Modeling and assessing load redistribution attacks considering cyber vulnerabilities in power systems

被引:0
|
作者
Shi, Xingyu [1 ]
Guo, Huan [1 ]
Wang, Weiyu [1 ]
Yin, Banghuang [1 ]
Cao, Yijia [1 ]
机构
[1] Changsha Univ Sci & Technol, Sch Elect & Informat Engn, Changsha, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
cyber-physical systems; false data injection attacks; load redistribution attack; Bayesian attack graph model; mean time to compromise; bi-level model; common vulnerability scoring system; FALSE DATA INJECTION; RELIABILITY; DEFENSE;
D O I
10.3389/fenrg.2023.1242047
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
Introduction: Load Redistribution (LR) attacks, as a common form of false data injection attack, have emerged as a significant cybersecurity threat to power system operations by manipulating load buses' measurements at substations. Existing LR attack methods typically assume that any substation can be equally attacked, contributing to the analysis of LR attacks in power systems. However, the diversity of cyber vulnerabilities in substation communication links implies varying costs associated with falsifying load buses' measurements. Thus, quantitatively evaluating these costs and analyzing the impact of LR attacks on power systems within cost constraints holds practical significance.Methods: In this paper, we employ a Bayesian attack graph model to characterize the intrusion process through cyber vulnerabilities. The costs of falsifying load buses' measurements at substations are quantitatively evaluated using the mean time-to-compromise model. Subsequently, from the attacker's perspective, we propose a bi-level optimization model for LR attacks, considering the mean time to compromise in conjunction with limited attack resources and power flow constraints.Results: Simulations conducted on the IEEE 14-bus system illustrate the influence of cyber vulnerabilities on LR attacks within power systems. Furthermore, we verify that the attack scenario of the existing LR attack model aligns with a case of the proposed bi-level LR attack model when there is sufficient attack time to compromise all communication links.Discussion: The findings of this research demonstrate that the impact of cyber vulnerabilities on LR attacks can be quantified by assessing the attack costs. Effective management of LR attacks can be achieved under cost constraints through optimization methods. These insights contribute to enhancing network security strategies for power systems, mitigating potential threats posed by LR attacks in power system operations.
引用
收藏
页数:11
相关论文
共 50 条
  • [41] Modeling and detection of cyber attacks on discrete event systems
    Fritz, Raphael
    Zhang, Ping
    IFAC PAPERSONLINE, 2018, 51 (07): : 285 - 290
  • [42] Modeling cyber-attacks on Industrial Control Systems
    Paliath, Vivin
    Shakarian, Paulo
    IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: CYBERSECURITY AND BIG DATA, 2016, : 316 - 318
  • [43] Analysis of cascading failures of power cyber-physical systems considering false data injection attacks
    Li, Jian
    Sun, Chaowei
    Su, Qingyu
    GLOBAL ENERGY INTERCONNECTION-CHINA, 2021, 4 (02): : 204 - 213
  • [44] Security Risk Assessment Approach for Distribution Network Cyber Physical Systems Considering Cyber Attack Vulnerabilities
    Zhou, Buxiang
    Sun, Binjie
    Zang, Tianlei
    Cai, Yating
    Wu, Jiale
    Luo, Huan
    ENTROPY, 2023, 25 (01)
  • [45] Analysis of cascading failures of power cyber-physical systems considering false data injection attacks
    Jian Li
    Chaowei Sun
    Qingyu Su
    Global Energy Interconnection, 2021, 4 (02) : 204 - 213
  • [46] Likelihood of Cyber Data Injection Attacks to Power Systems
    Hao, Yingshuai
    Wang, Meng
    Chow, Joe
    2015 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP), 2015, : 657 - 661
  • [47] Cyber-physical attacks on power distribution systems
    Ayad, Abdelrahman
    Farag, Hany
    Youssef, Amr
    El-Saadany, Ehab
    IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2020, 5 (02) : 218 - 225
  • [48] On modeling of electrical cyber-physical systems considering cyber security
    Yi-nan WANG
    Zhi-yun LIN
    Xiao LIANG
    Wen-yuan XU
    Qiang YANG
    Gang-feng YAN
    Frontiers of Information Technology & Electronic Engineering, 2016, 17 (05) : 465 - 478
  • [49] On modeling of electrical cyber-physical systems considering cyber security
    Wang, Yi-nan
    Lin, Zhi-yun
    Liang, Xiao
    Xu, Wen-yuan
    Yang, Qiang
    Yan, Gang-feng
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2016, 17 (05) : 465 - 478
  • [50] On modeling of electrical cyber-physical systems considering cyber security
    Yi-nan Wang
    Zhi-yun Lin
    Xiao Liang
    Wen-yuan Xu
    Qiang Yang
    Gang-feng Yan
    Frontiers of Information Technology & Electronic Engineering, 2016, 17 : 465 - 478