Research on Cyber Attacks and Defensive Measures of Power Communication Network

被引:6
作者
Wu, Yingjun [1 ]
Ru, Yingtao [1 ]
Lin, Zhiwei [1 ]
Liu, Chengjun [1 ]
Xue, Tao [1 ]
Zhao, Xiang [1 ]
Chen, Jinfan [1 ]
机构
[1] Hohai Univ, Coll Energy & Elect Engn, Nanjing 211100, Peoples R China
关键词
Security; Power measurement; Power grids; Indexes; Power systems; Data models; Dispatching; Cyber attacks; defensive measures; power communication network (PCN); security indexes; DATA INJECTION ATTACKS; LOAD REDISTRIBUTION ATTACKS; PHYSICAL SYSTEMS; STATE ESTIMATION; VULNERABILITY ASSESSMENT; ALTERING ATTACKS; SECURITY THREATS; DATA AGGREGATION; FAULT-TOLERANCE; SERVICE ATTACKS;
D O I
10.1109/JIOT.2022.3181698
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the wide application of information and communication technologies, a great number of cyber vulnerabilities threaten the security and stability of the power system. Therefore, this article analyzed the intrusion paths, the invasion mechanisms, and the possible consequences of most potential attacks in power communication networks (PCNs); a method for classifying and evaluating defense measures considering security indexes is also proposed. First, the typical structure and hierarchy of PCNs are sorted out. Second, we study the potential cyber attacks that may occur against PCNs and classify them into hot-spot attacks and nonhot-spot attacks based on academic research and statistical analysis of historical cyber attacks. Then, the potential target devices, propagation paths, and possible consequences to PCNs are analyzed in detail for different cyber attacks. Third, a security index system to assess the resistibility, recognizability, and recoverability of different defense measures is proposed. Based on the capability of different measures against cyber attacks, the defensive measures are classified into resistibility enhancement measures, recognizability enhancement measures, and recoverability enhancement measures. Accordingly, the mechanisms of different defense measures are analyzed. After that, the effectiveness of each defense measure is evaluated based on the degree of correlation between the defense measure and the security indexes.
引用
收藏
页码:7613 / 7635
页数:23
相关论文
共 156 条
[11]  
[Anonymous], 2012, P INT C SUST POW GEN
[12]  
Ao Shan, 2011, 2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC 2011), P6108, DOI 10.1109/AIMSEC.2011.6011436
[13]   Reliability Evaluation of Power Grids Considering Integrity Attacks Against Substation Protective IEDs [J].
Bahrami, Mahdi ;
Fotuhi-Firuzabad, Mahmud ;
Farzin, Hossein .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (02) :1035-1044
[14]   A New Differentially Private Data Aggregation With Fault Tolerance for Smart Grid Communications [J].
Bao, Haiyong ;
Lu, Rongxing .
IEEE INTERNET OF THINGS JOURNAL, 2015, 2 (03) :248-258
[15]   Remote Detection and Identification of Illegal Consumers in Power Grids [J].
Bin-Halabi, Ahmed ;
Nouh, Adnan ;
Abouelela, Mohammad .
IEEE ACCESS, 2019, 7 :71529-71540
[17]   Illegal Information Flow detection in Electronic Institution [J].
Cai, Guoyong ;
Shi, Lei ;
Sui, Xin .
THIRD INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING, 2009, :240-243
[18]   Proactive Monitoring Via Jamming for Rate Maximization Over MIMO Rayleigh Fading Channels [J].
Cai, Hui ;
Zhang, Qi ;
Li, Quanzhong ;
Qin, Jiayin .
IEEE COMMUNICATIONS LETTERS, 2017, 21 (09) :2021-2024
[19]  
Case D. U., 2016, ELECTRICITY INFORM S, V388, P1
[20]   Coordinated Cyber-Attacks on the Measurement Function in Hybrid State Estimation [J].
Chakhchoukh, Yacine ;
Ishii, Hideaki .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2015, 30 (05) :2487-2497