{"title":"为负载重分配攻击问题的核心问题确定一个可利用的结构","authors":"Ramin Kaviani, K. Hedman","doi":"10.1109/NAPS46351.2019.9000221","DOIUrl":null,"url":null,"abstract":"Ahstract- This study identifies and proposes an exploitable linear programming model for the core problem of sophisticated attacker-defender load-redistribution (LR) attack problems. This model is developed by leveraging power system domain insight and fundamental knowledge of the physics laws in power systems. The main contribution of this study is to demonstrate the point that there is no reason to solve any complicated problem for attackers in LR attack problems since the attackers' strategy is strikingly simple and trivial for this type of attack, which could be the basis of developing detection mechanisms against this type of cyber-attacks. We applied the proposed model to the IEEE 118-Bus test case to create an LR attack and demonstrate its impact in order to show the applicability and accuracy of our work.","PeriodicalId":175719,"journal":{"name":"2019 North American Power Symposium (NAPS)","volume":"1085 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Identifying an Exploitable Structure for the Core Problem of Load-Redistribution Attack Problems\",\"authors\":\"Ramin Kaviani, K. Hedman\",\"doi\":\"10.1109/NAPS46351.2019.9000221\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Ahstract- This study identifies and proposes an exploitable linear programming model for the core problem of sophisticated attacker-defender load-redistribution (LR) attack problems. This model is developed by leveraging power system domain insight and fundamental knowledge of the physics laws in power systems. The main contribution of this study is to demonstrate the point that there is no reason to solve any complicated problem for attackers in LR attack problems since the attackers' strategy is strikingly simple and trivial for this type of attack, which could be the basis of developing detection mechanisms against this type of cyber-attacks. We applied the proposed model to the IEEE 118-Bus test case to create an LR attack and demonstrate its impact in order to show the applicability and accuracy of our work.\",\"PeriodicalId\":175719,\"journal\":{\"name\":\"2019 North American Power Symposium (NAPS)\",\"volume\":\"1085 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 North American Power Symposium (NAPS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NAPS46351.2019.9000221\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 North American Power Symposium (NAPS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NAPS46351.2019.9000221","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Identifying an Exploitable Structure for the Core Problem of Load-Redistribution Attack Problems
Ahstract- This study identifies and proposes an exploitable linear programming model for the core problem of sophisticated attacker-defender load-redistribution (LR) attack problems. This model is developed by leveraging power system domain insight and fundamental knowledge of the physics laws in power systems. The main contribution of this study is to demonstrate the point that there is no reason to solve any complicated problem for attackers in LR attack problems since the attackers' strategy is strikingly simple and trivial for this type of attack, which could be the basis of developing detection mechanisms against this type of cyber-attacks. We applied the proposed model to the IEEE 118-Bus test case to create an LR attack and demonstrate its impact in order to show the applicability and accuracy of our work.