LESSON: Multi-Label Adversarial False Data Injection Attack for Deep Learning Locational Detection

Jiwei Tian,Chao Shen,Buhong Wang,Xiaofang Xia,Meng Zhang,Chenhao Lin,Qian Li
DOI: https://doi.org/10.1109/TDSC.2024.3353302
2024-01-29
Abstract:Deep learning methods can not only detect false data injection attacks (FDIA) but also locate attacks of FDIA. Although adversarial false data injection attacks (AFDIA) based on deep learning vulnerabilities have been studied in the field of single-label FDIA detection, the adversarial attack and defense against multi-label FDIA locational detection are still not involved. To bridge this gap, this paper first explores the multi-label adversarial example attacks against multi-label FDIA locational detectors and proposes a general multi-label adversarial attack framework, namely muLti-labEl adverSarial falSe data injectiON attack (LESSON). The proposed LESSON attack framework includes three key designs, namely Perturbing State Variables, Tailored Loss Function Design, and Change of Variables, which can help find suitable multi-label adversarial perturbations within the physical constraints to circumvent both Bad Data Detection (BDD) and Neural Attack Location (NAL). Four typical LESSON attacks based on the proposed framework and two dimensions of attack objectives are examined, and the experimental results demonstrate the effectiveness of the proposed attack framework, posing serious and pressing security concerns in smart grids.
Cryptography and Security
What problem does this paper attempt to address?
### What problems does this paper attempt to solve? This paper aims to solve the problem of detection and location of multi - label false data injection attacks (FDIA) in smart grids. Specifically, it proposes a multi - label adversarial attack framework for deep - learning - based multi - label FDIA detectors, named LESSON (muLti - labEl adverSarial falSe data injectiON attack). The following are the specific problems that this paper attempts to solve: 1. **Limitations of existing research**: - Although some studies have explored adversarial false data injection attacks (AFDIA) based on single - label FDIA detection, adversarial attacks and defense methods for multi - label FDIA location detection have not been involved yet. - Although the application of deep - learning models in power systems performs well, it is also vulnerable to the influence of adversarial sample attacks. 2. **New attack threats**: - Adversarial false data injection attacks (AFDIA) can take advantage of the vulnerabilities of deep - learning models to change the power grid state without being detected, thereby achieving specific attack goals. - Adversarial attacks for multi - label FDIA location detection can mislead the neural network attack location (NAL) module, enabling attackers to hide their real attack locations. 3. **Security and reliability**: - Existing adversarial attack and defense methods mainly focus on single - label classification, while multi - label classification adversarial attack methods and defense strategies have not been fully studied. - Explore the methods and characteristics of multi - label adversarial attacks to provide a basis and support for the subsequent design of effective defense measures. ### Main contributions of the paper In order to address the above problems, the paper makes the following main contributions: 1. **Propose the LESSON attack framework**: - Propose a general and multi - functional multi - label adversarial attack framework LESSON, including three key designs: perturbing state variables, customizing loss function design, and variable transformation. - These designs can help find suitable multi - label adversarial perturbations within physical constraints to bypass bad data detection (BDD) and neural attack location (NAL). 2. **Explore four typical LESSON attacks**: - Based on the proposed attack framework and two - dimensional attack goals, explore four typical LESSON attacks (LESSON - 1 to LESSON - 4). - Attack goal one focuses on the induced estimation error, representing the attacker's attempt to influence the power system state estimation results; attack goal two focuses on the location detection results of the multi - label FDIA detector, indicating the attacker's deception ability and the real concealment of the attack. 3. **Experimental analysis and evaluation**: - Conduct extensive experimental analysis to verify the effectiveness of the four LESSON attacks and analyze relevant influencing factors. - The experimental results show that the LESSON attack framework has a high attack success rate, especially in large - scale power systems, posing a great threat to existing multi - label classifiers. Through these contributions, the paper fills the gap in multi - label adversarial attack research and provides an important reference and basis for future security protection.