Risk Assessment of Cyber Attacks on Power Grids Considering the Characteristics of Attack Behaviors

The quick development of smart grids coupled with IoT devices has opened breaches of security leading to cyberattacks done by attackers with different purposes. In this study, a behavior model is proposed to investigate the risk of cyber attacks on power grids, where the utility value is determined by subjective attack attitude and characteristics of candidate targets firstly, and then the behaviors of attack target selection and attack resource allocation are described by the probability response and utility attenuation model respectively based on data analysis of historical events. The simulation results on RTS79 system indicate that the risk and the vulnerable nodes of the power grid vary with the characteristics of attack behaviors and characteristic attributes of targets, which should be considered in the cyber security defense dynamically.

[1]  Jianhui Wang,et al.  Cyber-Physical Modeling and Cyber-Contingency Assessment of Hierarchical Control Systems , 2015, IEEE Transactions on Smart Grid.

[2]  Dusmanta Kumar Mohanta,et al.  A review on synchrophasor communication system: communication technologies, standards and applications , 2018 .

[3]  Walid Saad,et al.  Stochastic Games for Power Grid Protection Against Coordinated Cyber-Physical Attacks , 2018, IEEE Transactions on Smart Grid.

[4]  Chao Yang,et al.  DoS attack in centralised sensor network against state estimation , 2018, IET Control Theory & Applications.

[5]  Newton G. Bretas,et al.  Further contributions to smart grids cyber-physical security as a malicious data attack: Proof and properties of the parameter error spreading out to the measurements and a relaxed correction model , 2019, International Journal of Electrical Power & Energy Systems.

[6]  Arif I. Sarwat,et al.  Defending mechanisms for protecting power systems against intelligent attacks , 2015, 2015 10th System of Systems Engineering Conference (SoSE).

[7]  David L. Olson,et al.  Multiattribute Utility Theory , 1996 .

[8]  Zengji Liu,et al.  The research on cyber-attack testbed with hardware-in-loop , 2017, 2017 IEEE Conference on Energy Internet and Energy System Integration (EI2).

[9]  David K. Y. Yau,et al.  Markov Game Analysis for Attack-Defense of Power Networks Under Possible Misinformation , 2013, IEEE Transactions on Power Systems.

[10]  Reynaldo Nuqui,et al.  Cyber Attack Resilient Distance Protection and Circuit Breaker Control for Digital Substations , 2019, IEEE Transactions on Industrial Informatics.

[11]  Hanbo Zheng,et al.  Identifying hotspots of sectors and supply chain paths for electricity conservation in China , 2020 .

[12]  Zhao Yang Dong,et al.  The 2015 Ukraine Blackout: Implications for False Data Injection Attacks , 2017, IEEE Transactions on Power Systems.

[13]  Mingjian Cui,et al.  Flexible Machine Learning-Based Cyberattack Detection Using Spatiotemporal Patterns for Distribution Systems , 2020, IEEE Transactions on Smart Grid.

[14]  Naresh Malla,et al.  Real-time cyber physical system testbed for power system security and control , 2017 .

[15]  Yijia Cao,et al.  Cascading Failure Analysis Considering Interaction Between Power Grids and Communication Networks , 2016, IEEE Transactions on Smart Grid.

[16]  Mingjian Cui,et al.  Multilevel Programming-Based Coordinated Cyber Physical Attacks and Countermeasures in Smart Grid , 2019, IEEE Access.

[17]  Lingfeng Wang,et al.  Power System Reliability Analysis With Intrusion Tolerance in SCADA Systems , 2016, IEEE Transactions on Smart Grid.

[18]  Lingfeng Wang,et al.  A game-theoretic study of load redistribution attack and defense in power systems , 2017 .

[19]  Lingfeng Wang,et al.  Power System Reliability Evaluation With SCADA Cybersecurity Considerations , 2015, IEEE Transactions on Smart Grid.

[20]  Wutao Chen,et al.  Distributed sensing and cooperative estimation/detection of ubiquitous power internet of things , 2019 .

[21]  Lingfeng Wang,et al.  Inclusion of SCADA Cyber Vulnerability in Power System Reliability Assessment Considering Optimal Resources Allocation , 2016, IEEE Transactions on Power Systems.

[22]  Probability Subcommittee,et al.  IEEE Reliability Test System , 1979, IEEE Transactions on Power Apparatus and Systems.

[23]  Lingfeng Wang,et al.  An Improved Defender–Attacker–Defender Model for Transmission Line Defense Considering Offensive Resource Uncertainties , 2019, IEEE Transactions on Smart Grid.

[24]  Liangzhong Yao,et al.  Electric grid vulnerability assessment under attack-defense scenario based on game theory , 2013, 2013 IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC).

[25]  Yiyi Zhang,et al.  Risk Assessment for the Power Grid Dispatching Process Considering the Impact of Cyber Systems , 2019, Energies.

[26]  Peter C. Fishburn,et al.  Utility Theory and Decision Theory , 1990 .

[27]  Nikolaos Gatsis,et al.  Vulnerability Analysis of Smart Grids to GPS Spoofing , 2018, 2018 IEEE Power & Energy Society General Meeting (PESGM).

[28]  Wenxia Liu,et al.  Security Assessment for Communication Networks of Power Control Systems Using Attack Graph and MCDM , 2010, IEEE Transactions on Power Delivery.

[29]  M. Pipattanasomporn,et al.  Real-time co-simulation platform using OPAL-RT and OPNET for analyzing smart grid performance , 2015, 2015 IEEE Power & Energy Society General Meeting.

[30]  Ciwei Gao,et al.  Risk Assessment of Malicious Attacks Against Power Systems , 2009, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[31]  Antonio J. Conejo,et al.  An Efficient Tri-Level Optimization Model for Electric Grid Defense Planning , 2017, IEEE Transactions on Power Systems.

[32]  Thoshitha T. Gamage,et al.  Analyzing the Cyber-Physical Impact of Cyber Events on the Power Grid , 2015, IEEE Transactions on Smart Grid.

[33]  T. G. Lewis,et al.  A general defender-attacker risk model for networks , 2008 .

[34]  Pramod P. Khargonekar,et al.  Smart grids cyber-physical security as a malicious data attack: An innovation approach , 2017 .

[35]  P P Garre Multiattribute utility theory in decision-making. , 1992, Nursing management.

[36]  Dong Yue,et al.  Security Assessment for Cyber Physical Distribution Power System Under Intrusion Attacks , 2019, IEEE Access.