考虑攻击资源不确定性的变电站网络攻击防御策略

IF 6.1 1区 工程技术 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC
Tianlei Zang;Yujian Xiao;Yunfei Liu;Shijun Wang;Zi'an Wang;Yi Zhou
{"title":"考虑攻击资源不确定性的变电站网络攻击防御策略","authors":"Tianlei Zang;Yujian Xiao;Yunfei Liu;Shijun Wang;Zi'an Wang;Yi Zhou","doi":"10.35833/MPCE.2024.000375","DOIUrl":null,"url":null,"abstract":"With the rapid integration of communication and information technology into substations, the risk of cyber attacks has significantly increased. Attackers may infiltrate sub-station networks, manipulate switches, and disrupt power lines, potentially causing severe damage to the power system. To minimize such risks, this paper proposes a three-layer defender-attacker-defender (DAD) model for optimally allocating limited defensive resources to substations. To model the uncertainty surrounding the knowledge of defender of potential attacks in real-world scenarios, we employ a fuzzy analytic hierarchy process combined with the decision-making trial and evaluation laboratory (FAHP-DEMATEL). This method accounts for the attack resource uncertainty by utilizing intelligence data on factors potentially influenced by attackers, which serves as an evaluation metric to simulate the likelihood of various attack scenarios. These uncertainty probabilities are then incorporated into the substation DAD model consisting three layers of agents: the decision-maker., the attacker, and the operator. The decision-maker devises a defense strategy before the attack, while the attacker aims to identify the strategy that causes the maximum load loss. Meanwhile, the operator seeks to minimize the load loss through optimal power flow scheduling. To solve the model, the original problem is transformed into a two-layer subproblem and a single-layer master problem, which are solved iteratively using a column-and-constraint generation algorithm. Case studies conducted on the IEEE RTS-96 system and the IEEE 118-node system demonstrate the effectiveness and practicality of the proposed model. Comparative experiments further highlight the advantages of the proposed model.","PeriodicalId":51326,"journal":{"name":"Journal of Modern Power Systems and Clean Energy","volume":"13 4","pages":"1335-1346"},"PeriodicalIF":6.1000,"publicationDate":"2025-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10847935","citationCount":"0","resultStr":"{\"title\":\"Defense Strategy Against Cyber Attacks on Substations Considering Attack Resource Uncertainty\",\"authors\":\"Tianlei Zang;Yujian Xiao;Yunfei Liu;Shijun Wang;Zi'an Wang;Yi Zhou\",\"doi\":\"10.35833/MPCE.2024.000375\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the rapid integration of communication and information technology into substations, the risk of cyber attacks has significantly increased. Attackers may infiltrate sub-station networks, manipulate switches, and disrupt power lines, potentially causing severe damage to the power system. To minimize such risks, this paper proposes a three-layer defender-attacker-defender (DAD) model for optimally allocating limited defensive resources to substations. To model the uncertainty surrounding the knowledge of defender of potential attacks in real-world scenarios, we employ a fuzzy analytic hierarchy process combined with the decision-making trial and evaluation laboratory (FAHP-DEMATEL). This method accounts for the attack resource uncertainty by utilizing intelligence data on factors potentially influenced by attackers, which serves as an evaluation metric to simulate the likelihood of various attack scenarios. These uncertainty probabilities are then incorporated into the substation DAD model consisting three layers of agents: the decision-maker., the attacker, and the operator. The decision-maker devises a defense strategy before the attack, while the attacker aims to identify the strategy that causes the maximum load loss. Meanwhile, the operator seeks to minimize the load loss through optimal power flow scheduling. To solve the model, the original problem is transformed into a two-layer subproblem and a single-layer master problem, which are solved iteratively using a column-and-constraint generation algorithm. Case studies conducted on the IEEE RTS-96 system and the IEEE 118-node system demonstrate the effectiveness and practicality of the proposed model. Comparative experiments further highlight the advantages of the proposed model.\",\"PeriodicalId\":51326,\"journal\":{\"name\":\"Journal of Modern Power Systems and Clean Energy\",\"volume\":\"13 4\",\"pages\":\"1335-1346\"},\"PeriodicalIF\":6.1000,\"publicationDate\":\"2025-01-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10847935\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Modern Power Systems and Clean Energy\",\"FirstCategoryId\":\"5\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10847935/\",\"RegionNum\":1,\"RegionCategory\":\"工程技术\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"ENGINEERING, ELECTRICAL & ELECTRONIC\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Modern Power Systems and Clean Energy","FirstCategoryId":"5","ListUrlMain":"https://ieeexplore.ieee.org/document/10847935/","RegionNum":1,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

摘要

随着通信和信息技术迅速融入变电站,网络攻击的风险显著增加。攻击者可能渗透到变电站网络,操纵交换机,破坏电力线路,对电力系统造成潜在的严重破坏。为了最大限度地降低这种风险,本文提出了一个三层防御者-攻击者-防御者(DAD)模型,以优化分配有限的防御资源给变电站。为了对现实世界中潜在攻击防御者知识的不确定性进行建模,我们采用了模糊层次分析法结合决策试验和评估实验室(FAHP-DEMATEL)。该方法利用攻击者潜在影响因素的情报数据来考虑攻击资源的不确定性,作为模拟各种攻击场景可能性的评估指标。然后将这些不确定性概率合并到变电站DAD模型中,该模型由三层代理组成:决策者。攻击者和操作者。决策者在攻击前设计了防御策略,而攻击者的目标是识别导致最大负载损失的策略。同时,通过优化潮流调度,使负荷损失最小化。为了求解该模型,将原问题转化为两层子问题和单层主问题,采用列约束生成算法迭代求解。以IEEE RTS-96系统和IEEE 118节点系统为例,验证了该模型的有效性和实用性。对比实验进一步突出了该模型的优越性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Defense Strategy Against Cyber Attacks on Substations Considering Attack Resource Uncertainty
With the rapid integration of communication and information technology into substations, the risk of cyber attacks has significantly increased. Attackers may infiltrate sub-station networks, manipulate switches, and disrupt power lines, potentially causing severe damage to the power system. To minimize such risks, this paper proposes a three-layer defender-attacker-defender (DAD) model for optimally allocating limited defensive resources to substations. To model the uncertainty surrounding the knowledge of defender of potential attacks in real-world scenarios, we employ a fuzzy analytic hierarchy process combined with the decision-making trial and evaluation laboratory (FAHP-DEMATEL). This method accounts for the attack resource uncertainty by utilizing intelligence data on factors potentially influenced by attackers, which serves as an evaluation metric to simulate the likelihood of various attack scenarios. These uncertainty probabilities are then incorporated into the substation DAD model consisting three layers of agents: the decision-maker., the attacker, and the operator. The decision-maker devises a defense strategy before the attack, while the attacker aims to identify the strategy that causes the maximum load loss. Meanwhile, the operator seeks to minimize the load loss through optimal power flow scheduling. To solve the model, the original problem is transformed into a two-layer subproblem and a single-layer master problem, which are solved iteratively using a column-and-constraint generation algorithm. Case studies conducted on the IEEE RTS-96 system and the IEEE 118-node system demonstrate the effectiveness and practicality of the proposed model. Comparative experiments further highlight the advantages of the proposed model.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Journal of Modern Power Systems and Clean Energy
Journal of Modern Power Systems and Clean Energy ENGINEERING, ELECTRICAL & ELECTRONIC-
CiteScore
12.30
自引率
14.30%
发文量
97
审稿时长
13 weeks
期刊介绍: Journal of Modern Power Systems and Clean Energy (MPCE), commencing from June, 2013, is a newly established, peer-reviewed and quarterly published journal in English. It is the first international power engineering journal originated in mainland China. MPCE publishes original papers, short letters and review articles in the field of modern power systems with focus on smart grid technology and renewable energy integration, etc.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信