frequency response flexibility
compared to the polynomial type graph convolutional filters such as Chebyshev.
To the best of our knowledge, this is the first work based on GNN that
automatically detects and localizes FDIA in power systems. Extensive
simulations and visualizations show that the proposed approach outperforms the
available methods in both detection and localization FDIA for different IEEE
test systems. Thus, the targeted areas in power grids can be identified and
preventive actions can be taken before the attack impacts the grid.
Related papers
- Detection of False Data Injection Attacks (FDIA) on Power Dynamical Systems With a State Prediction Method [8.942515834006857]
False data injection attacks (FDIA) are a growing cyber-security concern.
They have the potential to disrupt the system's stability like frequency stability, leading to catastrophic failures.
An FDIA detection method would be valuable to protect power systems.
A suitable detection method can leverage power dynamics predictions to identify whether such a discrepancy was induced by an FDIA.
arXiv Detail & Related papers (2024-09-06T20:47:21Z) - Detecting Masquerade Attacks in Controller Area Networks Using Graph Machine Learning [0.2812395851874055]
This paper introduces a novel framework for detecting masquerade attacks in the CAN bus using graph machine learning (ML)
We show that by representing CAN bus frames as message sequence graphs (MSGs) and enriching each node with contextual statistical attributes from time series, we can enhance detection capabilities.
Our method ensures a comprehensive and dynamic analysis of CAN frame interactions, improving robustness and efficiency.
arXiv Detail & Related papers (2024-08-10T04:17:58Z) - BOURNE: Bootstrapped Self-supervised Learning Framework for Unified
Graph Anomaly Detection [50.26074811655596]
We propose a novel unified graph anomaly detection framework based on bootstrapped self-supervised learning (named BOURNE)
By swapping the context embeddings between nodes and edges, we enable the mutual detection of node and edge anomalies.
BOURNE can eliminate the need for negative sampling, thereby enhancing its efficiency in handling large graphs.
arXiv Detail & Related papers (2023-07-28T00:44:57Z) - Federated Learning Based Distributed Localization of False Data
Injection Attacks on Smart Grids [5.705281336771011]
False data injection attack (FDIA) is one of the classes of attacks that target the smart measurement devices by injecting malicious data.
We propose a federated learning-based scheme combined with a hybrid deep neural network architecture.
We validate the proposed architecture by extensive simulations on the IEEE 57, 118, and 300 bus systems and real electricity load data.
arXiv Detail & Related papers (2023-06-17T20:29:55Z) - Energy-based Out-of-Distribution Detection for Graph Neural Networks [76.0242218180483]
We propose a simple, powerful and efficient OOD detection model for GNN-based learning on graphs, which we call GNNSafe.
GNNSafe achieves up to $17.0%$ AUROC improvement over state-of-the-arts and it could serve as simple yet strong baselines in such an under-developed area.
arXiv Detail & Related papers (2023-02-06T16:38:43Z) - A Temporal Graph Neural Network for Cyber Attack Detection and
Localization in Smart Grids [0.3093890460224435]
This paper presents a Temporal Graph Neural Network (TGNN) framework for detection and localization of false data injection and ramp attacks on the system state in smart grids.
The sensitivity of the model to intensity and location of the attacks and model's detection delay versus detection accuracy have been evaluated.
arXiv Detail & Related papers (2022-12-07T00:56:02Z) - Model Inversion Attacks against Graph Neural Networks [65.35955643325038]
We study model inversion attacks against Graph Neural Networks (GNNs)
In this paper, we present GraphMI to infer the private training graph data.
Our experimental results show that such defenses are not sufficiently effective and call for more advanced defenses against privacy attacks.
arXiv Detail & Related papers (2022-09-16T09:13:43Z) - DAAIN: Detection of Anomalous and Adversarial Input using Normalizing
Flows [52.31831255787147]
We introduce a novel technique, DAAIN, to detect out-of-distribution (OOD) inputs and adversarial attacks (AA)
Our approach monitors the inner workings of a neural network and learns a density estimator of the activation distribution.
Our model can be trained on a single GPU making it compute efficient and deployable without requiring specialized accelerators.
arXiv Detail & Related papers (2021-05-30T22:07:13Z) - Graph Neural Networks Based Detection of Stealth False Data Injection
Attacks in Smart Grids [6.188609547699017]
False data injection attacks (FDIAs) aim to break the integrity of measurements by injecting false data into the smart metering devices in power grids.
We present a generic, localized, and stealth (unobservable) attack generation methodology and publicly accessible datasets for researchers to develop and test their algorithms.
We propose a Graph Neural Network (GNN) based, scalable and real-time detector of FDIAs that efficiently combines model-driven and data-driven approaches.
arXiv Detail & Related papers (2021-04-05T17:02:48Z) - Graph Backdoor [53.70971502299977]
We present GTA, the first backdoor attack on graph neural networks (GNNs)
GTA departs in significant ways: it defines triggers as specific subgraphs, including both topological structures and descriptive features.
It can be instantiated for both transductive (e.g., node classification) and inductive (e.g., graph classification) tasks.
arXiv Detail & Related papers (2020-06-21T19:45:30Z) - Structural Temporal Graph Neural Networks for Anomaly Detection in
Dynamic Graphs [54.13919050090926]
We propose an end-to-end structural temporal Graph Neural Network model for detecting anomalous edges in dynamic graphs.
In particular, we first extract the $h$-hop enclosing subgraph centered on the target edge and propose the node labeling function to identify the role of each node in the subgraph.
Based on the extracted features, we utilize Gated recurrent units (GRUs) to capture the temporal information for anomaly detection.
arXiv Detail & Related papers (2020-05-15T09:17:08Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.