|国家预印本平台
首页|Residual-Evasive Attacks on ADMM in Distributed Optimization

Residual-Evasive Attacks on ADMM in Distributed Optimization

Residual-Evasive Attacks on ADMM in Distributed Optimization

来源:Arxiv_logoArxiv
英文摘要

This paper presents two attack strategies designed to evade detection in ADMM-based systems by preventing significant changes to the residual during the attacked iteration. While many detection algorithms focus on identifying false data injection through residual changes, we show that our attacks remain undetected by keeping the residual largely unchanged. The first strategy uses a random starting point combined with Gram-Schmidt orthogonalization to ensure stealth, with potential for refinement by enhancing the orthogonal component to increase system disruption. The second strategy builds on the first, targeting financial gains by manipulating reactive power and pushing the system to its upper voltage limit, exploiting operational constraints. The effectiveness of the proposed attack-resilient mechanism is demonstrated through case studies on the IEEE 14-bus system. A comparison of the two strategies, along with commonly used naive attacks, reveals trade-offs between simplicity, detectability, and effectiveness, providing insights into ADMM system vulnerabilities. These findings underscore the need for more robust monitoring algorithms to protect against advanced attack strategies.

Sabrina Bruckmeier、Huadong Mo、James Qin

输配电工程自动化技术、自动化技术设备

Sabrina Bruckmeier,Huadong Mo,James Qin.Residual-Evasive Attacks on ADMM in Distributed Optimization[EB/OL].(2025-04-22)[2025-06-12].https://arxiv.org/abs/2504.18570.点此复制

评论