2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm) 2019
DOI: 10.1109/smartgridcomm.2019.8909767
|View full text |Cite
|
Sign up to set email alerts
|

Moving-Target Defense for Detecting Coordinated Cyber-Physical Attacks in Power Grids

Abstract: This work proposes a moving target defense (MTD) strategy to detect coordinated cyber-physical attacks (CCPAs) against power grids. A CCPA consists of a physical attack, such as disconnecting a transmission line, followed by a coordinated cyber attack that injects false data into the sensor measurements to mask the effects of the physical attack. Such attacks can lead to undetectable line outages and cause significant damage to the grid. The main idea of the proposed approach is to invalidate the knowledge tha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(16 citation statements)
references
References 23 publications
0
16
0
Order By: Relevance
“…Reference [22] proposes to use Flexible AC Transmission System (FACTS) devices to periodically perturb the reactance of certain lines in the network. Thus, an attack constructed with outdated reactances can be detected by the bad data detector (BDD).…”
Section: Coordinated Cyberattack Detection and Prevention Methodsmentioning
confidence: 99%
“…Reference [22] proposes to use Flexible AC Transmission System (FACTS) devices to periodically perturb the reactance of certain lines in the network. Thus, an attack constructed with outdated reactances can be detected by the bad data detector (BDD).…”
Section: Coordinated Cyberattack Detection and Prevention Methodsmentioning
confidence: 99%
“…Moving target defence (MTD) technologies for perturbation of cyber and/or physical topology to confuse attackers are explored, for instance in [40,41,60]. These are effective in preventing attackers from obtaining accurate system information to launch successful attacks, but it is not designed for capturing probing/reconnaissance activities attempted by persistent attackers that are hiding the infrastructure to prepare for a large-scale attack.…”
Section: Related Workmentioning
confidence: 99%
“…Reference [21] also discussed further concepts such as " -diversity" and " -mutation", and our design can be extended to support them in a straightforward manner. Furthermore, by wisely coordinating status and measurements messages reported by DecIED, we can mislead/lure attackers to mount non-optimal attack or attacks that can be detected or prevented by other security schemes, by incorporating the moving target defence [40]. Such extension is left for our future work.…”
Section: Deception Technologies For Smart Grid Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…In the literature, there are different types of cyberattacks for power grids [13]. On one side, some attacks focus on damaging components in the systems, such as damaging generation machines in the Aurora case [22], while others attempt blackouts like the cyberattacks in Ukraine [18].…”
Section: Use-case 1: Testing the Behavior Of Malwarementioning
confidence: 99%