About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Tools for Design, Implementation and Verification of Emerging Information Technologies. 17th EAI International Conference, TridentCom 2022, Melbourne, Australia, November 23-25, 2022, Proceedings

Research Article

A GAN-Based Real-Time Covert Energy Theft Attack Against Data-Driven Detectors

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-33458-0_4,
        author={Zhinan Ding and Feng Wu and Lei Cui and Xiao Hu and Gang Xie},
        title={A GAN-Based Real-Time Covert Energy Theft Attack Against Data-Driven Detectors},
        proceedings={Tools for Design, Implementation and Verification of Emerging Information Technologies. 17th EAI International Conference, TridentCom 2022, Melbourne, Australia, November 23-25, 2022, Proceedings},
        proceedings_a={TRIDENTCOM},
        year={2023},
        month={6},
        keywords={Smart grid Energy theft detection CGAN Covert attack Feature extractor Deep learning vulnerability},
        doi={10.1007/978-3-031-33458-0_4}
    }
    
  • Zhinan Ding
    Feng Wu
    Lei Cui
    Xiao Hu
    Gang Xie
    Year: 2023
    A GAN-Based Real-Time Covert Energy Theft Attack Against Data-Driven Detectors
    TRIDENTCOM
    Springer
    DOI: 10.1007/978-3-031-33458-0_4
Zhinan Ding1, Feng Wu2, Lei Cui1,*, Xiao Hu1, Gang Xie1
  • 1: Taiyuan University of Science and Technology
  • 2: Yunnan University
*Contact email: leicui@tyust.edu.cn

Abstract

The advanced metering infrastructure (AMI) system has been rapidly established around the world, effectively improving the communication capability of the power system. Problematically, it turns out malicious users can easily commit energy theft by tampering with smart meters. Thus, many data-driven methods have been proposed to detect energy theft in AMI. However, existing detection schemes lack consideration for well-planned covert attacks, making them vulnerable. This paper proposes a real-time covert attack model based on conditional generative adversarial network (CGAN). In particular, based on the transferability of adversarial samples, we first extract the data features that the malicious detection model focuses on during the detection process. Then, we utilize these extracted features and a generator to generate adversarial perturbations that can mislead malicious detection models. Finally, to make the generated perturbations more stealthy, a discriminator is used to simulate malicious detection models to correct them. Extensive experiments demonstrate that our proposed attack method can evade most current detection methods.

Keywords
Smart grid Energy theft detection CGAN Covert attack Feature extractor Deep learning vulnerability
Published
2023-06-17
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-33458-0_4
Copyright © 2022–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL