Enhancing the Stealth of Load Redistribution Attacks: A Novel Cluster-Driven Approach

Rohini Haridas, Chenghong Gu, Satish Sharma, Rohit Bhakar

Research output: Contribution to journalArticlepeer-review

34 Downloads (Pure)

Abstract

This letter proposes a novel cluster-driven bilevel Load Redistribution (LR) attack model in cyber physical power systems. The main goal is on overloading multiple transmission lines while maintaining a high level of stealth. The proposed model employs cluster-based approach to form distinct clusters, each representing different load patterns within the power system. This enables the design of attack vectors that seamlessly blend with these load patterns, thereby challenging advanced anomaly detection systems. The stealth of the attack is quantified by the Stealth Distance Index (SDI), ensuring that injected false data remain within the maximum permissible distance from the centroid of its corresponding cluster. The proposed model is validated on the modified IEEE 14-bus and 30-bus systems, demonstrating enhanced stealth capabilities in LR attacks.

Original languageEnglish
Pages (from-to)712-715
Number of pages4
JournalIEEE Systems Journal
Volume19
Issue number2
Early online date9 Apr 2025
DOIs
Publication statusPublished - 9 Aug 2025

Funding

This work was supported in part by the Commonwealth Scholarship Commission (CSC) funded by the UK Foreign, Commonwealth & Development Office under Grant INCN-2023-135 and in part by the Supergen Energy Networks Impact Hub 2023 funded by the Engineering and Physical Sciences Research Council (EPSRC), UK, under Grant EP/Y016114/2.

FundersFunder number
Commonwealth Scholarship Commission
Foreign, Commonwealth and Development OfficeINCN-2023-135
Engineering and Physical Sciences Research CouncilEP/Y016114/2

Keywords

  • Cyber physical power systems
  • K-means clustering
  • lines overloading
  • Load Redistribution (LR) attacks
  • stealth enhancement

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Information Systems
  • Computer Science Applications
  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Enhancing the Stealth of Load Redistribution Attacks: A Novel Cluster-Driven Approach'. Together they form a unique fingerprint.

Cite this