Skip to main content
Log in

Topology change detection in networks due to false data injections: a priori assessment based on graph matching techniques

  • Original Research
  • Published:
Life Cycle Reliability and Safety Engineering Aims and scope Submit manuscript

Abstract

This paper analyzes how to detect changes in the topology of a network under a false data injection (FDI), when an intruder inserts false information into the system so as to modify the structure of the adjacency matrix describing the connections in the network. Detecting an FDI is of paramount importance for maintaining the resilience and performance of a network, whether it is a computer network, power system, or any other interdependent systems. Indeed, an FDI can cause incorrect decisions or actions to be taken based on inaccurate information, leading to operational errors and potential disruptions. For example, detecting false data injection helps preserve the integrity of the energy supply of an electric power system. Among the possible types of FDI, we are interested in the assessment of a special type of attack that shuffles the labels of the nodes of the network causing a permutation on the adjacency matrix, thereby giving the false impression that the network has a topology different from reality. We propose a simple but effective iterative procedure based on the use of graph matching algorithms to derive a possible perfect correspondence between the nodes of the actual topology and the (false) perturbed topology. The R packages igraphMatch and netcom were used for the evaluation. The procedure is applied to two different topologies with promising results.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  • Aboelwafa MM, Seddik KG, Eldefrawy MH, Gadallah Y, Gidlund M (2020) A machine-learning-based technique for false data injection attacks detection in industrial IoT. IEEE Internet Things J 7(9):8462–8471

    Article  Google Scholar 

  • Adhikari RS, Aste N, Manfren M (2012) Multi-commodity network flow models for dynamic energy management—Smart Grid applications. Energy Procedia 14:1374–1379

    Article  Google Scholar 

  • Ahmed M, Pathan ASK (2020) False data injection attack (FDIA): an overview and new metrics for fair evaluation of its countermeasure. Complex Adaptive Syst Model 8:4

    Article  Google Scholar 

  • Anwar A, Mahmood AN (2016) Anomaly detection in electric network database of smart grid: Graph matching approach. Electr Power Syst Res 133:51–62

    Article  Google Scholar 

  • Carletti V, Foggia P, Greco A, Saggese A, Vento M (2020) Comparing performance of graph matching algorithms on huge graphs. Pattern Recogn Lett 134:58–67

    Article  Google Scholar 

  • Díaz-Verdejo J, Elhady AM, El-bakry HM, AbouElfetouh A (2019) Comprehensive Risk Identification Model for SCADA Systems. Security Commun Netw. https://doi.org/10.1155/2019/3914283

    Article  Google Scholar 

  • Ding S, Gu W, Lu S, Yu R, Sheng L (2022) Cyber-attack against heating system in integrated energy systems: model and propagation mechanism. Appl Energy 311:118650

    Article  Google Scholar 

  • Foggia P, Percannella G, Vento M (2014) Graph matching and learning in pattern recognition in the last 10 years. Int J Pattern Recognit Artif Intell 28(01):1450001

    Article  MathSciNet  Google Scholar 

  • Gaushell DJ, Darlington HT (1987) Supervisory control and data acquisition. Proc IEEE 75(12):1645–1658

    Article  Google Scholar 

  • Haller S et al (2022) A Comparative Study of Graph Matching Algorithms in Computer Vision. In: Avidan S et al (eds) Vision—ECCV 2022. ECCV 2022. computer lecture notes in computer science. Springer

    Google Scholar 

  • Hornik K., R Core Team. (2022) Frequently Asked Questions on R. Version 2022–04–12, https://cran.r-project.org/doc/FAQ/R-FAQ.html#What-is-R_003f.

  • Irving MR (2009) Robust algorithm for generalized state estimation. IEEE Trans Power Syst 24(4):1886–1887

    Article  Google Scholar 

  • Junchi Y., Xu-Cheng Y., Weiyao L., Cheng D., Hongyuan Z., Xiaokang Y. 2016 A Short Survey of Recent Advances in Graph Matching, ICMR ‘16: Proc. of the 2016 ACM on International Conference on Multimedia Retrieval, 167–174.

  • Langendorf R (2022) Netcom: NETwork COMparison Inference. R Package Version 2(1):6

    Google Scholar 

  • Li J, Dueñas-Osorio L, Chen C, Shi C (2017) AC power flow importance measures considering multi-element failures. Reliab Eng Syst Saf 160:89–97

    Article  Google Scholar 

  • Li X, Wang Y, Lu Z (2023) Graph-based detection for false data injection attacks in power grid. Energy. https://doi.org/10.1016/j.energy.2022.125865

    Article  Google Scholar 

  • Liang G, Zhao J, Luo F, Weller SR, Dong ZY (2017) A review of false data injection attacks against modern power systems. IEEE Trans Smart Grid 8(4):1630–1638

    Article  Google Scholar 

  • Lyzinski V, Fishkind DE, Fiori M, Vogelstein JT, Priebe CE, Sapiro G (2016) Graph matching: relax at your own risk. IEEE Trans Pattern Anal Mach Intell 38(1):60–73

    Article  Google Scholar 

  • Macaulay T, Singer BL (2012) Cybersecurity for industrial control systems. CRC Press, Boca Raton, Fla, USA

    Google Scholar 

  • Newman M (2018) Networks, 2nd edn. Oxford University Press

    Book  Google Scholar 

  • Pagani GA, Aiello M (2013) The power grid as a complex network: a survey. Physica A 392(11):2688–2700

    Article  MathSciNet  Google Scholar 

  • Pang Z-H, Fan L-Z, Dong Z, Han Q-L, Liu G-P (2022) False data injection attacks against partial sensor measurements of networked control systems. IEEE Trans Circuits Syst II Express Briefs 69(1):149–153

    Google Scholar 

  • Peng Z (2010) Industrial control networks, Advanced Industrial Control Technology. William Andrew Publishing

    Google Scholar 

  • Rocco CM, Barker K, Moronta J (2022) Determining the best algorithm to detect community structures in networks: application to power systems. Environ Syst Decis 42(2):251–264

    Article  Google Scholar 

  • Rossi RA, Ahmed NK (2015) The Network Data Repository with Interactive Graph Analytics and Visualization. AAAI. https://doi.org/10.1609/aaai.v29i1.9277

    Article  Google Scholar 

  • Sun H., Zhou W. and Fei. M. 2020. A Survey On Graph Matching In Computer Vision, 13th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI), Chengdu, China, pp. 225-230.

  • Sussman D, Qiao Z (2022) iGraphMatch: tools for graph matching. R Package Version 2:1

    Google Scholar 

  • Vijayshankar S, Chang CH, Utkarsh K, Wald D, Ding F, Balamurugan SP, King J, Macwan R (2023) Assessing the impact of cybersecurity attacks on energy systems. Appl Energy 345:121297

    Article  Google Scholar 

  • Wang Q, Tai W, Tang Y, Ni M (2019) Review of the false data injection attack against the cyber-physical power system. IET Cyber-Phys Syst Theory App 4(2):101–107

    Article  Google Scholar 

  • Yan J, Yin XC, Lin W, Deng C, Zha H, Yang X (2016). A short survey of recent advances in graph matching. In: Proc. of the 2016 ACM on international conference on multimedia retrieval, June 2016. ACM, pp 167–174

  • Zhou Y, Cisneros-Saldana J, Xie L (2018) False Analog Data Injection Attack Towards Topology Errors: Formulation and Feasibility Analysis. In: Zhou Y et al (eds) IEEE Power & Energy Society General Meeting (PESGM). IEEE

    Google Scholar 

  • Zhu S, Setia S, Jajodia S, Ning P (2007) Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. ACM Trans Sensor Netw 3(3):14

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kash Barker.

Ethics declarations

Conflict of interests

The authors declare that they have no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rocco, C.M., Moronta, J. & Barker, K. Topology change detection in networks due to false data injections: a priori assessment based on graph matching techniques. Life Cycle Reliab Saf Eng (2024). https://doi.org/10.1007/s41872-024-00247-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s41872-024-00247-9

Keywords

Navigation