2017
DOI: 10.1109/tpwrs.2016.2631891
|View full text |Cite
|
Sign up to set email alerts
|

The 2015 Ukraine Blackout: Implications for False Data Injection Attacks

Abstract: In a false data injection attack (FDIA), an adversary stealthily compromises measurements from electricity grid sensors in a coordinated fashion, with a view to evading detection by the power system bad data detection module. A successful FDIA can cause the system operator to perform control actions which compromise either the physical or economic operation of the power system. In this letter, we consider some implications for FDIAs arising from the late 2015 Ukraine Blackout event.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
339
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 970 publications
(340 citation statements)
references
References 6 publications
0
339
0
1
Order By: Relevance
“…While this might be sufficient, we recognize that in many situations humans are the most likely point of failure. Humans tend to behave in a manner that was not anticipated or expected . The flows from FBED do contain human flows (eg, human energy ) that can be used to begin to develop irrationality initiators that are human caused.…”
Section: Discussion and Future Workmentioning
confidence: 99%
“…While this might be sufficient, we recognize that in many situations humans are the most likely point of failure. Humans tend to behave in a manner that was not anticipated or expected . The flows from FBED do contain human flows (eg, human energy ) that can be used to begin to develop irrationality initiators that are human caused.…”
Section: Discussion and Future Workmentioning
confidence: 99%
“…The first ever cyber-attack on three Ukrainian regional electric power distribution companies that caused a widespread poweroutage in Ukraine on December 23, 2015 demonstrates the practical feasibility of mounting such an attack successfully [33]. Moreover, we assume that an attacker has continuous remote or physical access to the communication network of the WAMS from which he can intercept and capture measurement data from the selected PMUs.…”
Section: ) Threat Modelmentioning
confidence: 99%
“…December 23, 2015, Ukrainian power grid was attacked through the Internet [5], and thus about 700,000 residents sustained power outage for several hours.…”
Section: Introductionmentioning
confidence: 99%