2014 4th Australian Control Conference (AUCC) 2014
DOI: 10.1109/aucc.2014.7358710
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability analysis of large-scale dynamical networks to coordinated attacks

Abstract: We study the vulnerability of large-scale linear dynamical networks to coordinated attacks. We consider scenarios in which an attacker can tamper with the links connecting the network components and can also manipulate input injections at the nodes. When these two types of attacks take place simultaneously, the attack is referred to as a coordinated attack. We assume that network links are attacked with a certain probability and that malicious data is injected at the input ports. We employ Markov jump linear s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…Realworld events such as the Stuxnet [1], the Dragonfly [2], and the 2015 cyber-attacks on the Ukrainian power grid [3] and on a substation in the state of California in US [4], demonstrate the vulnerability of power systems worldwide to cyber attacks. Different, possibly overlapping, classes of cyber-attacks have been investigated in the power systems community, including denial of service (DoS) attacks [5], [6]; gray-hole or packet drop attacks [7]; jamming or link-failure attacks [5], [8]; and false data injection (FDI) or data integrity attacks [5], [6], [9]- [11].…”
Section: Introductionmentioning
confidence: 99%
“…Realworld events such as the Stuxnet [1], the Dragonfly [2], and the 2015 cyber-attacks on the Ukrainian power grid [3] and on a substation in the state of California in US [4], demonstrate the vulnerability of power systems worldwide to cyber attacks. Different, possibly overlapping, classes of cyber-attacks have been investigated in the power systems community, including denial of service (DoS) attacks [5], [6]; gray-hole or packet drop attacks [7]; jamming or link-failure attacks [5], [8]; and false data injection (FDI) or data integrity attacks [5], [6], [9]- [11].…”
Section: Introductionmentioning
confidence: 99%
“…This idea was further generalized to linear dynamic estimators in [5]. Alternatively, controllability and observability notions were used in [6] to identify the most impactful attacks that are difficult to detect. A wide range of attacks in the presence of different estimators were studied in [7] to investigate the security of descriptor systems arising in smart grids and irrigation networks.…”
Section: Introductionmentioning
confidence: 99%