Modeling and assessing load redistribution attacks considering cyber vulnerabilities in power systems

被引:0
|
作者
Shi, Xingyu [1 ]
Guo, Huan [1 ]
Wang, Weiyu [1 ]
Yin, Banghuang [1 ]
Cao, Yijia [1 ]
机构
[1] Changsha Univ Sci & Technol, Sch Elect & Informat Engn, Changsha, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
cyber-physical systems; false data injection attacks; load redistribution attack; Bayesian attack graph model; mean time to compromise; bi-level model; common vulnerability scoring system; FALSE DATA INJECTION; RELIABILITY; DEFENSE;
D O I
10.3389/fenrg.2023.1242047
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
Introduction: Load Redistribution (LR) attacks, as a common form of false data injection attack, have emerged as a significant cybersecurity threat to power system operations by manipulating load buses' measurements at substations. Existing LR attack methods typically assume that any substation can be equally attacked, contributing to the analysis of LR attacks in power systems. However, the diversity of cyber vulnerabilities in substation communication links implies varying costs associated with falsifying load buses' measurements. Thus, quantitatively evaluating these costs and analyzing the impact of LR attacks on power systems within cost constraints holds practical significance.Methods: In this paper, we employ a Bayesian attack graph model to characterize the intrusion process through cyber vulnerabilities. The costs of falsifying load buses' measurements at substations are quantitatively evaluated using the mean time-to-compromise model. Subsequently, from the attacker's perspective, we propose a bi-level optimization model for LR attacks, considering the mean time to compromise in conjunction with limited attack resources and power flow constraints.Results: Simulations conducted on the IEEE 14-bus system illustrate the influence of cyber vulnerabilities on LR attacks within power systems. Furthermore, we verify that the attack scenario of the existing LR attack model aligns with a case of the proposed bi-level LR attack model when there is sufficient attack time to compromise all communication links.Discussion: The findings of this research demonstrate that the impact of cyber vulnerabilities on LR attacks can be quantified by assessing the attack costs. Effective management of LR attacks can be achieved under cost constraints through optimization methods. These insights contribute to enhancing network security strategies for power systems, mitigating potential threats posed by LR attacks in power system operations.
引用
收藏
页数:11
相关论文
共 50 条
  • [21] VULNERABILITIES OF CYBER-PHYSICAL LINEAR CONTROL SYSTEMS TO SOPHISTICATED ATTACKS
    Radisavljevic-Gajic, Verica
    Park, Seri
    Chasaki, Danai
    PROCEEDINGS OF THE ASME 10TH ANNUAL DYNAMIC SYSTEMS AND CONTROL CONFERENCE, 2017, VOL 2, 2017,
  • [22] Cyber Attacks and Vulnerabilities Assessment for Unmanned Aerial Vehicles Communication Systems
    Hadi, Hassan Jalil
    Cao, Yue
    Proceedings - 2022 International Conference on Frontiers of Information Technology, FIT 2022, 2022, : 213 - 218
  • [23] Resilience Evaluation of Cyber-Physical Power System Considering Cyber Attacks
    Kong, Xiangxing
    Lu, Zhigang
    Guo, Xiaoqiang
    Zhang, Jiangfeng
    Li, Huifeng
    IEEE TRANSACTIONS ON RELIABILITY, 2024, 73 (01) : 245 - 256
  • [24] Adequacy evaluation of electric power grids considering substation cyber vulnerabilities
    Xiang, Yingmeng
    Wang, Lingfeng
    Zhang, Yichi
    INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2018, 96 : 368 - 379
  • [25] Evolution of Load Redistribution Attack in Cyber Physical Power System
    Haridas, Rohini
    Sharma, Satish
    Bhakar, Rohit
    Mathuria, Parul
    2023 IEEE PES CONFERENCE ON INNOVATIVE SMART GRID TECHNOLOGIES, ISGT MIDDLE EAST, 2023,
  • [26] Assessing the Vulnerabilities of Internet Users to Cyber-Attacks using their Password Login Patterns
    Egwuche, Ojonukpe S.
    Ganiyu, Mutiu
    Akeem, Abiona A.
    2022 IEEE NIGERIA 4TH INTERNATIONAL CONFERENCE ON DISRUPTIVE TECHNOLOGIES FOR SUSTAINABLE DEVELOPMENT (IEEE NIGERCON), 2022, : 279 - 282
  • [27] ASSESSING THE IMPACT OF CYBER ATTACKS ON INTERDEPENDENT PHYSICAL SYSTEMS
    Di Pietro, Antonio
    Foglietta, Chiara
    Palmieri, Simone
    Panzieri, Stefano
    CRITICAL INFRASTRUCTURE PROTECTION VII, 2013, 417 : 215 - 227
  • [28] Reliability Analysis of Cyber-Physical Systems Considering Cyber-Attacks
    Fang, Z. H.
    Mo, H. D.
    Wang, Y.
    2017 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM), 2017, : 364 - 368
  • [29] Robustness of Power Systems in the Context of Cyber Attacks
    Dogaru, Delia Ioana
    Dumitrache, Joan
    2017 21ST INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE (CSCS), 2017, : 506 - 512
  • [30] Pattern Analysis of Topological Attacks in Cyber-Physical Power Systems Considering Cascading Outages
    Zhang, Zhimei
    Huang, Shaowei
    Liu, Feng
    Mei, Shengwei
    IEEE ACCESS, 2020, 8 : 134257 - 134267