Security Threat Modeling for Power Transformers Cyber-Physical Environments

被引:0
|
作者
Ahn, BoHyun [1 ]
Kim, Taesic [1 ]
Smith, Scott C. [1 ]
Youn, Young-Woo [2 ]
Ryu, Myung-Hyo [2 ]
机构
[1] Texas A&M Univ, Dept Elect Engn & Comp Sci, Kingsville, TX 78363 USA
[2] Korea Electrotechnol Res Inst, Adv Power Apparat Res Ctr, Chang Won 51543, South Korea
关键词
Attack modeling; attack Hat; cybersecurity; power transformer diagnosis system; threat modeling;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Due to the efforts of digitization of power grids and integration of online diagnosis systems, today's power transformers have been promoted to deploy seamless contaminations and information technology-, which potentially presents growing threats from cycler-attacks. This paper provides security vulnerabilities and potential threats of power transformers in cyber-physical environments through a security threat modeling methodology. The proposed seem sty threat modeling includes three steps: 1) system identification, 2) threat modeling, 3) and attack modeling. The devised security threat model can identify potential vulnerabilities and threats as well as simulate attack success rate, which will be used to develop device-level defense strategies to protect pon'er transformers from malicious cyber-attacks, ensuring the secure utilization of the cyber physical power transformers in modern power infrastructures.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Threat modeling in cyber-physical systems
    Fernandez, Eduardo B.
    [J]. 2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC, 2016, : 448 - 453
  • [2] Modeling security in cyber-physical systems
    Burmester, Mike
    Magkos, Ernmanouil
    Chrissikopoulos, Vassilis
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2012, 5 (3-4) : 118 - 126
  • [3] Threat Modeling of Cyber-Physical Systems in Practice
    Jamil, Ameerah-Muhsinah
    Ben Othmane, Lotfi
    Valani, Altaz
    [J]. RISKS AND SECURITY OF INTERNET AND SYSTEMS (CRISIS 2021), 2022, 13204 : 3 - 19
  • [4] On Threat Modeling and Mitigation of Medical Cyber-Physical Systems
    Almohri, Hussain
    Cheng, Long
    Yao, Danfeng
    Alemzadeh, Homa
    [J]. 2017 IEEE/ACM SECOND INTERNATIONAL CONFERENCE ON CONNECTED HEALTH - APPLICATIONS, SYSTEMS AND ENGINEERING TECHNOLOGIES (CHASE), 2017, : 114 - 119
  • [5] On modeling of electrical cyber-physical systems considering cyber security
    Wang, Yi-nan
    Lin, Zhi-yun
    Liang, Xiao
    Xu, Wen-yuan
    Yang, Qiang
    Yan, Gang-feng
    [J]. FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2016, 17 (05) : 465 - 478
  • [6] On modeling of electrical cyber-physical systems considering cyber security
    Yi-nan WANG
    Zhi-yun LIN
    Xiao LIANG
    Wen-yuan XU
    Qiang YANG
    Gang-feng YAN
    [J]. Frontiers of Information Technology & Electronic Engineering, 2016, 17 (05) : 465 - 478
  • [7] On modeling of electrical cyber-physical systems considering cyber security
    Yi-nan Wang
    Zhi-yun Lin
    Xiao Liang
    Wen-yuan Xu
    Qiang Yang
    Gang-feng Yan
    [J]. Frontiers of Information Technology & Electronic Engineering, 2016, 17 : 465 - 478
  • [8] Cyber-Physical Power System (CPPS): A Review on Modeling, Simulation, and Analysis With Cyber Security Applications
    Yohanandhan, Rajaa Vikhram
    Elavarasan, Rajvikram Madurai
    Manoharan, Premkumar
    Mihet-Popa, Lucian
    [J]. IEEE ACCESS, 2020, 8 : 151019 - 151064
  • [9] Fundamental Challenges of Cyber-Physical Systems Security Modeling
    Bakirtzis, Georgios
    Ward, Garrett L.
    Deloglos, Christopher J.
    Elks, Carl R.
    Horowitz, Barry M.
    Fleming, Cody H.
    [J]. 2020 50TH ANNUAL IEEE-IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS-SUPPLEMENTAL VOLUME (DSN-S), 2020, : 33 - 36
  • [10] A Method for Modeling and Evaluation of the Security of Cyber-Physical Systems
    Orojloo, Hamed
    Azgomi, Mohammad Abdollahi
    [J]. 2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 131 - 136