Security Risk Assessment and Defense Resource Allocation of Power System Under Synergetic Cyber Attacks

被引:0
|
作者
Chen W. [1 ]
Chen W. [1 ]
Xue A. [2 ]
机构
[1] School of Electrical and Information Engineering, Jiangsu University, Zhenjiang, 212013, Jiangsu
[2] State Key Laboratory of Alternate Electrical Power System With Renewable Energy Sources (North China Electric Power University), Changping District, Beijing
来源
关键词
Defense resource allocation; Electric cyber physical system; Security risk assessment; Synergetic cyber attacks;
D O I
10.13335/j.1000-3673.pst.2018.1715
中图分类号
学科分类号
摘要
The Ukrainian blackout incident shows that security of electric cyber physical system (ECPS) is severely threatened by synergetic cyber attacks. Considering this issue, it is of practical significance to propose a risk assessment and defense resource allocation method related to the ECPS under synergetic cyber attacks. Based on analysis of the destruction mechanism of cyber attacks on the physical grid and the cyber attack defense measures of ECPS, this paper proposes a probabilistic expression of the synergetic cyber attacks based on attack-defense game theory. Furthermore, considering success rate and destruction degree, a risk assessment method of the ECPS under synergetic cyber attacks is proposed. Finally, a method determining the defense resource demand under a given risk situation and an optimal defense resource allocation method under the condition of limited defense resources are proposed. Application of these methods to the ECPS based on a 10-machine 39-bus system verifies effectiveness of these methods. © 2019, Power System Technology Press. All right reserved.
引用
收藏
页码:2353 / 2360
页数:7
相关论文
共 28 条
  • [1] Liu D., Sheng W., Wang Y., Et al., Key technologies and trends of cyber physical system for power grid, Proceedings of the CSEE, 35, 14, pp. 3522-3531, (2015)
  • [2] Xue Y., The way from a simple contingency to system-wide disaster-lessons from the eastern interconnection blackout in 2003, Automation of Electric Power Systems, 27, 18, pp. 1-5, (2003)
  • [3] Liu N., Yu X., Zhang J., Et al., Coordinated Cyber-Attack: Inference and Thinking of Incident on Ukrainian Power grid, Automation of Electric Power Systems, 40, 6, pp. 144-147, (2016)
  • [4] Mei S., Wang Y., Chen L., Overviews and prospects of the cyber security of smart grid from the view of complex network theory, High Voltage Engineering, 37, 3, pp. 672-679, (2011)
  • [5] Siddharth S., Adam H., Manimaran G., Cyber-physical system security for the electric power grid, Proceedings of the IEEE, 100, 1, pp. 210-224, (2012)
  • [6] Rasmussen T.B., Yang G., Nielsen A.H., Et al., A review of cyber-physical energy system security assessment, IEEE Manchester PowerTech IEEE Conference Publications, pp. 1-6, (2017)
  • [7] Ye X., Wen F., Shang J., Et al., Propagation mechanism of cyber physical security risks in power systems, Power System Technology, 39, 11, pp. 3072-3079, (2015)
  • [8] Lehlogonolo L., Venter H.S., A threat-vulnerability based risk analysis model for cyber physical system security, Hawaii International Conference on System Sciences, pp. 6021-6030, (2017)
  • [9] Deng S., Yue D., Fu X., Et al., Security risk assessment of cyber physical power system based on rough set and gene expression programming, IEEE/CAA Journal of Automatica Sinica, 2, 4, pp. 431-439, (2015)
  • [10] Han Y., Guo J., Guo C., Et al., Intelligent substation security risk assessment of cyber physical power systems incorporating software failures, Proceedings of the CSEE, 36, 6, pp. 1500-1508, (2016)