Research on Cyber Attacks and Defensive Measures of Power Communication Network

被引:4
|
作者
Wu, Yingjun [1 ]
Ru, Yingtao [1 ]
Lin, Zhiwei [1 ]
Liu, Chengjun [1 ]
Xue, Tao [1 ]
Zhao, Xiang [1 ]
Chen, Jinfan [1 ]
机构
[1] Hohai Univ, Coll Energy & Elect Engn, Nanjing 211100, Peoples R China
关键词
Security; Power measurement; Power grids; Indexes; Power systems; Data models; Dispatching; Cyber attacks; defensive measures; power communication network (PCN); security indexes; DATA INJECTION ATTACKS; LOAD REDISTRIBUTION ATTACKS; PHYSICAL SYSTEMS; STATE ESTIMATION; VULNERABILITY ASSESSMENT; ALTERING ATTACKS; SECURITY THREATS; DATA AGGREGATION; FAULT-TOLERANCE; SERVICE ATTACKS;
D O I
10.1109/JIOT.2022.3181698
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the wide application of information and communication technologies, a great number of cyber vulnerabilities threaten the security and stability of the power system. Therefore, this article analyzed the intrusion paths, the invasion mechanisms, and the possible consequences of most potential attacks in power communication networks (PCNs); a method for classifying and evaluating defense measures considering security indexes is also proposed. First, the typical structure and hierarchy of PCNs are sorted out. Second, we study the potential cyber attacks that may occur against PCNs and classify them into hot-spot attacks and nonhot-spot attacks based on academic research and statistical analysis of historical cyber attacks. Then, the potential target devices, propagation paths, and possible consequences to PCNs are analyzed in detail for different cyber attacks. Third, a security index system to assess the resistibility, recognizability, and recoverability of different defense measures is proposed. Based on the capability of different measures against cyber attacks, the defensive measures are classified into resistibility enhancement measures, recognizability enhancement measures, and recoverability enhancement measures. Accordingly, the mechanisms of different defense measures are analyzed. After that, the effectiveness of each defense measure is evaluated based on the degree of correlation between the defense measure and the security indexes.
引用
收藏
页码:7613 / 7635
页数:23
相关论文
共 50 条
  • [31] Review of Cyber Attacks on Power System Operations
    Chatterjee, Kaustav
    Padmini, V.
    Khaparde, S. A.
    2017 IEEE REGION 10 INTERNATIONAL SYMPOSIUM ON TECHNOLOGIES FOR SMART CITIES (IEEE TENSYMP 2017), 2017,
  • [32] Deep Neural Network for Detection of Cyber Attacks
    Komar, Myroslav
    Dorosh, Vitaliy
    Hladiy, Grygoriy
    Sachenko, Anatoliy
    2018 IEEE FIRST INTERNATIONAL CONFERENCE ON SYSTEM ANALYSIS & INTELLIGENT COMPUTING (SAIC), 2018, : 186 - 189
  • [33] DETECTING CYBER ATTACKS ON NUCLEAR POWER PLANTS
    Rrushi, Julian
    Campbell, Roy
    CRITICAL INFRASTRUCTURE PROTECTION II, 2008, 290 : 41 - +
  • [34] Robustness of Power Systems in the Context of Cyber Attacks
    Dogaru, Delia Ioana
    Dumitrache, Joan
    2017 21ST INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE (CSCS), 2017, : 506 - 512
  • [35] THE LEGALITY OF THE DEFENSIVE MEASURES TAKEN BY THE USA AND THE UK IN RESPONSE TO THE HOUTHI ATTACKS
    Glavica, Patricija
    Brulc, Leon
    LEXONOMICA, 2024, 16 (01): : 67 - 84
  • [36] Analysis of network communication attacks
    Kamal, S.
    Issac, B.
    2007 5TH STUDENT CONFERENCE ON RESEARCH AND DEVELOPMENT, 2007, : 313 - +
  • [37] A Comprehensive study of Cyber Attacks & Counter Measures for web systems
    Jamil, Abid
    Asif, Kashif
    Ashraf, Rehan
    Mehmood, Sheraz
    Mustafa, Ghulam
    ICFNDS'18: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS, 2018,
  • [38] RAINCOAT: Randomization of Network Communication in Power Grid Cyber Infrastructure to Mislead Attackers
    Lin, Hui
    Kalbarczyk, Zbigniew T.
    Iyer, Ravishankar K.
    IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (05) : 4893 - 4906
  • [39] A Defensive Strategy for Integrity Detection in Cyber-Physical Systems Subject to Deception Attacks
    Ren, Xinwei
    Liang, Jinling
    Liu, Qingshan
    2020 10TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST), 2020, : 241 - 246
  • [40] Impact of Crash Override and Tampering Communication Data Cyber-Attacks on the Power Quality of the Hybrid System
    Ghosh, Sagnika
    Ali, Mohd Hasan
    2018 IEEE INTERNATIONAL CONFERENCE ON POWER ELECTRONICS, DRIVES AND ENERGY SYSTEMS (PEDES), 2018,