Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
110 tokens/sec
GPT-4o
56 tokens/sec
Gemini 2.5 Pro Pro
44 tokens/sec
o3 Pro
6 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

A Survey of Machine Learning Methods for Detecting False Data Injection Attacks in Power Systems (2008.06926v1)

Published 16 Aug 2020 in eess.SY, cs.CR, and cs.SY

Abstract: Over the last decade, the number of cyberattacks targeting power systems and causing physical and economic damages has increased rapidly. Among them, False Data Injection Attacks (FDIAs) is a class of cyberattacks against power grid monitoring systems. Adversaries can successfully perform FDIAs in order to manipulate the power system State Estimation (SE) by compromising sensors or modifying system data. SE is an essential process performed by the Energy Management System (EMS) towards estimating unknown state variables based on system redundant measurements and network topology. SE routines include Bad Data Detection (BDD) algorithms to eliminate errors from the acquired measurements, e.g., in case of sensor failures. FDIAs can bypass BDD modules to inject malicious data vectors into a subset of measurements without being detected, and thus manipulate the results of the SE process. In order to overcome the limitations of traditional residual-based BDD approaches, data-driven solutions based on machine learning algorithms have been widely adopted for detecting malicious manipulation of sensor data due to their fast execution times and accurate results. This paper provides a comprehensive review of the most up-to-date machine learning methods for detecting FDIAs against power system SE algorithms.

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (7)
  1. Ali Sayghe (1 paper)
  2. Yaodan Hu (2 papers)
  3. Ioannis Zografopoulos (16 papers)
  4. Raj Gautam Dutta (2 papers)
  5. Yier Jin (21 papers)
  6. Charalambos Konstantinou (63 papers)
  7. Xiaorui Liu (50 papers)
Citations (100)

Summary

We haven't generated a summary for this paper yet.