Abstract
This paper analyzes how to detect changes in the topology of a network under a false data injection (FDI), when an intruder inserts false information into the system so as to modify the structure of the adjacency matrix describing the connections in the network. Detecting an FDI is of paramount importance for maintaining the resilience and performance of a network, whether it is a computer network, power system, or any other interdependent systems. Indeed, an FDI can cause incorrect decisions or actions to be taken based on inaccurate information, leading to operational errors and potential disruptions. For example, detecting false data injection helps preserve the integrity of the energy supply of an electric power system. Among the possible types of FDI, we are interested in the assessment of a special type of attack that shuffles the labels of the nodes of the network causing a permutation on the adjacency matrix, thereby giving the false impression that the network has a topology different from reality. We propose a simple but effective iterative procedure based on the use of graph matching algorithms to derive a possible perfect correspondence between the nodes of the actual topology and the (false) perturbed topology. The R packages igraphMatch and netcom were used for the evaluation. The procedure is applied to two different topologies with promising results.
Similar content being viewed by others
References
Aboelwafa MM, Seddik KG, Eldefrawy MH, Gadallah Y, Gidlund M (2020) A machine-learning-based technique for false data injection attacks detection in industrial IoT. IEEE Internet Things J 7(9):8462–8471
Adhikari RS, Aste N, Manfren M (2012) Multi-commodity network flow models for dynamic energy management—Smart Grid applications. Energy Procedia 14:1374–1379
Ahmed M, Pathan ASK (2020) False data injection attack (FDIA): an overview and new metrics for fair evaluation of its countermeasure. Complex Adaptive Syst Model 8:4
Anwar A, Mahmood AN (2016) Anomaly detection in electric network database of smart grid: Graph matching approach. Electr Power Syst Res 133:51–62
Carletti V, Foggia P, Greco A, Saggese A, Vento M (2020) Comparing performance of graph matching algorithms on huge graphs. Pattern Recogn Lett 134:58–67
Díaz-Verdejo J, Elhady AM, El-bakry HM, AbouElfetouh A (2019) Comprehensive Risk Identification Model for SCADA Systems. Security Commun Netw. https://doi.org/10.1155/2019/3914283
Ding S, Gu W, Lu S, Yu R, Sheng L (2022) Cyber-attack against heating system in integrated energy systems: model and propagation mechanism. Appl Energy 311:118650
Foggia P, Percannella G, Vento M (2014) Graph matching and learning in pattern recognition in the last 10 years. Int J Pattern Recognit Artif Intell 28(01):1450001
Gaushell DJ, Darlington HT (1987) Supervisory control and data acquisition. Proc IEEE 75(12):1645–1658
Haller S et al (2022) A Comparative Study of Graph Matching Algorithms in Computer Vision. In: Avidan S et al (eds) Vision—ECCV 2022. ECCV 2022. computer lecture notes in computer science. Springer
Hornik K., R Core Team. (2022) Frequently Asked Questions on R. Version 2022–04–12, https://cran.r-project.org/doc/FAQ/R-FAQ.html#What-is-R_003f.
Irving MR (2009) Robust algorithm for generalized state estimation. IEEE Trans Power Syst 24(4):1886–1887
Junchi Y., Xu-Cheng Y., Weiyao L., Cheng D., Hongyuan Z., Xiaokang Y. 2016 A Short Survey of Recent Advances in Graph Matching, ICMR ‘16: Proc. of the 2016 ACM on International Conference on Multimedia Retrieval, 167–174.
Langendorf R (2022) Netcom: NETwork COMparison Inference. R Package Version 2(1):6
Li J, Dueñas-Osorio L, Chen C, Shi C (2017) AC power flow importance measures considering multi-element failures. Reliab Eng Syst Saf 160:89–97
Li X, Wang Y, Lu Z (2023) Graph-based detection for false data injection attacks in power grid. Energy. https://doi.org/10.1016/j.energy.2022.125865
Liang G, Zhao J, Luo F, Weller SR, Dong ZY (2017) A review of false data injection attacks against modern power systems. IEEE Trans Smart Grid 8(4):1630–1638
Lyzinski V, Fishkind DE, Fiori M, Vogelstein JT, Priebe CE, Sapiro G (2016) Graph matching: relax at your own risk. IEEE Trans Pattern Anal Mach Intell 38(1):60–73
Macaulay T, Singer BL (2012) Cybersecurity for industrial control systems. CRC Press, Boca Raton, Fla, USA
Newman M (2018) Networks, 2nd edn. Oxford University Press
Pagani GA, Aiello M (2013) The power grid as a complex network: a survey. Physica A 392(11):2688–2700
Pang Z-H, Fan L-Z, Dong Z, Han Q-L, Liu G-P (2022) False data injection attacks against partial sensor measurements of networked control systems. IEEE Trans Circuits Syst II Express Briefs 69(1):149–153
Peng Z (2010) Industrial control networks, Advanced Industrial Control Technology. William Andrew Publishing
Rocco CM, Barker K, Moronta J (2022) Determining the best algorithm to detect community structures in networks: application to power systems. Environ Syst Decis 42(2):251–264
Rossi RA, Ahmed NK (2015) The Network Data Repository with Interactive Graph Analytics and Visualization. AAAI. https://doi.org/10.1609/aaai.v29i1.9277
Sun H., Zhou W. and Fei. M. 2020. A Survey On Graph Matching In Computer Vision, 13th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI), Chengdu, China, pp. 225-230.
Sussman D, Qiao Z (2022) iGraphMatch: tools for graph matching. R Package Version 2:1
Vijayshankar S, Chang CH, Utkarsh K, Wald D, Ding F, Balamurugan SP, King J, Macwan R (2023) Assessing the impact of cybersecurity attacks on energy systems. Appl Energy 345:121297
Wang Q, Tai W, Tang Y, Ni M (2019) Review of the false data injection attack against the cyber-physical power system. IET Cyber-Phys Syst Theory App 4(2):101–107
Yan J, Yin XC, Lin W, Deng C, Zha H, Yang X (2016). A short survey of recent advances in graph matching. In: Proc. of the 2016 ACM on international conference on multimedia retrieval, June 2016. ACM, pp 167–174
Zhou Y, Cisneros-Saldana J, Xie L (2018) False Analog Data Injection Attack Towards Topology Errors: Formulation and Feasibility Analysis. In: Zhou Y et al (eds) IEEE Power & Energy Society General Meeting (PESGM). IEEE
Zhu S, Setia S, Jajodia S, Ning P (2007) Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. ACM Trans Sensor Netw 3(3):14
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interests
The authors declare that they have no competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Rocco, C.M., Moronta, J. & Barker, K. Topology change detection in networks due to false data injections: a priori assessment based on graph matching techniques. Life Cycle Reliab Saf Eng (2024). https://doi.org/10.1007/s41872-024-00247-9
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s41872-024-00247-9