• HOME
  • About Journal
    • Historical evolution
    • Journal Honors
  • Editorial Board
    • Members of Committee
    • Director of the Committee
    • President and Editor in chief
  • Submission Guide
    • Instructions for Authors
    • Manuscript Processing Flow
    • Model Text
    • Procedures for Submission
  • Academic Influence
  • Open Access
  • Ethics&Policies
    • Publication Ethics Statement
    • Peer Review Process
    • Academic Misconduct Identification and Treatment
    • Advertising and Marketing
    • Correction and Retraction
    • Conflict of Interest
    • Authorship & Copyright
  • Contact Us
  • Chinese
Site search        
文章摘要
基于攻击图的电网信息物理融合系统风险定量评估
Quantitative Risk Assessment for Cyber Physical Power System Based on Attack Graph
Received:September 17, 2018  Revised:September 17, 2018
DOI:10.19753/j.issn1001-1390.2020.02.010
中文关键词: 虚假数据注入攻击  电网信息物理融合系统  电力信息安全模型  攻击图  定量评估
英文关键词: false data injection attack  cyber physical power system  power cyber security model  attack graph  quantitative assessment
基金项目:国家自然科学基金项目( 61633016)
Author NameAffiliationE-mail
CHEN Decheng College of Automation, Nanjing University of Posts and Telecommunications 1293414993@qq.com 
Hits: 1935
Download times: 631
中文摘要:
      由于信息和通信技术的广泛应用,现代电网已经成为一个实时感知、动态控制与信息服务的多维异构复杂系统,即电网信息物理融合系统(电网CPS)。信息系统与电力系统的深度融合使得电网面临更多的网络威胁,在此背景下,本文提出了虚假数据注入攻击下的电网信息物理融合系统风险定量评估方法。针对攻击建立了数据流传递的电力信息安全模型,将攻击分为两个过程:首先选择变电站注入虚假数据,然后基于通信拓扑图构建了流传递路径,模拟攻击源信息传递模型。此外,采用攻击图量化攻击源信息传递模型,并基于故障下最优负荷削减策略对电力系统潜在后果进行了定量评估。最后通过算例研究,确定考虑网络攻击因素下系统的薄弱节点,验证了所提方法的可行性和有效性。
英文摘要:
      Due to the wide application of information and communication technology, the modern power grid has become a multi-dimensional heterogeneous complex system with real-time perception, dynamic control and information service, namely cyber physical power system(CPPS). Under the background of the deep integration of cyber system and power system, the power grid faces more network threats. In this context, a quantitative risk assessment method of grid cyber physical system under false data injection attack was proposed in this paper. Against the attack a power information security model for data flow delivery is established, which divides the attack into two processes: First, selecting the substation injection of false data, then based on the communication topology, a flow delivery path is constructed to simulate the attack source information transfer model. In addition, the attack graph is used to quantify the attack source information transfer model, and the potential consequences of the power system are quantitatively evaluated based on the optimal load reduction strategy under failure. Finally, through the case study, the weak nodes of the system were determined considering the factor of cyber-attack. It verifies the feasibility and effectiveness of the proposed method.
View Full Text   View/Add Comment  Download reader
Close
  • Home
  • About Journal
    • Historical evolution
    • Journal Honors
  • Editorial Board
    • Members of Committee
    • Director of the Committee
    • President and Editor in chief
  • Submission Guide
    • Instructions for Authors
    • Manuscript Processing Flow
    • Model Text
    • Procedures for Submission
  • Academic Influence
  • Open Access
  • Ethics&Policies
    • Publication Ethics Statement
    • Peer Review Process
    • Academic Misconduct Identification and Treatment
    • Advertising and Marketing
    • Correction and Retraction
    • Conflict of Interest
    • Authorship & Copyright
  • Contact Us
  • 中文页面
Address: No.2000, Chuangxin Road, Songbei District, Harbin, China    Zip code: 150028
E-mail: dcyb@vip.163.com    Telephone: 0451-86611021
© 2012 Electrical Measurement & Instrumentation
黑ICP备11006624号-1
Support:Beijing Qinyun Technology Development Co., Ltd