Abstract

Price tamping attacks may cause market turbulence, attack detection and defense strategy are needed to study. Firstly, demand response characteristics are analyzed in a User Energy System. A quantitative model is established to describe the load changes caused by price tampering attacks. Secondly, a space-based cumulative intrusion detection method is proposed to pick up the discrepancy under tampering attacks. To verify the practicability of the proposed method, intrusion detection experiments are tested in the Principal Information and Safety Laboratory. Then, comprehensively considering the purchase of electricity from the power grid, self-generation, and load shedding, a quantitative model of attack consequences is established based on the allocation coefficient. Thus, the intrusion detection algorithm is used as a defense resource, and a demand-side defense protection strategy is formed to find an optimal deployment method based on non-cooperative game theory. The defensive protection strategy takes the quantitative model of attack consequences as the solution target, and solves the Nash equilibrium solution under different attack modes. Finally, in the IEEE-33 node system simulations, the defense resource is deployed using intrusion detection strategy, and the defense decision is executed to show the effectiveness of the comprehensive protection strategies.

Highlights

  • The cyber-physical system integrates the computing system, the communication network, and the physical environment through computation, communication, and control (3C) technology

  • Zhao et al (2010) indicates that The modern power system is no longer the traditional power equipment network. It develops into a power cyber-physical system (CPS) with various typical features

  • The main content of this article has the following aspects: 1) A cumulative error detection strategy based on normal distribution is designed to detect the price tampering attack by MITM attackers; 2) Based on the minimum comprehensive cost, a quantitative model of attack consequences is established which considers three demand-side response methods of purchasing power from the external grid, self-generation, and load shedding comprehensively; 3) A demand-side defense protection strategy based on game theory is established

Read more

Summary

INTRODUCTION

The cyber-physical system integrates the computing system, the communication network, and the physical environment through computation, communication, and control (3C) technology. The electricity consumed in an area consists of two parts-traditional power and local distributed new energy generation such as solar energy, wind energy, etc In this case, the regional electricity price can no longer be fixed to a certain value. As can be seen from Jie et al (2019), a Stackelberg game was used to model Man-In-The-Middle (MITM) attack mode They compared the financial loss and the effect of cyber security. It can be seen that the malicious bidding behavior realized by MITM attacks on electricity prices has gradually become a big problem It needs more attention and better solutions (Lin et al, 2013). Three demand-side response methods of purchasing power from the external grid, self-generation, and load shedding comprehensively; 3) A demand-side defense protection strategy based on game theory is established. The model uses the intrusion detection method to deploy defend resources, and sets the demandresponsive attack consequence quantitative model as the game target

Architecture of a User Energy System
Electricity Changes Under Price Tampering Attacks
INTRUSION DETECTION OF PRICE TAMPING ATTACKS
Basic Theory of Intrusion Detection
Cumulative Error Detection Based on Normal Distribution
Experiment Analysis
Demand-Side Response Model With Allocation Coefficient
Game Elements Design
Analysis of the Non-cooperative Game Process
Simulation Case
The Load Change Analysis
Attack Loss Quantification
Game Result Analysis
Findings
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.