A Novel Data Integrity Attack Detection Algorithm Based on Improved Grey Relational Analysis

被引:19
|
作者
Zhang, Zhengdao [1 ]
Wang, Yunfei [1 ]
Xie, Linbo [1 ]
机构
[1] Jiangnan Univ, Sch IoT Engn, Minist Educ, Engn Res Ctr Internet Things Appl Technol, Wuxi 214122, Peoples R China
来源
IEEE ACCESS | 2018年 / 6卷
基金
国家重点研发计划;
关键词
Industry control systems; false data injection; attack detection; grey correlation analysis; SVM; FALSE DATA INJECTION; SYSTEMS;
D O I
10.1109/ACCESS.2018.2884504
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
False data injection (FDI) attack is the most common data integrity attack, and it is also one of the most serious threats in industrial control systems (ICSs). Although many detection approaches are developed with burgeoning research interests, the technical capability of existing detection methods is still insufficient because the stealth FDI attacks have been proven to bypass bad data detector. In this paper, a novel data analytical algorithm is proposed to identify the stealth FDI attacks in ICSs according to the correlation analysis. First, we evaluate the correlation between measurements and control variables based on an improved grey relational analysis. Then, SVM is used to classify the FDI attack according to the values of correlation. Through a reliable semi-physical simulation testbed whose virtual plant corresponds to a 330 MW boiler-turbine unit, two FDI attacks that can bypass the detection system are studied. A dataset, which contains the normal data and attack data, is created from the testbed to verify the effectiveness of the proposed algorithm. In addition, the performance of the proposed algorithm is also studied based on the new gas pipeline dataset that is collected by the distributed analytics and security institute in Mississippi State University. Such a novel algorithm, which has better accuracy and reliability, is compared with the state of the art based on the data analysis.
引用
收藏
页码:73423 / 73433
页数:11
相关论文
共 50 条
  • [31] IT project risk assessment based on improved grey relational
    Xing, Lixian
    Tu, Keran
    Ma, Ling
    ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL IV, PROCEEDINGS, 2009, : 399 - 402
  • [32] An Improved Grey Wolves Optimization Algorithm for Dynamic Community Detection and Data Clustering
    Besharatnia, Fatemeh
    Talebpour, Alireza
    Aliakbary, Sadegh
    APPLIED ARTIFICIAL INTELLIGENCE, 2022, 36 (01)
  • [33] Data Integrity Attack on Consensus-based Distributed Energy Management Algorithm
    Duan, Jie
    Chow, Mo-Yuen
    2017 IEEE POWER & ENERGY SOCIETY GENERAL MEETING, 2017,
  • [34] Adaptive Edge Detection Algorithm Based on Improved Grey Prediction Model
    Zheng, Zhen
    Zha, Bingting
    Yuan, Hailu
    Xuchen, Youshi
    Gao, Yanliang
    Zhang, He
    IEEE ACCESS, 2020, 8 : 102165 - 102176
  • [35] A variable iterated greedy algorithm based on grey relational analysis for crew scheduling
    Peng, K.
    Shen, Y.
    SCIENTIA IRANICA, 2018, 25 (02) : 831 - 840
  • [36] Design of a New Energy Microgrid Optimization Scheduling Algorithm Based on Improved Grey Relational Theory
    Mo, Dong
    Li, Qiuwen
    Sun, Yan
    Zhuo, Yixin
    Deng, Fangming
    ALGORITHMS, 2025, 18 (01)
  • [37] Image Hiding Algorithm in Discrete Cosine Transform Domain Based on Grey Prediction and Grey Relational Analysis
    Huang Haiping
    Huang Shichao
    Chen Jiutian
    Wang Ruchuan
    CHINA COMMUNICATIONS, 2013, 10 (07) : 57 - 70
  • [38] An improved algorithm to watermark numeric relational data
    Guo, F
    Wang, JM
    Zhang, ZH
    Ye, XJ
    Li, DY
    INFORMATION SECURITY APPLICATIONS, 2006, 3786 : 138 - 149
  • [39] An Adaptive Algorithm for Grey Image Edge Detection Based on Grey Correlation Analysis
    Qiao Baoming
    Jin Liu
    Yang Yufan
    PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 470 - 474
  • [40] A novel Kalman Filter based shilling attack detection algorithm
    Liu, Xin
    Xiao, Yingyuan
    Jiao, Xu
    Zheng, Wenguang
    Ling, Zihao
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2020, 17 (02) : 1558 - 1577