Affiliation:
1. School of Automation, Nanjing University of Science & Technology, Nanjing 210094, China
Abstract
This work proposes a method for the intelligent deployment of distributed flexible AC transmission system (D-FACTS) devices. In recent years, in the field of moving target defense (MTD) strategies to detect coordinated cyber–physical attacks (CCPAs), establishing how to deploy D-FACTS devices has become an important research point. Although some research results have been proposed, the obtained deployment solutions are unintelligent due to not carefully considering smart attackers’ behaviors. A method for achieving the intelligent deployment of D-FACTS devices is proposed in this paper. First, the basic concept of corrupting CCPAs is summarized; second, based on considering practical constraints and the basic concept, a protected transmission line set is confirmed; and third, a zero-sum game model is formulated, and a robust Nash equilibrium solution is computed. Due to the game’s characteristics, this solution reflects the smart attackers’ sense of action. Relying on the solution, those lines that are most likely to be tripped form a new protected transmission line set. Finally, a comprehensive algorithm using a metric proposed in previous studies is proposed for finding an intelligent solution for the deployment of D-FACTS devices. We validated our results through extensive simulations using IEEE 14-bus, 30-bus, and 118-bus power systems provided by MATPOWER and the real-world load profiles from New York State. Our work, in tracking the targets that attackers are most likely to attack, opens up new ideas for the intelligent deployment of D-FACTS devices.
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference41 articles.
1. Lydia, M., Kumar, G.E.P., and Selvakumar, A.I. (2022). Securing the cyber-physical system: A review. Cyber-Physical Syst., 1–31.
2. Shetu, S.F., Saifuzzaman, M., Moon, N.N., and Nur, F.N. (2019, January 28–29). A survey of botnet in cyber security. Proceedings of the ICCT, Jaipur, India.
3. Liu, Y., Ning, P., and Reiter, M.K. (2009, January 9–13). False data injection attacks against state estimation in electric power grids. Proceedings of the 16th of ACM Conference on Computer and Communications Security, Chicago, IL, USA.
4. E-ISAC (2016). Analysis of the Cyber Attack on the Ukrainian Power Grid, Electricity Information Sharing and Analysis Center. Available online: https://ics.sans.org/media/E-ISACsANSUkraineDUC5.pdf.
5. Bilevel model for analyzing coordinated cyber-physical attacks on power systems;Li;IEEE Trans. Smart Grid,2016
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献