Study on attack paths of cyber attack in cyber-physical power systems

被引:30
|
作者
Chen, Lei [1 ,2 ,3 ]
Yue, Dong [1 ,2 ,3 ]
Dou, Chunxia [1 ,2 ,3 ]
Chen, Jianbo [1 ,2 ,3 ]
Cheng, Zihao [2 ,3 ,4 ]
机构
[1] Nanjing Univ Posts & Telecommun, Coll Automat, Nanjing 210023, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Coll Artificial Intelligence, Nanjing 210023, Peoples R China
[3] Nanjing Univ Posts & Telecommun, Inst Adv Technol, Nanjing 210023, Peoples R China
[4] Jiangsu Engn Lab Big Data Anal & Control Act Dist, Nanjing, Peoples R China
关键词
substations; probability; power engineering computing; computer network security; power system security; telecommunication security; power grids; attack types; cyber attack; cyber-physical power systems; advanced information; information and communication technology; attack efficiency; intrude systems; efficient attack paths; actual power grid; security stability control system; physical power grid; communication network; attack model; attack cost matrix; total attack cost; vulnerable attack paths; attack gain; attack targets; CASCADING FAILURES; NETWORKS; IMPACT;
D O I
10.1049/iet-gtd.2019.1330
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
By means of advanced information and communication technology, cyber-physical power systems can attain real-time monitor and control but have to suffer the damage caused by a cyber attack. In this study, the authors' define attack efficiency to evaluate attack paths that attacker may adopt to intrude systems, to find the most efficient attack paths (i.e. the most vulnerable paths). Based on the actual power grid and security stability control system, the coupling model of cyber-physical power systems is established to analyse the propagation of cascading failure within and across the physical power grid and communication network. In the attack model, the attack cost matrix is built to describe the cost between directly connected nodes in a communication network. Furthermore, considering the probability that control commands are successfully transmitted from router nodes to generator/substation nodes, the total attack cost from the communication network to the physical power grid is figured out. To search for the most vulnerable attack paths in systems, the attack efficiency is proposed to quantify the relation between attack cost and attack gain, wherein the attack gain is the damage on systems caused by the cyber attack.
引用
收藏
页码:2352 / 2360
页数:9
相关论文
共 50 条
  • [1] A Hybrid Cyber Attack Model for Cyber-Physical Power Systems
    Tu, Haicheng
    Xia, Yongxiang
    Tse, Chi K.
    Chen, Xi
    IEEE ACCESS, 2020, 8 : 114876 - 114883
  • [2] Cyber attack estimation and detection for cyber-physical power systems
    Li, Lei
    Wang, Wenting
    Ma, Qiang
    Pan, Kunpeng
    Liu, Xin
    Lin, Lin
    Li, Jian
    APPLIED MATHEMATICS AND COMPUTATION, 2021, 400
  • [3] Cyber Protection for Malware Attack Resistance in Cyber-Physical Power Systems
    Xu, Sheng
    Xia, Yongxiang
    Shen, Hui-Liang
    IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 5337 - 5345
  • [4] Cyber-physical attack graphs (CPAGs): Composable and scalable attack graphs for cyber-physical systems
    Barrere, Martin
    Hankin, Chris
    O'Reilly, Dean
    COMPUTERS & SECURITY, 2023, 132
  • [5] Dynamics of cascading failure in cyber-physical power systems from cyber attack
    Chen, Lei
    Guo, Sijia
    Dou, Chunxia
    Ge, Hui
    Cheng, Zihao
    Li, Shengquan
    PHYSICA SCRIPTA, 2024, 99 (03)
  • [6] Electric power cyber-physical systems vulnerability assessment under cyber attack
    Qu, Zhengwei
    Sun, Wenting
    Dong, Jie
    Zhao, Jianjun
    Li, Yang
    FRONTIERS IN ENERGY RESEARCH, 2023, 10
  • [7] Cyber-Attack Detection for Automotive Cyber-Physical Systems
    Lee, Suyun
    Jung, Sunjae
    Baek, Youngmi
    BUILDSYS'21: PROCEEDINGS OF THE 2021 ACM INTERNATIONAL CONFERENCE ON SYSTEMS FOR ENERGY-EFFICIENT BUILT ENVIRONMENTS, 2021, : 214 - 215
  • [8] Cyber-Physical Attack Conduction and Detection in Decentralized Power Systems
    Mohammadpourfard, Mostafa
    Weng, Yang
    Khalili, Abdullah
    Genc, Istemihan
    Shefaei, Alireza
    Mohammadi-Ivatloo, Behnam
    IEEE ACCESS, 2022, 10 : 29277 - 29286
  • [9] Setpoint Attack Detection in Cyber-Physical Systems
    Lucia, Walter
    Gheitasi, Kian
    Ghaderi, Mohsen
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (05) : 2332 - 2338
  • [10] Optimal ε -stealthy attack in cyber-physical systems
    Tu, Weiwei
    Dong, Jiuxiang
    Zhai, Ding
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2021, 358 (01): : 151 - 171