Study on attack paths of cyber attack in cyber-physical power systems

被引:30
|
作者
Chen, Lei [1 ,2 ,3 ]
Yue, Dong [1 ,2 ,3 ]
Dou, Chunxia [1 ,2 ,3 ]
Chen, Jianbo [1 ,2 ,3 ]
Cheng, Zihao [2 ,3 ,4 ]
机构
[1] Nanjing Univ Posts & Telecommun, Coll Automat, Nanjing 210023, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Coll Artificial Intelligence, Nanjing 210023, Peoples R China
[3] Nanjing Univ Posts & Telecommun, Inst Adv Technol, Nanjing 210023, Peoples R China
[4] Jiangsu Engn Lab Big Data Anal & Control Act Dist, Nanjing, Peoples R China
关键词
substations; probability; power engineering computing; computer network security; power system security; telecommunication security; power grids; attack types; cyber attack; cyber-physical power systems; advanced information; information and communication technology; attack efficiency; intrude systems; efficient attack paths; actual power grid; security stability control system; physical power grid; communication network; attack model; attack cost matrix; total attack cost; vulnerable attack paths; attack gain; attack targets; CASCADING FAILURES; NETWORKS; IMPACT;
D O I
10.1049/iet-gtd.2019.1330
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
By means of advanced information and communication technology, cyber-physical power systems can attain real-time monitor and control but have to suffer the damage caused by a cyber attack. In this study, the authors' define attack efficiency to evaluate attack paths that attacker may adopt to intrude systems, to find the most efficient attack paths (i.e. the most vulnerable paths). Based on the actual power grid and security stability control system, the coupling model of cyber-physical power systems is established to analyse the propagation of cascading failure within and across the physical power grid and communication network. In the attack model, the attack cost matrix is built to describe the cost between directly connected nodes in a communication network. Furthermore, considering the probability that control commands are successfully transmitted from router nodes to generator/substation nodes, the total attack cost from the communication network to the physical power grid is figured out. To search for the most vulnerable attack paths in systems, the attack efficiency is proposed to quantify the relation between attack cost and attack gain, wherein the attack gain is the damage on systems caused by the cyber attack.
引用
收藏
页码:2352 / 2360
页数:9
相关论文
共 50 条
  • [21] A Stealthy Sensor Attack for Uncertain Cyber-Physical Systems
    Jeon, Heegyun
    Eun, Yongsoon
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (04) : 6345 - 6352
  • [22] Attack Detection for Cyber-Physical Systems: A Zonotopic Approach
    Li, Jitao
    Wang, Zhenhua
    Shen, Yi
    Xie, Lihua
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2023, 68 (11) : 6828 - 6835
  • [23] Fast Attack Recovery for Stochastic Cyber-Physical Systems
    Zhang, Lin
    Burbano, Luis
    Chen, Xin
    Cardenas, Alvaro A.
    Drager, Steven
    Anderson, Matthew
    Kong, Fanxin
    2024 IEEE 30TH REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM, RTAS 2024, 2023, : 280 - 293
  • [24] Cyber-physical attack and the future energy systems: A review
    Diaba, Sayawu Yakubu
    Shafie-khah, Miadrezah
    Elmusrati, Mohammed
    ENERGY REPORTS, 2024, 12 : 2914 - 2932
  • [25] On the Performance Analysis of Reset Attack in Cyber-Physical Systems
    Ni, Yuqing
    Guo, Ziyang
    Mo, Yilin
    Shi, Ling
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2020, 65 (01) : 419 - 425
  • [26] ROBUST FILTERING OF DISTRIBUTED CYBER-PHYSICAL SYSTEMS WITH CYBER-ATTACK DETECTION
    Wang, Hongwei
    Zheng, Xi
    2024 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING WORKSHOPS, ICASSPW 2024, 2024, : 294 - 298
  • [27] Hybrid Robust Controller Design: Cyber Attack Attenuation for Cyber-Physical Systems
    Kwon, Cheolhyeon
    Hwang, Inseok
    2013 IEEE 52ND ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2013, : 188 - 193
  • [28] Optimal Attack against Cyber-Physical Control Systems with Reactive Attack Mitigation
    Lakshminarayana, Subhash
    Teng, Teo Zhan
    Yau, David K. Y.
    Tan, Rui
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON FUTURE ENERGY SYSTEMS (E-ENERGY'17), 2017, : 179 - 190
  • [29] Bad Data Injection Attack Propagation in Cyber-Physical Power Delivery Systems
    Chukwuka, Victor
    Chen, Yu-Cheng
    Grijalva, Santiago
    Mooney, Vincent
    2018 CLEMSON UNIVERSITY POWER SYSTEMS CONFERENCE (PSC), 2018,
  • [30] Adaptive cyber-physical system attack detection and reconstruction with application to power systems
    Ao, Wei
    Song, Yongdong
    Wen, Changyun
    IET CONTROL THEORY AND APPLICATIONS, 2016, 10 (12): : 1458 - 1468