Defensive Resource Allocation Method for Improving Survivability of Communication and Information System in CPPS Against Cyber-attacks

被引:0
|
作者
Wu, Yingjun [1 ,2 ,3 ]
Xu, Hao [2 ,3 ]
Ni, Ming [4 ]
机构
[1] Hohai Univ, Coll Energy & Elect Engn, Nanjing, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Coll Automat, Nanjing, Peoples R China
[3] Nanjing Univ Posts & Telecommun, Coll Artificial Intelligence, Nanjing, Peoples R China
[4] NARI Grp Corp, State Grid Elect Power Res Inst, Nanjing, Peoples R China
关键词
Cyber-physical power system (CPPS); cyber-attacks; survivability evaluation; communication and information system; defensive resource; DATA INJECTION ATTACKS;
D O I
10.35833/mpce.2019.000148
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the widespread use of communication and information technology, power system has been evolving into cyber-physical power system (CPPS) and becoming more vulnerable to cyber-attacks. Therefore, it is necessary to enhance the ability of the communication and information system in CPPS to defend against cyber-attacks. This paper proposes a method to enhance the survivability of the communication and information system in CPPS. Firstly, the communication and information system for critical business of power system is decomposed into certain types of atomic services, and then the survivability evaluation indexes and their corresponding calculation method for the communication and information system are proposed. Secondly, considering the efficacy and cost defensive resources, a defensive resource allocation model is proposed to maximize the survivability of communication and information system in CPPS. Then, a modified genetic algorithm is adopted to solve the proposed model. Finally, the simulation results of CPPS for an IEEE 30-node system verify the proposed method.
引用
收藏
页码:750 / 759
页数:10
相关论文
共 42 条
  • [1] Defensive Resource Allocation Method for Improving Survivability of Communication and Information System in CPPS Against Cyber-attacks
    Yingjun Wu
    Hao Xu
    Ming Ni
    Journal of Modern Power Systems and Clean Energy, 2020, 8 (04) : 750 - 759
  • [2] Robust Substation Enhancement Strategy for Allocating the Defensive Resource Against the Cyber-Attacks on IEDs
    Zhao, Yirui
    Cao, Yijia
    Li, Yong
    Li, Zhiyi
    Yao, Wenxuan
    Shi, Xingyu
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (03) : 3539 - 3550
  • [3] Optimal defense resource allocation against cyber-attacks in distributed generation systems
    Mo, Huadong
    Xiao, Xun
    Sansavini, Giovanni
    Dong, Daoyi
    PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PART O-JOURNAL OF RISK AND RELIABILITY, 2024, 238 (06) : 1302 - 1329
  • [4] Research on Power Communication Network Planning Based on Information Transmission Reachability Against Cyber-Attacks
    Wu, Yingjun
    Chen, Jinfan
    Ru, Yingtao
    Xu, Hao
    Roger, Mbonyineza
    Ni, Ming
    IEEE SYSTEMS JOURNAL, 2021, 15 (02): : 2883 - 2894
  • [5] The impact of educational training on improving the vigilance of public officials against cyber-attacks
    Hulaj, Astrit
    Dreshaj, Artan
    ONLINE JOURNAL OF COMMUNICATION AND MEDIA TECHNOLOGIES, 2023, 13 (04):
  • [6] Safety securing approach against cyber-attacks for process control system
    Hashimoto, Yoshihiro
    Toyoshima, Takeshi
    Yogo, Shuichi
    Koike, Masato
    Hamaguchi, Takashi
    Jing, Sun
    Koshijima, Ichiro
    COMPUTERS & CHEMICAL ENGINEERING, 2013, 57 : 181 - 186
  • [7] Economic Information Warfare: Classifying Cyber-Attacks Against Commodity Value Chains
    van Niekerk, Brett
    PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2019), 2019, : 448 - 456
  • [8] Cyber-Physical Power System (CPPS) Reliability Assessment Considering Cyber Attacks against Monitoring Functions
    Guo, Jia
    Wang, Yifei
    Guo, Chuangxin
    Dong, Shufeng
    Wen, Baijian
    2016 IEEE POWER AND ENERGY SOCIETY GENERAL MEETING (PESGM), 2016,
  • [9] Detecting Cyber-Attacks Against Cyber-Physical Manufacturing System: A Machining Process Invariant Approach
    Li, Zedong
    Chen, Xin
    Chen, Yuqi
    Li, Shijie
    Wang, Hangyu
    Lv, Shichao
    Sun, Limin
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (10): : 17602 - 17614
  • [10] RETRACTED: The real world evaluation of cyber-attacks against ICS system (Retracted Article)
    Wilhoit, Kyle
    Hara, Seiki
    2015 54TH ANNUAL CONFERENCE OF THE SOCIETY OF INSTRUMENT AND CONTROL ENGINEERS OF JAPAN (SICE), 2015, : 977 - 979