Multi-View Convolutional Neural Network for Data Spoofing Cyber-Attack Detection in Distribution Synchrophasors
Abstract
Security of Distribution Synchrophasors Data (DSD) is of paramount importance as the data is used for critical smart grid applications including situational awareness, advanced protection, and dynamic control. Unfortunately, the DSD are attractive targets for malicious attackers aiming to damage grid. Data spoofing is a new class of deceiving attack, where the DSD of one Phasor Measurement Units (PMUs) is tampered by other PMUs thereby spoiling measurement based applications. In order to address this issue, a source authentication based data spoofing attack detection method is proposed using Multi-view Convolutional Neural Network (MCNN). First, common components embedded in raw frequency measurements from DSD are removed by Savitzky-Golay (SG) filter. Second, fast S transform (FST) is utilized to extract representative spatial fingerprints via time frequency analysis. Third, the spatial fingerprint is fed to MCNN, which combines dilated and standard convolutions for automatic feather extraction and source identification. Finally, according to the output of MCNN, spoofing attack detection is performed via threshold criterion. Extensive experiments with actual DSD from multiple locations in FNET/Grideye are conducted to verify the effectiveness of the proposed method.
- Authors:
-
- Hunan Univ., Changsha (China)
- Univ. of Tennessee, Knoxville, TN (United States)
- Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)
- Publication Date:
- Research Org.:
- Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)
- Sponsoring Org.:
- USDOE; National Science Foundation (NSF)
- OSTI Identifier:
- 1648880
- Grant/Contract Number:
- AC05-00OR22725; EEC-1041877
- Resource Type:
- Accepted Manuscript
- Journal Name:
- IEEE Transactions on Smart Grid
- Additional Journal Information:
- Journal Volume: 11; Journal Issue: 4; Journal ID: ISSN 1949-3053
- Publisher:
- IEEE
- Country of Publication:
- United States
- Language:
- English
- Subject:
- 97 MATHEMATICS AND COMPUTING; data spoofing attack; distribution synchrophasors data; multi-view convolutional neural network; source authentication
Citation Formats
Qiu, Wei, Tang, Qiu, Wang, Yajun, Zhan, Lingwei, Liu, Yilu, and Yao, Wenxuan. Multi-View Convolutional Neural Network for Data Spoofing Cyber-Attack Detection in Distribution Synchrophasors. United States: N. p., 2020.
Web. doi:10.1109/tsg.2020.2971148.
Qiu, Wei, Tang, Qiu, Wang, Yajun, Zhan, Lingwei, Liu, Yilu, & Yao, Wenxuan. Multi-View Convolutional Neural Network for Data Spoofing Cyber-Attack Detection in Distribution Synchrophasors. United States. https://doi.org/10.1109/tsg.2020.2971148
Qiu, Wei, Tang, Qiu, Wang, Yajun, Zhan, Lingwei, Liu, Yilu, and Yao, Wenxuan. Mon .
"Multi-View Convolutional Neural Network for Data Spoofing Cyber-Attack Detection in Distribution Synchrophasors". United States. https://doi.org/10.1109/tsg.2020.2971148. https://www.osti.gov/servlets/purl/1648880.
@article{osti_1648880,
title = {Multi-View Convolutional Neural Network for Data Spoofing Cyber-Attack Detection in Distribution Synchrophasors},
author = {Qiu, Wei and Tang, Qiu and Wang, Yajun and Zhan, Lingwei and Liu, Yilu and Yao, Wenxuan},
abstractNote = {Security of Distribution Synchrophasors Data (DSD) is of paramount importance as the data is used for critical smart grid applications including situational awareness, advanced protection, and dynamic control. Unfortunately, the DSD are attractive targets for malicious attackers aiming to damage grid. Data spoofing is a new class of deceiving attack, where the DSD of one Phasor Measurement Units (PMUs) is tampered by other PMUs thereby spoiling measurement based applications. In order to address this issue, a source authentication based data spoofing attack detection method is proposed using Multi-view Convolutional Neural Network (MCNN). First, common components embedded in raw frequency measurements from DSD are removed by Savitzky-Golay (SG) filter. Second, fast S transform (FST) is utilized to extract representative spatial fingerprints via time frequency analysis. Third, the spatial fingerprint is fed to MCNN, which combines dilated and standard convolutions for automatic feather extraction and source identification. Finally, according to the output of MCNN, spoofing attack detection is performed via threshold criterion. Extensive experiments with actual DSD from multiple locations in FNET/Grideye are conducted to verify the effectiveness of the proposed method.},
doi = {10.1109/tsg.2020.2971148},
journal = {IEEE Transactions on Smart Grid},
number = 4,
volume = 11,
place = {United States},
year = {Mon Feb 03 00:00:00 EST 2020},
month = {Mon Feb 03 00:00:00 EST 2020}
}
Web of Science