共 156 条
Research on Cyber Attacks and Defensive Measures of Power Communication Network
被引:6
作者:
Wu, Yingjun
[1
]
Ru, Yingtao
[1
]
Lin, Zhiwei
[1
]
Liu, Chengjun
[1
]
Xue, Tao
[1
]
Zhao, Xiang
[1
]
Chen, Jinfan
[1
]
机构:
[1] Hohai Univ, Coll Energy & Elect Engn, Nanjing 211100, Peoples R China
关键词:
Security;
Power measurement;
Power grids;
Indexes;
Power systems;
Data models;
Dispatching;
Cyber attacks;
defensive measures;
power communication network (PCN);
security indexes;
DATA INJECTION ATTACKS;
LOAD REDISTRIBUTION ATTACKS;
PHYSICAL SYSTEMS;
STATE ESTIMATION;
VULNERABILITY ASSESSMENT;
ALTERING ATTACKS;
SECURITY THREATS;
DATA AGGREGATION;
FAULT-TOLERANCE;
SERVICE ATTACKS;
D O I:
10.1109/JIOT.2022.3181698
中图分类号:
TP [自动化技术、计算机技术];
学科分类号:
0812 ;
摘要:
With the wide application of information and communication technologies, a great number of cyber vulnerabilities threaten the security and stability of the power system. Therefore, this article analyzed the intrusion paths, the invasion mechanisms, and the possible consequences of most potential attacks in power communication networks (PCNs); a method for classifying and evaluating defense measures considering security indexes is also proposed. First, the typical structure and hierarchy of PCNs are sorted out. Second, we study the potential cyber attacks that may occur against PCNs and classify them into hot-spot attacks and nonhot-spot attacks based on academic research and statistical analysis of historical cyber attacks. Then, the potential target devices, propagation paths, and possible consequences to PCNs are analyzed in detail for different cyber attacks. Third, a security index system to assess the resistibility, recognizability, and recoverability of different defense measures is proposed. Based on the capability of different measures against cyber attacks, the defensive measures are classified into resistibility enhancement measures, recognizability enhancement measures, and recoverability enhancement measures. Accordingly, the mechanisms of different defense measures are analyzed. After that, the effectiveness of each defense measure is evaluated based on the degree of correlation between the defense measure and the security indexes.
引用
收藏
页码:7613 / 7635
页数:23
相关论文