Malicious attacks against power systems are investigated, in which an adversary controls a set of meters and is able to alter the measurements from those meters. Two regimes of attacks are considered. The strong attack regime is where the adversary attacks a sufficient number of meters so that the network state becomes unobservable by the control center. For attacks in this regime, the smallest set of attacked meters capable of causing network unobservability is characterized using a graph theoretic approach. By casting the problem as one of minimizing a supermodular graph functional, the problem of identifying the smallest set of vulnerable meters is shown to have polynomial complexity. For the weak attack regime where the adversary controls only a small number of meters, the problem is examined from a decision theoretic perspective for both the control center and the adversary. For the control center, a generalized likelihood ratio detector is proposed that incorporates historical data. For the adversary, the trade-off between maximizing estimation error at the control center and minimizing detection probability of the launched attack is examined. An optimal attack based on minimum energy leakage is proposed.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE : ProGuard: Detecting Malicious Accounts in Social-Network-Based Online Promotions - 2017 ABSTRACT: Online social networks (OSNs) gradually integrate monetary capabilities by enabling the usage of real and virtual
PROJECT TITLE :Stickler: Defending against Malicious Content Distribution Networks in an Unmodified BrowserABSTRACT:Web site publishers will derive enormous performance advantages and price savings by directing traffic to their
PROJECT TITLE :Data Lineage in Malicious EnvironmentsABSTRACT:Intentional or unintentional leakage of confidential information is undoubtedly one amongst the foremost severe security threats that organizations face in the digital
PROJECT TITLE :Modeling and Verification of Online Shopping Business Processes by Considering Malicious Behavior PatternsABSTRACT:Recently, on-line looking integrating third-party payment platforms (TPPs) introduces new security
PROJECT TITLE :Modeling malicious activities in cyber spaceABSTRACT:Cyber attacks are an unfortunate part of society as an increasing quantity of critical infrastructure is managed and controlled via the Internet. So as to protect

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry