Study on attack paths of cyber attack in cyber-physical power systems

被引:33
作者
Chen, Lei [1 ,2 ,3 ]
Yue, Dong [1 ,2 ,3 ]
Dou, Chunxia [1 ,2 ,3 ]
Chen, Jianbo [1 ,2 ,3 ]
Cheng, Zihao [2 ,3 ,4 ]
机构
[1] Nanjing Univ Posts & Telecommun, Coll Automat, Nanjing 210023, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Coll Artificial Intelligence, Nanjing 210023, Peoples R China
[3] Nanjing Univ Posts & Telecommun, Inst Adv Technol, Nanjing 210023, Peoples R China
[4] Jiangsu Engn Lab Big Data Anal & Control Act Dist, Nanjing, Peoples R China
关键词
substations; probability; power engineering computing; computer network security; power system security; telecommunication security; power grids; attack types; cyber attack; cyber-physical power systems; advanced information; information and communication technology; attack efficiency; intrude systems; efficient attack paths; actual power grid; security stability control system; physical power grid; communication network; attack model; attack cost matrix; total attack cost; vulnerable attack paths; attack gain; attack targets; CASCADING FAILURES; NETWORKS; IMPACT;
D O I
10.1049/iet-gtd.2019.1330
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
By means of advanced information and communication technology, cyber-physical power systems can attain real-time monitor and control but have to suffer the damage caused by a cyber attack. In this study, the authors' define attack efficiency to evaluate attack paths that attacker may adopt to intrude systems, to find the most efficient attack paths (i.e. the most vulnerable paths). Based on the actual power grid and security stability control system, the coupling model of cyber-physical power systems is established to analyse the propagation of cascading failure within and across the physical power grid and communication network. In the attack model, the attack cost matrix is built to describe the cost between directly connected nodes in a communication network. Furthermore, considering the probability that control commands are successfully transmitted from router nodes to generator/substation nodes, the total attack cost from the communication network to the physical power grid is figured out. To search for the most vulnerable attack paths in systems, the attack efficiency is proposed to quantify the relation between attack cost and attack gain, wherein the attack gain is the damage on systems caused by the cyber attack.
引用
收藏
页码:2352 / 2360
页数:9
相关论文
共 41 条
[1]   Cyber-physical systems and their security issues [J].
Alguliyev, Rasim ;
Imamverdiyev, Yadigar ;
Sukhostat, Lyudmila .
COMPUTERS IN INDUSTRY, 2018, 100 :212-223
[2]   Emergence of scaling in random networks [J].
Barabási, AL ;
Albert, R .
SCIENCE, 1999, 286 (5439) :509-512
[3]   Unavailability of critical SCADA communication links interconnecting a power grid and a Telco network [J].
Bobbio, A. ;
Bonanni, G. ;
Ciancamerla, E. ;
Clemente, R. ;
Iacomini, A. ;
Minichino, M. ;
Scarlatti, A. ;
Terruggia, R. ;
Zendri, E. .
RELIABILITY ENGINEERING & SYSTEM SAFETY, 2010, 95 (12) :1345-1357
[4]   A faster algorithm for betweenness centrality [J].
Brandes, U .
JOURNAL OF MATHEMATICAL SOCIOLOGY, 2001, 25 (02) :163-177
[5]   Interdependent networks with identical degrees of mutually dependent nodes [J].
Buldyrev, Sergey V. ;
Shere, Nathaniel W. ;
Cwilich, Gabriel A. .
PHYSICAL REVIEW E, 2011, 83 (01)
[6]   Catastrophic cascade of failures in interdependent networks [J].
Buldyrev, Sergey V. ;
Parshani, Roni ;
Paul, Gerald ;
Stanley, H. Eugene ;
Havlin, Shlomo .
NATURE, 2010, 464 (7291) :1025-1028
[7]   Modeling and impact analysis of interdependent characteristics on cascading failures in smart grids [J].
Cai, Ye ;
Li, Yong ;
Cao, Yijia ;
Li, Wenguo ;
Zeng, Xiangjun .
INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2017, 89 :106-114
[8]   Cascading Failure Analysis Considering Interaction Between Power Grids and Communication Networks [J].
Cai, Ye ;
Cao, Yijia ;
Li, Yong ;
Huang, Tao ;
Zhou, Bin .
IEEE TRANSACTIONS ON SMART GRID, 2016, 7 (01) :530-538
[9]   Optimization on vulnerability analysis and redundancy protection in interdependent networks [J].
Chen, Lei ;
Yue, Dong ;
Dou, Chunxia .
PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2019, 523 :1216-1226
[10]   Stuxnet, the Real Start of Cyber Warfare? [J].
Chen, Thomas M. .
IEEE NETWORK, 2010, 24 (06) :2-3