Abstract

The quick development of smart grids coupled with IoT devices has opened breaches of security leading to cyberattacks done by attackers with different purposes. In this study, a behavior model is proposed to investigate the risk of cyber attacks on power grids, where the utility value is determined by subjective attack attitude and characteristics of candidate targets firstly, and then the behaviors of attack target selection and attack resource allocation are described by the probability response and utility attenuation model respectively based on data analysis of historical events. The simulation results on RTS79 system indicate that the risk and the vulnerable nodes of the power grid vary with the characteristics of attack behaviors and characteristic attributes of targets, which should be considered in the cyber security defense dynamically.

Highlights

  • With the quick development of Internet of Things and communication technologies, the coverage of intelligent devices allocated in power grids is expanding [1], [2] and the interaction between external and internal parts of the system is booming

  • The Venezuelan Blackout in Mar 2019 reminds the world again that smart grids are at severely heightened risk of cyberattacks and it is of great significance to take recognition and precaution measures against the risk

  • A behavior model is proposed to investigate the risk of cyberattacks on power grids

Read more

Summary

INTRODUCTION

With the quick development of Internet of Things and communication technologies, the coverage of intelligent devices allocated in power grids is expanding [1], [2] and the interaction between external and internal parts of the system is booming. There has been a number of studies on risk assessment for cyberattacks on power systems with different models of implementation process, intention and strategies of cyberattacks. B. Chen et al.: Risk Assessment of Cyber Attacks on Power Grids Considering the Characteristics of Attack Behaviors allocation [22], [29], Markov game for dynamic attack modeling [23]–[25], Tri-level programming model for vulnerability assessment and component protection [26]–[28]. According to the regional characteristic of attacks, the probability response model and utility attenuation model are proposed to analyze the attack target selection behavior based on utility value and data analysis of historical events, the attack resource allocation behavior are analyzed based on the result of selection, and the probabilities of successful attacks are calculated based on attack-defense efficiency analysis; With the uncertainty of the attack capability and number of attack targets, a risk assessment method considering the characteristics of attack behaviors is presented showing the risk distribution of the system when confronting different attacking behaviors

ATTACK ON CYBER SYSTEM
SELECTION OF ATTACK TARGETS
NUMBER OF ATTACK TARGETS
RESOURCE ALLOCATION AND PROBABILITY OF SUCCESSFUL ATTACK
ATTACK CONSEQUENCE
DEFINITION OF RISK INDEX
RISK ASSESSMENT PROCESS
NUMERICAL SIMULATIONS
Findings
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.