共 44 条
Cyber-physical risk assessment for false data injection attacks considering moving target defences Best practice application of respective cyber and physical reinforcement assets to defend against FDI attacks
被引:2
作者:
Higgins, Martin
[1
,2
]
Xu, Wangkun
[1
]
Teng, Fei
[1
]
Parisini, Thomas
[1
]
机构:
[1] Imperial Coll London, London, England
[2] Univ Oxford, Oxford, England
基金:
欧盟地平线“2020”;
英国工程与自然科学研究理事会;
关键词:
Cyber-physical;
False data injection attacks;
Security assessment;
Moving target defence;
STATE ESTIMATION;
VULNERABILITY ASSESSMENT;
SYSTEMS;
D O I:
10.1007/s10207-022-00621-7
中图分类号:
TP [自动化技术、计算机技术];
学科分类号:
0812 ;
摘要:
In this paper, we examine the factors that influence the success of false data injection (FDI) attacks in the context of both cyber and physical styles of reinforcement. Existing research considers the FDI attack in the context of the ability to change a measurement in a static system only. However, successful attacks will require first intrusion into a system followed by construction of an attack vector that can bypass bad data detection to cause a consequence (such as overloading). Furthermore, the recent development of moving target defences (MTD) introduces dynamically changing system topology, which is beyond the capability of existing research to assess. In this way, we develop a full service framework for FDI risk assessment. The framework considers both the costs of system intrusion via a weighted graph assessment in combination with a physical, line overload-based vulnerability assessment under the existence of MTD. We present our simulations on a IEEE 14-bus system with an overlain RTU network to model the true risk of intrusion. The cyber model considers multiple methods of entry for the FDI attack including meter intrusion, RTU intrusion and combined style attacks. Post-intrusion, our physical reinforcement model analyses the required level of topology divergence to protect against a branch overload from an optimised attack vector. The combined cyber and physical index is used to represent the system vulnerability against FDIA.
引用
收藏
页码:579 / 589
页数:11
相关论文
共 44 条