A robust, integrated and flexible charging network is essential for the growth and deployment of electric vehicles (EVs). The State Grid of China has developed a Smart Internet of Electric Vehicle Charging Network (SIEN). At present, there are three main ways to attack SIEN maliciously: distributed data tampering; distributed denial of service (DDoS); and forged command attacks. Network attacks are random and continuous, closely related to time. By contrast, when analyzing the alarm in malicious attacks, the traditional Markov chain based model ignores the association relationship in the time series between states of alarm, so that the analysis and prediction of alarms are not suitable for real situations. This paper analyzes the characteristics of the three types of attack and proposes an association state analysis method on the time series. This method firstly analyzes alarm logs at different locations, different levels, and different types, and then establishes the temporal association of scattered and isolated alarm information. Secondly, it tracks the transition trend of abnormal events in the SIEN’s main station layer, the channel layer, and the sub-station layer. It also identifies the real attack behavior. This method not only provides a prediction of security risks, but, more importantly, it can also accurately analyze the trend of SIEN security risks. Compared with the ordinary Markov chain model, this method can better smooth the fluctuation of processing values, with higher real-time performance, stronger robustness, and higher precision. This method has been applied to the State Grid of China.
[1]
Z Jelinovic.
The Yugoslav transport system
,
1981
.
[2]
Christoph Schmittner,et al.
The Need for Safety and Cyber-Security Co-engineering and Standardization for Highly Automated Automotive Vehicles
,
2016
.
[3]
Yi-chong Xu.
The State Grid Corporation in China
,
2012
.
[4]
Morshed U. Chowdhury,et al.
A New Cyber Security Framework Towards Secure Data Communication for Unmanned Aerial Vehicle (UAV)
,
2017,
ATCS/SePrIoT@SecureComm.
[5]
Sidi-Mohammed Senouci,et al.
Cyber security methods for aerial vehicle networks: taxonomy, challenges and solution
,
2018,
The Journal of Supercomputing.
[6]
Li,et al.
Rough Outlier Detection Based Security Risk Analysis Methodology
,
2012
.
[7]
Araz Taeihagh,et al.
Governing autonomous vehicles: emerging responses for safety, liability, privacy, cybersecurity, and industry risks
,
2018,
Transport Reviews.