Data-driven Online Detection of Replay Attacks on Wide-Area Measurement Systems

Attacks replaying pre-recorded data packets are difficult to detect since these are copies of actual disturbance data from a previous time instant. Assuming that only a few sensors can actually be tampered at any given time, it is suggested that the incoherence between the actual and tampered sensor readings be used in flagging an attack. Aligned to this theme, the paper presents two different schemes for replay attack detection. The singular value decomposition approach proposed in the paper is based on the relative change in ratios of dominant singular values of a data window sliding in time, while the proposed Pearson correlation based approach utilizes the time-series correlation between the neighboring PMU measurements as an instrument for attack detection. It is proposed that these detection schemes be incorporated in the wide area monitoring system as data preprocessing units for anomaly identification. The effectiveness of the detection schemes are studied on a test system and their merits and limitations are discussed.

[1]  Aditya Ashok,et al.  Cyber-Physical Attack-Resilient Wide-Area Monitoring, Protection, and Control for the Power Grid , 2017, Proceedings of the IEEE.

[2]  William G. Marchal,et al.  Statistics: An Introduction , 1983 .

[3]  Jong-Ho Lee,et al.  Detection of replay attacks in smart grid systems , 2013, 2013 International Conference on Computing, Management and Telecommunications (ComManTel).

[4]  Ping Zhang,et al.  Detection of replay attacks in cyber-physical systems , 2016, 2016 American Control Conference (ACC).

[5]  Nilanjan Ray Chaudhuri,et al.  Malicious Corruption-Resilient Wide-Area Oscillation Monitoring Using Principal Component Pursuit , 2019, IEEE Transactions on Smart Grid.

[6]  S. Brahma,et al.  Online Analytical Characterization of Outliers in Synchrophasor Measurements: A Singular Value Perturbation Viewpoint , 2018, IEEE Transactions on Power Systems.

[7]  Gene H. Golub,et al.  Matrix computations , 1983 .

[8]  Bruno Sinopoli,et al.  Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[9]  Kaustav Chatterjee,et al.  Review of cyber attacks on power system operations , 2017, 2017 IEEE Region 10 Symposium (TENSYMP).