
You have already added 0 works in your ORCID record related to the merged Research product.
You have already added 0 works in your ORCID record related to the merged Research product.
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=undefined&type=result"></script>');
-->
</script>
Survey of machine learning methods for detecting false data injection attacks in power systems

Over the last decade, the number of cyber attacks targeting power systems and causing physical and economic damages has increased rapidly. Among them, false data injection attacks (FDIAs) are a class of cyber‐attacks against power grid monitoring systems. Adversaries can successfully perform FDIAs to manipulate the power system state estimation (SE) by compromising sensors or modifying system data. SE is an essential process performed by the energy management system towards estimating unknown state variables based on system redundant measurements and network topology. SE routines include bad data detection algorithms to eliminate errors from the acquired measurements, e.g. in case of sensor failures. FDIAs can bypass BDD modules to inject malicious data vectors into a subset of measurements without being detected, and thus manipulate the results of the SE process. To overcome the limitations of traditional residual‐based BDD approaches, data‐driven solutions based on machine learning algorithms have been widely adopted for detecting malicious manipulation of sensor data due to their fast execution times and accurate results. This study provides a comprehensive review of the most up‐to‐date machine learning methods for detecting FDIAs against power system SE algorithms.
- University of Florida United States
- Florida Southern College United States
- Department of Electrical Engineering and Computer Science University of Michigan United States
- Department of Electrical Engineering and Computer Science University of Michigan United States
- Florida State University United States
malicious data vectors, FOS: Computer and information sciences, Computer Science - Cryptography and Security, power system measurement, energy management system, Systems and Control (eess.SY), system redundant measurements, Electrical Engineering and Systems Science - Systems and Control, false data injection attacks, power systems, data detection algorithms, machine learning algorithms, binary decision diagrams, power grid monitoring systems, FOS: Electrical engineering, electronic engineering, information engineering, energy management systems, data-driven solutions, power system se algorithms, fdia, power engineering computing, system data, security of data, power grids, sensor data, TK1-9971, power system security, unknown state variables, learning (artificial intelligence), cyber-attacks, Electrical engineering. Electronics. Nuclear engineering, Cryptography and Security (cs.CR), cyber attacks, power system state estimation
malicious data vectors, FOS: Computer and information sciences, Computer Science - Cryptography and Security, power system measurement, energy management system, Systems and Control (eess.SY), system redundant measurements, Electrical Engineering and Systems Science - Systems and Control, false data injection attacks, power systems, data detection algorithms, machine learning algorithms, binary decision diagrams, power grid monitoring systems, FOS: Electrical engineering, electronic engineering, information engineering, energy management systems, data-driven solutions, power system se algorithms, fdia, power engineering computing, system data, security of data, power grids, sensor data, TK1-9971, power system security, unknown state variables, learning (artificial intelligence), cyber-attacks, Electrical engineering. Electronics. Nuclear engineering, Cryptography and Security (cs.CR), cyber attacks, power system state estimation
citations This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).107 popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.Top 1% influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).Top 10% impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.Top 1%
