Research on Power Cyber-Physical Cross-Domain Attack Paths Based on Graph Knowledge

Author:

Qiu Shenjian12,Shao Zhipeng2,Wang Jian1ORCID,Xu Shiyou1,Fei Jiaxuan2

Affiliation:

1. College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China

2. State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology, State Grid Smart Grid Research Institute Co., Ltd., Nanjing 210003, China

Abstract

Against the background of the construction of new power systems, power generation, transmission, distribution, and dispatching services are open to the outside world for interaction, and the accessibility of attack paths has been significantly enhanced. We are facing cyber-physical cross-domain attacks with the characteristics of strong targeting, high concealment, and cross-space threats. This paper proposes a quantitative analysis method for the influence of power cyber-physical cross-domain attack paths based on graph knowledge. First, a layered attack graph was constructed based on the cross-space and strong coupling characteristics of the power cyber-physical system business and the vertical architecture of network security protection focusing on border protection. The attack graph included cyber-physical cross-domain attacks, control master stations, measurement and control equipment failures, transient stable node disturbances, and other vertices, and achieved a comprehensive depiction of the attack path. Second, the out-degree, in-degree, vertex betweenness, etc., of each vertex in the attack graph were comprehensively considered to calculate the vertex vulnerability, and by defining the cyber-physical coupling degree and edge weights, the risk of each attack path was analyzed in detail. Finally, the IEEE RTS79 and RTS96 node systems were selected, and the impact of risk conduction on the cascading failures of the physical space system under typical attack paths was analyzed using examples, verifying the effectiveness of the proposed method.

Funder

State Grid Corporation of China

Publisher

MDPI AG

Reference28 articles.

1. A Review of False Data Injection Attacks Against Modern Power Systems;Liang;IEEE Trans. Smart Grid,2016

2. REACT to cyber attacks on power grids;Soltan;IEEE Trans. Netw. Sci. Eng.,2018

3. Risk Assessment for Cyberattack in Active Distribution Systems Considering the Role of Feeder Automation;Dai;IEEE Trans. Power Syst.,2019

4. Cai, X., Wang, Q., Tang, Y., and Zhu, L. (2019, January 21–23). Review of Cyber-attacks and Defense Research on Cyber Physical Power System. Proceedings of the 2019 IEEE Sustainable Power and Energy Conference (iSPEC), Beijing, China.

5. Ou, X., Boyer, W.F., and McQueen, M.A. (November, January 30). A scalable approach to attack graph generation. Proceedings of the 13th ACM conference on Computer and communications security, Alexandria, VA, USA.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3