Visible to the public Statistical Security Incident Forensics Against Data Falsification in Smart Grid Advanced Metering Infrastructure

TitleStatistical Security Incident Forensics Against Data Falsification in Smart Grid Advanced Metering Infrastructure
Publication TypeConference Paper
Year of Publication2017
AuthorsBhattacharjee, Shameek, Thakur, Aditya, Silvestri, Simone, Das, Sajal K.
Conference NameProceedings of the Seventh ACM on Conference on Data and Application Security and Privacy
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4523-1
Keywordsadvanced metering infrastructure, control theory, data falsification, Human Behavior, human factors, information forensics, Information theory, Metrics, privacy, pubcrawl, relative entropy, resilience, Resiliency, Scalability, security incident forensics, Smart grid, statistical anomaly detection, supervised learning, trust models
Abstract

Compromised smart meters reporting false power consumption data in Advanced Metering Infrastructure (AMI) may have drastic consequences on a smart grid's operations. Most existing works only deal with electricity theft from customers. However, several other types of data falsification attacks are possible, when meters are compromised by organized rivals. In this paper, we first propose a taxonomy of possible data falsification strategies such as additive, deductive, camouflage and conflict, in AMI micro-grids. Then, we devise a statistical anomaly detection technique to identify the incidence of proposed attack types, by studying their impact on the observed data. Subsequently, a trust model based on Kullback-Leibler divergence is proposed to identify compromised smart meters for additive and deductive attacks. The resultant detection rates and false alarms are minimized through a robust aggregate measure that is calculated based on the detected attack type and successfully discriminating legitimate changes from malicious ones. For conflict and camouflage attacks, a generalized linear model and Weibull function based kernel trick is used over the trust score to facilitate more accurate classification. Using real data sets collected from AMI, we investigate several trade-offs that occur between attacker's revenue and costs, as well as the margin of false data and fraction of compromised nodes. Experimental results show that our model has a high true positive detection rate, while the average false alarm rate is just 8%, for most practical attack strategies, without depending on the expensive hardware based monitoring.

URLhttps://dl.acm.org/citation.cfm?doid=3029806.3029833
DOI10.1145/3029806.3029833
Citation Keybhattacharjee_statistical_2017