http://iet.metastore.ingenta.com
1887

access icon openaccess Developing correlation indices to identify coordinated cyber-attacks on power grids

  • XML
    289.4873046875Kb
  • PDF
    2.010258674621582MB
  • HTML
    425.755859375Kb
Loading full text...

Full text loading...

/deliver/fulltext/iet-cps/3/4/IET-CPS.2018.5002.html;jsessionid=12hxy879uf6d8.x-iet-live-01?itemId=%2fcontent%2fjournals%2f10.1049%2fiet-cps.2018.5002&mimeType=html&fmt=ahah

References

    1. 1)
      • 1. Zhu, B., Joseph, A., Sastry, S.: ‘A taxonomy of cyber attacks on SCADA systems’. Internet of Things (iThings/CPSCom), 2011 Int. Conf. on and 4th Int. Conf. on Cyber, Physical and Social Computing, Dalian, China, 2011, pp. 380388.
    2. 2)
      • 2. Liu, C.C., Stefanov, A., Hong, J., et al: ‘Intruders in the grid’, IEEE Power Energy Mag., 2012, 10, (1), pp. 5866.
    3. 3)
      • 3. Lee, R.M., Assante, M.J., Conway, T.: ‘Analysis of the cyber attack on the Ukrainian power grid’, SANS Ind. Control Syst., 2016.
    4. 4)
      • 4. Sun, C.C., Hong, J., Liu, C.C.: ‘A coordinated cyber attack detection system (CCADS) for multiple substations’. Power Systems Computation Conf. (PSCC), Genoa, Italy, 2016, pp. 17.
    5. 5)
      • 5. Dragos, Inc.: ‘Crashoverride: Analysis of the threat to electric grid operations’, 2017.
    6. 6)
      • 6. Ten, C.W., Hong, J., Liu, C.C.: ‘Anomaly detection for cybersecurity of the substations’, IEEE Trans. Smart Grid, 2011, 2, (4), pp. 865873.
    7. 7)
      • 7. Wang, P., Ashok, A., Govindarasu, M.: ‘Cyber-physical risk assessment for smart grid system protection scheme’. 2015 IEEE Power & Energy Society General Meeting, Denver, CO, USA, 2015, pp. 15.
    8. 8)
      • 8. Ten, C.W., Liu, C.C., Govindarasu, M.: ‘Vulnerability assessment of cybersecurity for SCADA systems using attack trees’. Power Engineering Society General Meeting, Tampa, FL, USA, 2007, pp. 18.
    9. 9)
      • 9. Liu, N., Zhang, J., Zhang, H., et al: ‘Security assessment for communication networks of power control systems using attack graph and mcdm’, IEEE Trans. Power Deliv., 2010, 25, (3), pp. 14921500.
    10. 10)
      • 10. Chen, T.M., Sanchez Aarnoutse, J.C., Buford, J.: ‘Petri net modeling of cyberphysical attacks on smart grid’, IEEE Trans. Smart Grid, 2011, 2, (4), pp. 741749.
    11. 11)
      • 11. Jie, Y., Govindarasu, M., Chen Ching, L., et al: ‘Risk assessment framework for power control systems with pmu-based intrusion response system’, J. Modern Power Syst. Clean Energy, 2015, 3, (3), pp. 321331.
    12. 12)
      • 12. Ten, C.W., Ginter, A., Bulbul, R.: ‘Cyber-based contingency analysis’, IEEE Trans. Power Syst., 2016, 31, (4), pp. 30403050.
    13. 13)
      • 13. Choi, D.H., Xie, L.: ‘Ramp-induced data attacks on look-ahead dispatch in real-time power markets’, IEEE Trans. Smart Grid, 2013, 4, (3), pp. 12351243.
    14. 14)
      • 14. Xie, L., Mo, Y., Sinopoli, B.: ‘Integrity data attacks in power market operations’, IEEE Trans. Smart Grid, 2011, 2, (4), pp. 659666.
    15. 15)
      • 15. Ye, H., Ge, Y., Liu, X., et al: ‘Transmission line rating attack in two-settlement electricity markets’, IEEE Trans. Smart Grid, 2016, 7, (3), pp. 13461355.
    16. 16)
      • 16. Wang, J.: ‘Resilient electric grid for smart cities’. in ‘Smart cities: foundations, principles, and applications’ (John Wiley & Sons, Hoboken, NJ, USA, 2017), pp. 541578.
    17. 17)
      • 17. Liang, G., Zhao, J., Luo, F., et al: ‘A review of false data injection attacks against modern power systems’, IEEE Trans. Smart Grid, 2016, PP, (99), p. 1.
    18. 18)
      • 18. Tajer, A.: ‘False data injection attacks in electricity markets by limited adversaries: stochastic robustness’, IEEE Trans. Smart Grid, 2017, early access: DOI: 10.1109/TSG.2017.2733346.
    19. 19)
      • 19. Rahman, M.A., Mohsenian Rad, H.: ‘False data injection attacks with incomplete information against smart power grids’. Global Communications Conf. (GLOBECOM), Anaheim, CA, USA, 2012, pp. 31533158.
    20. 20)
      • 20. Liu, X., Li, Z.: ‘False data attacks against ac state estimation with incomplete network information’, IEEE Trans. Smart Grid, 2017, 8, (5), pp. 22392248.
    21. 21)
      • 21. Tajer, A., Kar, S., Poor, H.V., et al: ‘Distributed joint cyber attack detection and state recovery in smart grids’. 2011 IEEE Int. Conf. on Smart Grid Communications (SmartGridComm), Brussels, Belgium, 2011, pp. 202207.
    22. 22)
      • 22. Dorfler, F., Bullo, F.: ‘Novel insights into lossless ac and dc power flow’. Power and Energy Society General Meeting (PES), Vancouver, BC, Canada, 2013, pp. 15.
    23. 23)
      • 23. ‘The pjm independent system operator’. Available at http://www.pjm.com/markets-and-operations.aspx.
    24. 24)
      • 24. ‘The New England independent system operator’. Available at https://www.iso-ne.com/markets-operations.
    25. 25)
      • 25. ‘California ISO, business practice manual for market instruments, chapter 2.1 the market power mitigation and reliability requirements, 2017’. Available at https://bpmcm.caiso.com/Pages/BPMDetails.aspx?BPM=Market%20Instruments.
    26. 26)
      • 26. Luo, Z.Q., Pang, J.S., Ralph, D.: ‘Mathematical programs with equilibrium constraints’ (Cambridge University Press, Cambridge, UK, 1996).
    27. 27)
      • 27. Yuan, Y., Li, Z., Ren, K.: ‘Modeling load redistribution attacks in power systems’, IEEE Trans. Smart Grid, 2011, 2, (2), pp. 382390.
    28. 28)
      • 28. Liang, J., Sankar, L., Kosut, O.: ‘Vulnerability analysis and consequences of false data injection attack on power system state estimation’, IEEE Trans. Power Syst., 2016, 31, (5), pp. 38643872.
    29. 29)
      • 29. Arroyo, J.M., Galiana, F.D.: ‘On the solution of the bilevel programming formulation of the terrorist threat problem’, IEEE Trans. Power Syst., 2005, 20, (2), pp. 789797.
    30. 30)
      • 30. Boyd, S., Vandenberghe, L.: ‘Convex optimization’ (Cambridge University Press, NY, USA, 2004).
    31. 31)
      • 31. Dempe, S.: ‘Foundations of bilevel programming’ (Springer Science & Business Media, Dordrecht, Netherlands, 2002).
    32. 32)
      • 32. Zhu, B., Ghorbani, A.A.: ‘Alert correlation for extracting attack strategies’ , Int. J. Netw. Secur., 2006, 3, (3), pp. 244258.
    33. 33)
      • 33. Zimmerman, R.D., Murillo Sánchez, C.E., Thomas, R.J.: ‘Matpower: steady-state operations, planning, and analysis tools for power systems research and education’, IEEE Trans. Power Syst., 2011, 26, (1), pp. 1219.
    34. 34)
      • 34. Grant, M., Boyd, S..: ‘CVX: Matlab software for disciplined convex programming, version 2.1’. 2014. Available at http://cvxr.com/cvx.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-cps.2018.5002
Loading

Related content

content/journals/10.1049/iet-cps.2018.5002
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address