Articles worth reading
Borophene Shines Alone As 2-D Plasmonic Material

Borophene Shines Alone As 2-D Plasmonic Material

access_time November 30, 2017

A group of researchers from the Rice University has created a two-dimensional thin sheet of boron—a material illustrious as Borophene

Hot Days Could Slow 5G Networks, But Research Offers Solutions

Hot Days Could Slow 5G Networks, But Research Offers Solutions

access_time December 7, 2017

Hot and Sunny days could slow down 5G The new talk of the town is the up and coming 5G

Paradise Papers Implicate Apple in Offshore Tax Haven

Paradise Papers Implicate Apple in Offshore Tax Haven

access_time November 13, 2017

The recent revelations brought forth by the release of the so-called “Paradise Papers” have already caused financial waves in a

Blog

A New Way to Detect False Data Injection Attacks

A New Way to Detect False Data Injection Attacks

access_time January 28, 2019 chat_bubble_outline 0 comments remove_red_eye 1093 views

False data injection attacks are becoming somewhat common these days, so finding preventive measures from such attacks is something that researchers are looking to do. This is exactly what researchers at Beijing Institute of Technology are aiming to do. Their technology was presented at the Annual Conference of the IEEE Industrial Electronics Society and outlines how to prevent false data injection attacks using a recurrent neural network.

False data injections hacks a problem?

Cyber attacks or false data injection attacks are a new way to cause chaos and havoc to people. They are particularly focused on disrupting power grids causing widespread disturbance to people living in those affected areas. False data injection attacks were seen in 2015 when a power grid was affected in Ukraine, leaving 230,000 people without electricity for several hours.

Researchers have found many different ways to prevent cyber attacks but none of them seem to be successful in preventing false data injection attacks on power grids. False data injection attacks are notoriously known for passing all modern surveillance and various other security techniques.

False data injections attacks works by allowing an attacker to compromise measurements taken by the grid which then disrupts its normal functioning even damaging the devices connected to it.

Detecting False Data Injection Attacks:

Researchers have been hard at work looking for ways to detect false data injection attacks. By doing so they could help prevent infrastructural damages to power grids caused by such attacks. Many of these ways so developed use machine learning tools.

These machine learning tools use both supervised and semi supervised learning algorithms to detect false data injection attacks.

Limitations to Using Machine Learning Tools:

While many of these methods made use machine learning tools they have various flaws and limitations that make them inherently unsuccessful in detecting a cyber attack.

Some of these machine learning tools so developed are prone to vulnerabilities associated with false data injection attacks themselves, while others cannot be trained to recognize an attack due to the limited amount of data that is available.

Overcoming the Problem:

Researchers have found a way to overcome these limitations in current methods by using a recurrent neural network or RNN for short. This RNN has several hidden layers with a fully connected layer at the top. This top layer has a linear activation function.

RNNs have been especially found out to be effective in time series forecasting and in anomaly detection. This makes it useful in detecting a cyber attack of the false data injection variety.

Studies showing the effectiveness of RNNs are what prompted researchers to look at using RNNs for detecting cyber attacks.

The RNNs used by researchers does not require labelled data to function which makes it easier to use in real world situations. Researchers applied this RNN to the IEEE-14 bus test system and got astounding results. The RNN was successful in identifying compromised measurements by using a small alarm rate or FAR for short.

folder_openAssigned tags
content_copyCategorized under

No Comments

comment No comments yet

You can be first to leave a comment

Submit an answer

info_outline

Your data will be safe!

Your e-mail address will not be published. Also other data will not be shared with third person.

This site uses Akismet to reduce spam. Learn how your comment data is processed.