False Data Injection Threats in Active Distribution Systems: A
Comprehensive Survey
- URL: http://arxiv.org/abs/2111.14251v1
- Date: Sun, 28 Nov 2021 22:25:15 GMT
- Title: False Data Injection Threats in Active Distribution Systems: A
Comprehensive Survey
- Authors: Muhammad Akbar Husnoo, Adnan Anwar, Nasser Hosseinzadeh, Shama Naz
Islam, Abdun Naser Mahmood, Robin Doss
- Abstract summary: The integration of several cutting-edge technologies has introduced several security and privacy vulnerabilities.
Recent research trends have shown that False Data Injection (FDI) attacks are becoming one of the most malicious cyber threats within the entire smart grid paradigm.
- Score: 1.9084046244608193
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: With the proliferation of smart devices and revolutions in communications,
electrical distribution systems are gradually shifting from passive,
manually-operated and inflexible ones, to a massively interconnected
cyber-physical smart grid to address the energy challenges of the future.
However, the integration of several cutting-edge technologies has introduced
several security and privacy vulnerabilities due to the large-scale complexity
and resource limitations of deployments. Recent research trends have shown that
False Data Injection (FDI) attacks are becoming one of the most malicious cyber
threats within the entire smart grid paradigm. Therefore, this paper presents a
comprehensive survey of the recent advances in FDI attacks within active
distribution systems and proposes a taxonomy to classify the FDI threats with
respect to smart grid targets. The related studies are contrasted and
summarized in terms of the attack methodologies and implications on the
electrical power distribution networks. Finally, we identify some research gaps
and recommend a number of future research directions to guide and motivate
prospective researchers.
Related papers
- A Survey on the Application of Generative Adversarial Networks in Cybersecurity: Prospective, Direction and Open Research Scopes [1.3631461603291568]
Generative Adversarial Networks (GANs) have emerged as powerful solutions for addressing the constantly changing security issues.
This survey studies the significance of the deep learning model, precisely on GANs, in strengthening cybersecurity defenses.
The focus is to examine how GANs can be influential tools to strengthen cybersecurity defenses in these domains.
arXiv Detail & Related papers (2024-07-11T19:51:48Z) - FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids [53.2306792009435]
FaultGuard is the first framework for fault type and zone classification resilient to adversarial attacks.
We propose a low-complexity fault prediction model and an online adversarial training technique to enhance robustness.
Our model outclasses the state-of-the-art for resilient fault prediction benchmarking, with an accuracy of up to 0.958.
arXiv Detail & Related papers (2024-03-26T08:51:23Z) - Generative AI for Secure Physical Layer Communications: A Survey [80.0638227807621]
Generative Artificial Intelligence (GAI) stands at the forefront of AI innovation, demonstrating rapid advancement and unparalleled proficiency in generating diverse content.
In this paper, we offer an extensive survey on the various applications of GAI in enhancing security within the physical layer of communication networks.
We delve into the roles of GAI in addressing challenges of physical layer security, focusing on communication confidentiality, authentication, availability, resilience, and integrity.
arXiv Detail & Related papers (2024-02-21T06:22:41Z) - Effective Intrusion Detection in Heterogeneous Internet-of-Things Networks via Ensemble Knowledge Distillation-based Federated Learning [52.6706505729803]
We introduce Federated Learning (FL) to collaboratively train a decentralized shared model of Intrusion Detection Systems (IDS)
FLEKD enables a more flexible aggregation method than conventional model fusion techniques.
Experiment results show that the proposed approach outperforms local training and traditional FL in terms of both speed and performance.
arXiv Detail & Related papers (2024-01-22T14:16:37Z) - The Role of Deep Learning in Advancing Proactive Cybersecurity Measures
for Smart Grid Networks: A Survey [1.0589208420411014]
This study explores proactive cyber defense strategies utilizing Deep Learning (DL) in Smart Grids.
A significant focus is placed on DL-enabled proactive defenses, highlighting their roles and relevance in the proactive security of SG.
The survey lists the challenges associated with deploying DL-based security systems within SG, followed by an outlook on future developments in this key field.
arXiv Detail & Related papers (2024-01-11T13:14:40Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Downlink Power Allocation in Massive MIMO via Deep Learning: Adversarial
Attacks and Training [62.77129284830945]
This paper considers a regression problem in a wireless setting and shows that adversarial attacks can break the DL-based approach.
We also analyze the effectiveness of adversarial training as a defensive technique in adversarial settings and show that the robustness of DL-based wireless system against attacks improves significantly.
arXiv Detail & Related papers (2022-06-14T04:55:11Z) - Artificial Intelligence-Based Smart Grid Vulnerabilities and Potential
Solutions for Fake-Normal Attacks: A Short Review [0.0]
Smart grid systems are critical to the power industry, however their sophisticated architectural design and operations expose them to a number of cybersecurity threats.
Artificial Intelligence (AI)-based technologies are becoming increasingly popular for detecting cyber assaults in a variety of computer settings.
The present AI systems are being exposed and vanquished because of the recent emergence of sophisticated adversarial systems such as Generative Adversarial Networks (GAN)
arXiv Detail & Related papers (2022-02-14T21:41:36Z) - A Taxonomy of Cyber Defence Strategies Against False Data Attacks in
Smart Grid [3.88835600711547]
Modern electric power grid, known as the Smart Grid, has fast transformed the isolated and centrally controlled power system to a fast and massively connected cyber-physical system.
The synergy of a vast number of cyber-physical entities has allowed the Smart Grid to be much more effective and sustainable in meeting the growing global energy challenges.
However, it has also brought with it a large number of vulnerabilities resulting in breaches of data integrity, confidentiality and availability.
arXiv Detail & Related papers (2021-03-30T05:36:09Z) - Measurement-driven Security Analysis of Imperceptible Impersonation
Attacks [54.727945432381716]
We study the exploitability of Deep Neural Network-based Face Recognition systems.
We show that factors such as skin color, gender, and age, impact the ability to carry out an attack on a specific target victim.
We also study the feasibility of constructing universal attacks that are robust to different poses or views of the attacker's face.
arXiv Detail & Related papers (2020-08-26T19:27:27Z) - Deep Learning-Based Intrusion Detection System for Advanced Metering
Infrastructure [0.0]
The smart grid is exposed to a wide variety of threats that could be translated into cyber-attacks.
In this paper, we develop a deep learning-based intrusion detection system to defend against cyber-attacks.
arXiv Detail & Related papers (2019-12-31T21:06:20Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.