False Data Injection (FDI) attacks are cybersecurity threats where malicious actors inject false or misleading data into a system to manipulate its operations. In the context of power grids and smart grids, FDI attacks involve sending incorrect measurements or control signals to the system’s sensors, communication networks, or control centers. These attacks can lead to incorrect decision-making, affecting grid stability, energy distribution, or system performance. They can compromise data integrity, cause disruptions in operations, and undermine system security. Detection and mitigation strategies are critical for safeguarding systems against FDI attacks.

Posts

Detection of False Data Injection Attacks in Cyber-Physical Systems using Dynamic Invariants

Modern cyber-physical systems are increasingly complex and vulnerable to attacks like false data injection aimed at destabilizing and confusing the systems. We develop and evaluate an attack-detection framework aimed at learning a dynamic invariant network, data-driven temporal causal relationships between components of cyber-physical systems. We evaluate the relative performance in attack detection of the proposed model relative to traditional anomaly detection approaches. In this paper, we introduce Granger Causality based Kalman Filter with Adaptive Robust Thresholding (G-KART) as a framework for anomaly detection based on data-driven functional relationships between components in cyber-physical systems. In particular, we select power systems as a critical infrastructure with complex cyber-physical systems whose protection is an essential facet of national security. The system presented is capable of learning with or without network topology the task of detection of false data injection attacks in power systems. Kalman filters are used to learn and update the dynamic state of each component in the power system and in-turn monitor the component for malicious activity. The ego network for each node in the invariant graph is treated as an ensemble model of Kalman filters, each of which captures a subset of the node’s interactions with other parts of the network. We finally also introduce an alerting mechanism to surface alerts about compromised nodes.