Research on Cyber Attacks and Defensive Measures of Power Communication Network

被引:6
作者
Wu, Yingjun [1 ]
Ru, Yingtao [1 ]
Lin, Zhiwei [1 ]
Liu, Chengjun [1 ]
Xue, Tao [1 ]
Zhao, Xiang [1 ]
Chen, Jinfan [1 ]
机构
[1] Hohai Univ, Coll Energy & Elect Engn, Nanjing 211100, Peoples R China
关键词
Security; Power measurement; Power grids; Indexes; Power systems; Data models; Dispatching; Cyber attacks; defensive measures; power communication network (PCN); security indexes; DATA INJECTION ATTACKS; LOAD REDISTRIBUTION ATTACKS; PHYSICAL SYSTEMS; STATE ESTIMATION; VULNERABILITY ASSESSMENT; ALTERING ATTACKS; SECURITY THREATS; DATA AGGREGATION; FAULT-TOLERANCE; SERVICE ATTACKS;
D O I
10.1109/JIOT.2022.3181698
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the wide application of information and communication technologies, a great number of cyber vulnerabilities threaten the security and stability of the power system. Therefore, this article analyzed the intrusion paths, the invasion mechanisms, and the possible consequences of most potential attacks in power communication networks (PCNs); a method for classifying and evaluating defense measures considering security indexes is also proposed. First, the typical structure and hierarchy of PCNs are sorted out. Second, we study the potential cyber attacks that may occur against PCNs and classify them into hot-spot attacks and nonhot-spot attacks based on academic research and statistical analysis of historical cyber attacks. Then, the potential target devices, propagation paths, and possible consequences to PCNs are analyzed in detail for different cyber attacks. Third, a security index system to assess the resistibility, recognizability, and recoverability of different defense measures is proposed. Based on the capability of different measures against cyber attacks, the defensive measures are classified into resistibility enhancement measures, recognizability enhancement measures, and recoverability enhancement measures. Accordingly, the mechanisms of different defense measures are analyzed. After that, the effectiveness of each defense measure is evaluated based on the degree of correlation between the defense measure and the security indexes.
引用
收藏
页码:7613 / 7635
页数:23
相关论文
共 156 条
[1]   MARINE: Man-in-the-Middle Attack Resistant Trust Model in Connected Vehicles [J].
Ahmad, Farhan ;
Kurugollu, Fatih ;
Adnane, Asma ;
Hussain, Rasheed ;
Hussain, Fatima .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (04) :3310-3322
[2]   Unsupervised Machine Learning-Based Detection of Covert Data Integrity Assault in Smart Grid Networks Utilizing Isolation Forest [J].
Ahmed, Saeed ;
Lee, YoungDoo ;
Hyun, Seung-Ho ;
Koo, Insoo .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (10) :2765-2777
[3]   Privacy-preserving cloud-based billing with lightweight homomorphic encryption for sensor-enabled smart grid infrastructure [J].
Alabdulatif, Abdulatif ;
Kumarage, Heshan ;
Khalil, Ibrahim ;
Atiquzzaman, Mohammed ;
Yi, Xun .
IET Wireless Sensor Systems, 2017, 7 (06) :182-190
[4]   OCPP Protocol: Security Threats and Challenges [J].
Alcaraz, Cristina ;
Lopez, Javier ;
Wolthusen, Stephen .
IEEE TRANSACTIONS ON SMART GRID, 2017, 8 (05) :2452-2459
[5]   Revisiting Defenses against Large-Scale Online Password Guessing Attacks [J].
Alsaleh, Mansour ;
Mannan, Mohammad ;
van Oorschot, P. C. .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (01) :128-141
[6]   A Systematic Evaluation of Static API-Misuse Detectors [J].
Amann, Sven ;
Hoan Anh Nguyen ;
Nadi, Sarah ;
Nguyen, Tien N. ;
Mezini, Mira .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2019, 45 (12) :1170-1188
[7]   Attack Detection and Identification for Automatic Generation Control Systems [J].
Ameli, Amir ;
Hooshyar, Ali ;
El-Saadany, Ehab F. ;
Youssef, Amr M. .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2018, 33 (05) :4760-4774
[8]   Dynamic Load Altering Attacks Against Power System Stability: Attack Models and Protection Schemes [J].
Amini, Sajjad ;
Pasqualetti, Fabio ;
Mohsenian-Rad, Hamed .
IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (04) :2862-2872
[9]   A Comparative Study of System-Level Energy Management Methods for Fault-Tolerant Hard Real-Time Systems [J].
Aminzadeh, Soheil ;
Ejlali, Alireza .
IEEE TRANSACTIONS ON COMPUTERS, 2011, 60 (09) :1288-1299
[10]   On Jamming Against Wireless Networks [J].
Amuru, SaiDhiraj ;
Dhillon, Harpreet S. ;
Buehrer, R. Michael .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2017, 16 (01) :412-428