A Review on Research of Cyber-attacks and Defense in Cyber Physical Power Systems Part Two Detection and Protection

被引:0
|
作者
Tang Y. [1 ]
Li M. [1 ]
Wang Q. [1 ]
Ni M. [2 ,3 ,4 ]
机构
[1] School of Electrical Engineering, Southeast University, Nanjing
[2] NARI Group Corporation, State Grid Electric Power Research Institute, Nanjing
[3] NARI Technology Co. Ltd., Nanjing
[4] State Key Laboratory of Smart Grid Protection and Control, Nanjing
基金
中国国家自然科学基金;
关键词
Attack detection; Cyber physical power system; Cyber-attack; Defense and protection;
D O I
10.7500/AEPS20180906007
中图分类号
学科分类号
摘要
Following the previous paper in the series, this paper provides a review of existing research methods on the sub-topics of attack detection and defense strategy. The purposes and natures of research work of the sub-topics are concluded, and the deficiencies of existing researches are described considering the characteristics of cyber physical power system (CPPS). In terms of attack detection, some methods are proposed based on deviation and feature, which are implemented in cyber and physical sides in CPPS. In terms of protection, existing researches are concluded as the protection methods deployed on cyber side which are mainly reactive protection measures, and the protection methods deployed on physical sides which are mainly based on the ideas of redundant resources and corrective control. On the basis of existing research, the key techniques in CPPS cyber-attack detection and defense are drawn, and future research proposals in these fields are made in accordance with research perspective of modeling, in order to improve the real ability of CPPS to defend itself against cyber-attacks. © 2019 Automation of Electric Power Systems Press.
引用
收藏
页码:1 / 9and18
页数:917
相关论文
共 76 条
  • [1] Zhao J., Wen F., Xue Y., Et al., Cyber physical power systems: architecture, implementation techniques and challenges, Automation of Electric Power Systems, 34, 16, pp. 1-7, (2010)
  • [2] Shang W., An P., Wan M., Et al., Research and development overview of intrusion detection technology in industrial control system, Application Research of Computers, 34, 2, pp. 328-333, (2017)
  • [3] Lai Y., Liu Z., Cai X., Et al., Research on intrusion detection of industrial control system, Journal on Communications, 38, 2, pp. 143-156, (2017)
  • [4] Zhou C., Huang S., Xiong N., Et al., Design and analysis of multimodel-based anomaly intrusion detection systems in industrial process automation, IEEE Transactions on Systems, Man, and Cybernetics Systems, 45, 10, pp. 1345-1360, (2015)
  • [5] Sedjelmaci H., Senouci S.M., Taleb T., An accurate security game for low-resource IoT devices, IEEE Transactions on Vehicular Technology, 66, 10, pp. 9381-9393, (2017)
  • [6] Pan S., Morris T., Adhikari U., Developing a hybrid intrusion detection system using data mining for power systems, IEEE Transactions on Smart Grid, 6, 6, pp. 3104-3113, (2015)
  • [7] Handschin E., Schweppe F.C., Kohlas J., Et al., Bad data analysis for power system state estimation, IEEE Transactions on Power Apparatus and Systems, 94, 2, pp. 329-337, (1975)
  • [8] Merrill H.M., Schweppe F.C., Bad data suppression in power system static state estimation, IEEE Transactions on Power Apparatus and Systems, 90, 6, pp. 2718-2725, (1971)
  • [9] Korres G.N., Manousakis N.M., State estimation and bad data processing for systems including PMU and SCADA measurements, Electric Power Systems Research, 81, 7, pp. 1514-1524, (2011)
  • [10] Choi D.H., Xie L., Fully distributed bad data processing for wide area state estimation, 2011 IEEE International Conference on Smart Grid Communications, pp. 546-551, (2011)