Random-Enabled Hidden Moving Target Defense against False Data Injection Alert Attackers
نویسندگان
چکیده
Hidden moving target defense (HMTD) is a proactive strategy that kept hidden from attackers by changing the reactance of transmission lines to thwart false data injection (FDI) attacks. However, alert with strong capabilities pose additional risks HMTD and thus, it much-needed evaluate hiddenness HMTD. This paper first summarizes two existing attacker models, i.e., bad-data-detection-based data-driven attackers. Furthermore, this proposes novel model-based model uses MTD operation models estimate dispatched line reactance. The proposed can use estimated construct stealthy FDI attacks against methods lack randomness. We propose random-enabled (RHMTD) method, which utilizes random weights introduce randomness derived conditions as constraints. RHMTD theoretically proven be three models. In addition, we analyze detection effectiveness Simulation results on IEEE 14-bus systems show traditional fail detect attacker, effective in detecting
منابع مشابه
Random Host Mutation for Moving Target Defense
Exploiting static configuration of networks and hosts has always been a great advantage for design and launching of decisive attacks. Network reconnaissance of IP addresses and ports is prerequisite to many host and network attacks. At the same time, knowing IP addresses is required for service reachability in IP networks, which makes complete concealment of IP address for servers infeasible. I...
متن کاملEnhanced Hidden Moving Target Defense in Smart Grids
Recent research has proposed a moving target defense (MTD) approach that actively changes transmission line susceptance to preclude stealthy false data injection (FDI) attacks against the state estimation of a smart grid. However, existing studies were often conducted under a weak adversarial setting, in that they ignore the possibility that alert attackers can also try to detect the activation...
متن کاملMoving Target Defense Against Network Reconnaissance with Software Defined Networking
Online hosts and networks are easy targets of network attacks due to their static nature, which creates an information asymmetry and makes them easy to attack and hard to defend. To break the asymmetry, Moving Target Defense was proposed to bring uncertainties to computer systems. It can be applied to all levels of protections, covering applications, system software, operating systems, and netw...
متن کاملResilient Configuration of Distribution System versus False Data Injection Attacks Against State Estimation
State estimation is used in power systems to estimate grid variables based on meter measurements. Unfortunately, power grids are vulnerable to cyber-attacks. Reducing cyber-attacks against state estimation is necessary to ensure power system safe and reliable operation. False data injection (FDI) is a type of cyber-attack that tampers with measurements. This paper proposes network reconfigurati...
متن کاملThe underestimated role of roots in defense against leaf attackers.
Plants have evolved intricate strategies to withstand attacks by herbivores and pathogens. Although it is known that plants change their primary and secondary metabolism in leaves to resist and tolerate aboveground attack, there is little awareness of the role of roots in these processes. This is surprising given that plant roots are responsible for the synthesis of plant toxins, play an active...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Processes
سال: 2023
ISSN: ['2227-9717']
DOI: https://doi.org/10.3390/pr11020348