分析多阶段网络威胁及其对电力系统的影响

IF 1.7 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS
Leen Al Homoud, Namrata Barpanda, Vinicius Bobato, Ana Goulart, Kate Davis, Mark Rice
{"title":"分析多阶段网络威胁及其对电力系统的影响","authors":"Leen Al Homoud,&nbsp;Namrata Barpanda,&nbsp;Vinicius Bobato,&nbsp;Ana Goulart,&nbsp;Kate Davis,&nbsp;Mark Rice","doi":"10.1049/cps2.12107","DOIUrl":null,"url":null,"abstract":"<p>Electric power systems are composed of physical and cyber sub-systems. The sub-systems depend on each other. If the cyber sub-system is compromised by a cyber threat, what is the impact on the physical system? This paper presents a case study that shows the steps of a multi-stage cyber threat involving a database injection attack, and what happens to the power system if this threat is not detected in its early stages. The threat first affects one utility but it can spread to the balancing authority, which is responsible for keeping the voltage and frequency stable in the power grid. During the cyber threat, the authors also show defence tools, such as a cyber-physical data fusion tool that displays and analyses power and cyber telemetry.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":1.7000,"publicationDate":"2025-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12107","citationCount":"0","resultStr":"{\"title\":\"Analysing a multi-stage cyber threat and its impact on the power system\",\"authors\":\"Leen Al Homoud,&nbsp;Namrata Barpanda,&nbsp;Vinicius Bobato,&nbsp;Ana Goulart,&nbsp;Kate Davis,&nbsp;Mark Rice\",\"doi\":\"10.1049/cps2.12107\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>Electric power systems are composed of physical and cyber sub-systems. The sub-systems depend on each other. If the cyber sub-system is compromised by a cyber threat, what is the impact on the physical system? This paper presents a case study that shows the steps of a multi-stage cyber threat involving a database injection attack, and what happens to the power system if this threat is not detected in its early stages. The threat first affects one utility but it can spread to the balancing authority, which is responsible for keeping the voltage and frequency stable in the power grid. During the cyber threat, the authors also show defence tools, such as a cyber-physical data fusion tool that displays and analyses power and cyber telemetry.</p>\",\"PeriodicalId\":36881,\"journal\":{\"name\":\"IET Cyber-Physical Systems: Theory and Applications\",\"volume\":\"10 1\",\"pages\":\"\"},\"PeriodicalIF\":1.7000,\"publicationDate\":\"2025-01-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12107\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IET Cyber-Physical Systems: Theory and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1049/cps2.12107\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Cyber-Physical Systems: Theory and Applications","FirstCategoryId":"1085","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1049/cps2.12107","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

电力系统由物理子系统和网络子系统组成。子系统相互依赖。如果网络子系统受到网络威胁,对物理系统的影响是什么?本文提出了一个案例研究,展示了涉及数据库注入攻击的多阶段网络威胁的步骤,以及如果在早期阶段未检测到这种威胁会对电力系统产生什么影响。这种威胁首先影响到一家公用事业公司,但它可以扩散到负责保持电网电压和频率稳定的平衡机构。在网络威胁期间,作者还展示了防御工具,例如显示和分析电力和网络遥测的网络物理数据融合工具。
本文章由计算机程序翻译,如有差异,请以英文原文为准。

Analysing a multi-stage cyber threat and its impact on the power system

Analysing a multi-stage cyber threat and its impact on the power system

Electric power systems are composed of physical and cyber sub-systems. The sub-systems depend on each other. If the cyber sub-system is compromised by a cyber threat, what is the impact on the physical system? This paper presents a case study that shows the steps of a multi-stage cyber threat involving a database injection attack, and what happens to the power system if this threat is not detected in its early stages. The threat first affects one utility but it can spread to the balancing authority, which is responsible for keeping the voltage and frequency stable in the power grid. During the cyber threat, the authors also show defence tools, such as a cyber-physical data fusion tool that displays and analyses power and cyber telemetry.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
IET Cyber-Physical Systems: Theory and Applications
IET Cyber-Physical Systems: Theory and Applications Computer Science-Computer Networks and Communications
CiteScore
5.40
自引率
6.70%
发文量
17
审稿时长
19 weeks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信