2020
DOI: 10.1109/access.2020.3006555
|View full text |Cite
|
Sign up to set email alerts
|

Pattern Analysis of Topological Attacks in Cyber-Physical Power Systems Considering Cascading Outages

Abstract: Modern cyber-physical power systems are vulnerable to cyber attacks. Given that cyber and physical networks are coupled tightly, attacks in the cyber layer can penetrate the physical layer, causing the outage of transmission lines and other physical equipment, thus changing the topology of the grid. In some extreme scenarios, the topological change will disrupt the emergency response of the grid, eventually causing cascading outages along with a blackout. Therefore, as the defender, the operator of a cyberphys… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2020
2020
2025
2025

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(13 citation statements)
references
References 34 publications
0
13
0
Order By: Relevance
“…The Bayesian attack graph model is used to assess the attack procedure and the likelihood of compromise of the cyber components in smart grid systems with the consideration of uncertainty in cyber-attacks [95]. The attack graph model is useful for the operators to analyze the patterns of sequential cyber topological attacks in identifying the critical cyber-attacks thereby cascading outages can be avoided in the CPPS [283].The attack graph serves various applications like intrusion detection, security defence, network security, and forensic analysis, etc. Overall, it gives a bird's eye view of every attack scenario in CPPS that can lead to a critical security breach.…”
Section: (B) Attack Graphmentioning
confidence: 99%
“…The Bayesian attack graph model is used to assess the attack procedure and the likelihood of compromise of the cyber components in smart grid systems with the consideration of uncertainty in cyber-attacks [95]. The attack graph model is useful for the operators to analyze the patterns of sequential cyber topological attacks in identifying the critical cyber-attacks thereby cascading outages can be avoided in the CPPS [283].The attack graph serves various applications like intrusion detection, security defence, network security, and forensic analysis, etc. Overall, it gives a bird's eye view of every attack scenario in CPPS that can lead to a critical security breach.…”
Section: (B) Attack Graphmentioning
confidence: 99%
“…, where the set is a 1 × M matrice. After obtaining distances between terminals and the base station, the path loss from the intelligent terminals to the base station is calculated by Equation (5).…”
Section: D2d Communication Channel Model Of Intelligent Terminalmentioning
confidence: 99%
“…Qu et al [4] proposed a novel method to improve the prediction of power cyber-physical systems risk, where the method of the dependent Markov chain theory was employed. Zhang et al [5] made a pattern analysis of topological attacks in cyber-physical power systems considering cascading outages. Meanwhile, the IEEE 39-node system was used to verify the representativeness of the above-mentioned patterns.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, the interdependent network dependency and interaction effects inside coupled grid should be considered while studying mechanism of blackout. Research on the vulnerability of coupled CPPS and improvement of coupled structure and mode are the key issues to prevent and control power system blackout [11][12][13].…”
Section: Introductionmentioning
confidence: 99%