© The Institution of Engineering and Technology
By means of advanced information and communication technology, cyber-physical power systems can attain real-time monitor and control but have to suffer the damage caused by a cyber attack. In this study, the authors' define attack efficiency to evaluate attack paths that attacker may adopt to intrude systems, to find the most efficient attack paths (i.e. the most vulnerable paths). Based on the actual power grid and security stability control system, the coupling model of cyber-physical power systems is established to analyse the propagation of cascading failure within and across the physical power grid and communication network. In the attack model, the attack cost matrix is built to describe the cost between directly connected nodes in a communication network. Furthermore, considering the probability that control commands are successfully transmitted from router nodes to generator/substation nodes, the total attack cost from the communication network to the physical power grid is figured out. To search for the most vulnerable attack paths in systems, the attack efficiency is proposed to quantify the relation between attack cost and attack gain, wherein the attack gain is the damage on systems caused by the cyber attack.
References
-
-
1)
-
18. Newman, M.: ‘Networks: an introduction’ (Oxford University Press, USA, 2010).
-
2)
-
6. Chen, T.M.: ‘Stuxnet, the real start of cyber warfare? [Editor's note]’, IEEE Netw., 2010, 24, (6), pp. 2–3.
-
3)
-
29. Tan, F., Xia, Y., Zhang, W., et al: ‘Cascading failures of loads in interconnected networks under intentional attack’, Europhys. Lett., 2013, 102, (2), pp. 28009.
-
4)
-
37. Parshani, R., Rozenblat, C., Ietri, D., et al: ‘Inter-similarity between coupled networks’, Europhys. Lett., 2011, 92, (6), pp. 68002.
-
5)
-
33. Cai, Y., Li, Y., Cao, Y., et al: ‘Modeling and impact analysis of interdependent characteristics on cascading failures in smart grids’, Int. J. Electr. Power Energy Syst., 2017, 89, pp. 106–114.
-
6)
-
22. Motter, A.E.: ‘Cascade control and defense in complex networks’, Phys. Rev. Lett., 2004, 93, (9), pp. 098701.
-
7)
-
32. Cai, Y., Cao, Y., Li, Y., et al: ‘Cascading failure analysis considering interaction between power grids and communication networks’, IEEE Trans. Smart Grid, 2015, 7, (1), pp. 530–538.
-
8)
-
41. Ekomwenrenren, E., Alharbi, H., Elgorashi, T., et al: ‘Stabilising control strategy for cyber-physical power systems’, IET Cyber-Phys. Syst., Theory Appl., 2019, 4, (3), pp. 265–275, .
-
9)
-
24. Parshani, R., Buldyrev, S.V., Havlin, S.: ‘Interdependent networks: reducing the coupling strength leads to a change from a first to second order percolation transition’, Phys. Rev. Lett., 2010, 105, (4), pp. 048701.
-
10)
-
8. Tang, Y., Chen, Q., Li, M., et al: ‘Overview on cyber-attacks against cyber physical power system’, Autom. Electr. Power Syst., 2016, 40, (17), pp. 59–69.
-
11)
-
10. Zimmerman, R.D., Murillo-Sánchez, C.E., Thomas, R.J.: ‘Matpower: steady-state operations, planning, and analysis tools for power systems research and education’, IEEE Trans. Power Syst., 2010, 26, (1), pp. 12–19.
-
12)
-
14. Barabási, A.L., Albert, R.: ‘Emergence of scaling in random networks’, Science, 1999, 286, (5439), pp. 509–512.
-
13)
-
1. Buldyrev, S.V., Parshani, R., Paul, G., et al: ‘Catastrophic cascade of failures in interdependent networks’, Nature, 2010, 464, (7291), pp. 1025.
-
14)
-
40. Gunasekaran, P., Sundaramoorthy, S., Pulikesi, N.P.: ‘Fault data injection attack on car-following model and mitigation based on interval type-2 fuzzy logic controller’, IET Cyber-Phys. Syst., Theory Appl., 2019, 4, (2), pp. 128–138.
-
15)
-
7. Liang, G., Weller, S.R., Zhao, J., et al: ‘The 2015 ukraine blackout: implications for false data injection attacks’, IEEE Trans. Power Syst., 2016, 32, (4), pp. 3317–3318.
-
16)
-
30. Zhang, X., Chi, K.T.: ‘Assessment of robustness of power systems from a network perspective’, IEEE J. Emerg. Sel. Top. Circuits Syst., 2015, 5, (3), pp. 456–464.
-
17)
-
3. Bobbio, A., Bonanni, G., Ciancamerla, E., et al: ‘Unavailability of critical SCADA communication links interconnecting a power grid and a Telco network’, Reliab. Eng. Syst. Saf., 2010, 95, (12), pp. 1345–1357.
-
18)
-
11. Huang, Z., Wang, C., Ruj, S., et al: ‘Modeling cascading failures in smart power grid using interdependent complex networks and percolation theory’. 2013 IEEE 8th Conf. on Industrial Electronics and Applications (ICIEA), Melbourne, VIC, Australi, 2013, pp. 1023–1028.
-
19)
-
31. Dey, P., Mehra, R., Kazi, F., et al: ‘Impact of topology on the propagation of cascading failure in power grid’, IEEE Trans. Smart Grid, 2016, 7, (4), pp. 1970–1978.
-
20)
-
15. Newman, M.E., Watts, D.J.: ‘Renormalization group analysis of the small-world network model’, Phys. Lett. A, 1999, 263, (4–6), pp. 341–346.
-
21)
-
35. Nguyen, D.T., Shen, Y., Thai, M.T.: ‘Detecting critical nodes in interdependent power networks for vulnerability assessment’, IEEE Trans. Smart Grid, 2013, 4, (1), pp. 151–159.
-
22)
-
4. Liu, X., Li, Z.: ‘False data attacks against ac state estimation with incomplete network information’, IEEE Trans. Smart Grid, 2016, 8, (5), pp. 2239–2248.
-
23)
-
42. Nia, M.A., Bahrak, B., Kargahi, M., et al: ‘Detecting new generations of threats using attribute-based attack graphs’, IET Inf. Sec., 2019, 13, (4), pp. 293–303.
-
24)
-
21. Chen, L., Yue, D., Dou, C.: ‘Optimization on vulnerability analysis and redundancy protection in interdependent networks’, Physica A, 2019, 523, pp. 1216–1226.
-
25)
-
26)
-
9. Xue, Y., Li, M., Luo, J., et al: ‘Modeling method for coupling relations in cyber physical power systems based on correlation characteristic matrix’, Autom. Electr. Power Syst., 2018, 42, (2), pp. 11–19.
-
27)
-
16. Motter, A.E., Lai, Y.C.: ‘Cascade-based attacks on complex networks’, Phys. Rev. E, 2002, 66, (6), pp. 065102.
-
28)
-
26. Shao, J., Buldyrev, S.V., Havlin, S., et al: ‘Cascade of failures in coupled network systems with multiple support-dependence relations’, Phys. Rev. E, 2011, 83, (3), pp. 036116.
-
29)
-
2. Corsi, S., Sabelli, C.: ‘General blackout in Italy sunday September 28, 2003, h. 03: 28: 00’. IEEE Power Engineering Society General Meeting 2004, Denver, CO, USA, 2004, pp. 1691–1702.
-
30)
-
17. Brandes, U.: ‘A faster algorithm for betweenness centrality’, J. Math. Sociol., 2001, 25, (2), pp. 163–177.
-
31)
-
13. Erds, P., Rényi, A.: ‘On the evolution of random graphs’, Publ. Math. Inst. Hung. Acad. Sci., 1960, 5, pp. 17–61.
-
32)
-
25. Zhou, D., Gao, J., Stanley, H.E., et al: ‘Percolation of partially interdependent scale-free networks’, Phys. Rev. E, 2013, 87, (5), pp. 052812.
-
33)
-
27. Ji, X., Wang, B., Liu, D., et al: ‘Will electrical cyber–physical interdependent networks undergo first-order transition under random attacks?’, Physica A, 2016, 460, pp. 235–245.
-
34)
-
23. Das, K., Nitsas, A., Altin, M., et al: ‘Improved load-shedding scheme considering distributed generation’, IEEE Trans. Power Deliv., 2016, 32, (1), pp. 515–524.
-
35)
-
36. Zhang, J.X., Chen, D.B., Dong, Q., et al: ‘Identifying a set of influential spreaders in complex networks’, Sci. Rep., 2016, 6, pp. 27823.
-
36)
-
39. Liu, L., Yin, Y., Zhang, Z., et al: ‘Redundant design in interdependent networks’, PLOS ONE, 2016, 11, (10), pp. e0164777.
-
37)
-
34. Zhang, X., Liu, D., Zhan, C., et al: ‘Effects of cyber coupling on cascading failures in power systems’, IEEE J. Emerg. Sel. Top. Circuits Syst., 2017, 7, (2), pp. 228–238.
-
38)
-
20. Hu, J., Li, Z., Duan, X.: ‘Structural feature analysis of the electric power dispatching data network’, Proc. CSEE, 2009, 29, (4), pp. 53–59.
-
39)
-
28. Hines, P., Cotilla-Sanchez, E., Blumsack, S.: ‘, 2010.
-
40)
-
12. Huang, Z., Wang, C., Stojmenovic, M., et al: ‘Balancing system survivability and cost of smart grid via modeling cascading failures’, IEEE Trans. Emerg. Top. Comput., 2013, 1, (1), pp. 45–56.
-
41)
-
38. Buldyrev, S.V., Shere, N.W., Cwilich, G.A.: ‘Interdependent networks with identical degrees of mutually dependent nodes’, Phys. Rev. E, 2011, 83, (1), pp. 016112.
-
42)
-
5. Alguliyev, R., Imamverdiyev, Y., Sukhostat, L.: ‘Cyber-physical systems and their security issues’, Comput. Ind., 2018, 100, pp. 212–223.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-gtd.2019.1330
Related content
content/journals/10.1049/iet-gtd.2019.1330
pub_keyword,iet_inspecKeyword,pub_concept
6
6