Modeling and assessing load redistribution attacks considering cyber vulnerabilities in power systems

被引:0
|
作者
Shi, Xingyu [1 ]
Guo, Huan [1 ]
Wang, Weiyu [1 ]
Yin, Banghuang [1 ]
Cao, Yijia [1 ]
机构
[1] Changsha Univ Sci & Technol, Sch Elect & Informat Engn, Changsha, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
cyber-physical systems; false data injection attacks; load redistribution attack; Bayesian attack graph model; mean time to compromise; bi-level model; common vulnerability scoring system; FALSE DATA INJECTION; RELIABILITY; DEFENSE;
D O I
10.3389/fenrg.2023.1242047
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
Introduction: Load Redistribution (LR) attacks, as a common form of false data injection attack, have emerged as a significant cybersecurity threat to power system operations by manipulating load buses' measurements at substations. Existing LR attack methods typically assume that any substation can be equally attacked, contributing to the analysis of LR attacks in power systems. However, the diversity of cyber vulnerabilities in substation communication links implies varying costs associated with falsifying load buses' measurements. Thus, quantitatively evaluating these costs and analyzing the impact of LR attacks on power systems within cost constraints holds practical significance.Methods: In this paper, we employ a Bayesian attack graph model to characterize the intrusion process through cyber vulnerabilities. The costs of falsifying load buses' measurements at substations are quantitatively evaluated using the mean time-to-compromise model. Subsequently, from the attacker's perspective, we propose a bi-level optimization model for LR attacks, considering the mean time to compromise in conjunction with limited attack resources and power flow constraints.Results: Simulations conducted on the IEEE 14-bus system illustrate the influence of cyber vulnerabilities on LR attacks within power systems. Furthermore, we verify that the attack scenario of the existing LR attack model aligns with a case of the proposed bi-level LR attack model when there is sufficient attack time to compromise all communication links.Discussion: The findings of this research demonstrate that the impact of cyber vulnerabilities on LR attacks can be quantified by assessing the attack costs. Effective management of LR attacks can be achieved under cost constraints through optimization methods. These insights contribute to enhancing network security strategies for power systems, mitigating potential threats posed by LR attacks in power system operations.
引用
收藏
页数:11
相关论文
共 50 条
  • [31] An Efficient Method for Available Transfer Capability Calculation Considering Cyber-Attacks in Power Systems
    Eidiani, Mostafa
    Zeynal, Hossein
    Zakaria, Zuhaina
    2023 IEEE 3RD INTERNATIONAL CONFERENCE IN POWER ENGINEERING APPLICATIONS, ICPEA, 2023, : 127 - 130
  • [32] A mechanism to detect load redistribution attacks in interdependent gas and power systems based on deep learning
    Song, Leizhen
    Lin, Danfeng
    Liu, Yanan
    MULTISCALE AND MULTIDISCIPLINARY MODELING EXPERIMENTS AND DESIGN, 2024, 7 (02) : 947 - 960
  • [33] Probabilistic Defense and Impact of Generator Ramp Constraints Induced Load Redistribution Attacks in Power Systems
    Sravanthi K.C.
    Kotapuri M.R.
    Journal of Engineering Science and Technology Review, 2021, 14 (03) : 124 - 139
  • [34] A mechanism to detect load redistribution attacks in interdependent gas and power systems based on deep learning
    Leizhen Song
    Danfeng Lin
    Yanan Liu
    Multiscale and Multidisciplinary Modeling, Experiments and Design, 2024, 7 : 947 - 960
  • [35] Web Systems Availability Assessment Considering Attacks on Service Configuration Vulnerabilities
    Kharchenko, Vyacheslav
    Abdul-Hadi, Alaa Mohammed
    Boyarchuk, Artem
    Ponochovny, Yurij
    PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON DEPENDABILITY AND COMPLEX SYSTEMS DEPCOS-RELCOMEX, 2014, 286 : 275 - 284
  • [36] Modeling Power Systems Vulnerability under Targeted Attacks considering Hidden Failures
    Albarakati, Aiman
    IEEE SOUTHEASTCON 2020, 2020,
  • [37] A Methodology for Composite Load Modeling in Power Systems Considering Distributed Generation
    Rodriguez-Garcia, L.
    Perez-Londono, S.
    Mora-Florez, J.
    2012 SIXTH IEEE/PES TRANSMISSION AND DISTRIBUTION: LATIN AMERICA CONFERENCE AND EXPOSITION (T&D-LA), 2012,
  • [38] Novel Detection Scheme Design Considering Cyber Attacks on Load Frequency Control
    Chen, Chunyu
    Zhang, Kaifeng
    Yuan, Kun
    Zhu, Lingzhi
    Qian, Minhui
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (05) : 1932 - 1941
  • [39] Assessing Vulnerabilities and IoT-Enabled Attacks on Smart Lighting Systems
    Stellios, Ioannis
    Mokos, Kostas
    Kotzanikolaou, Panayiotis
    COMPUTER SECURITY: ESORICS 2021 INTERNATIONAL WORKSHOPS, 2022, 13106 : 199 - 217
  • [40] Modeling and Simulation of Attacks on Cyber-physical Systems
    Bernardeschi, Cinzia
    Domenici, Andrea
    Palmieri, Maurizio
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2019, : 700 - 708