Filters








9,849 Hits in 3.5 sec

Modelling Load-Changing Attacks in Cyber-Physical Systems [article]

Luca Arnaboldi, Ricardo M. Czekster, Roberto Metere, Charles Morisset
2019 arXiv   pre-print
Cyber-Physical Systems (CPS) are present in many settings addressing a myriad of purposes.  ...  We demonstrate how our modelling approach can quantify the impact of a botnet attack and be abstracted for any CPS system involving power load management in a smart grid.  ...  Load changing attacks were mentioned in Dabrowski et al., 2017 [10] . In their work the authors have discussed a simulation concerning the impact that load changing has on power management.  ... 
arXiv:1911.12757v3 fatcat:yr63njjvs5bcjnfcsthl7kp37y

Modelling Load-Changing Attacks in Cyber-Physical Systems

Luca Arnaboldi, Ricardo M. Czekster, Charles Morisset, Roberto Metere
2020 Electronical Notes in Theoretical Computer Science  
Cyber-Physical Systems (CPS) are present in many settings addressing a myriad of purposes.  ...  We demonstrate how our modelling approach can quantify the impact of a botnet attack and be abstracted for any CPS system involving power load management in a smart grid.  ...  Load changing attacks were mentioned in Dabrowski et al., 2017 [10] . In their work the authors have discussed a simulation concerning the impact that load changing has on power management.  ... 
doi:10.1016/j.entcs.2020.09.018 fatcat:hfcpe4dqdngxlnde6ddhbzsri4

Implication of Unobservable State-and-topology Cyber-physical Attacks [article]

Jiazi Zhang, Lalitha Sankar
2015 arXiv   pre-print
This paper studies the physical consequences of a class of unobservable state-and-topology cyber-physical attacks in which both state and topology data for a sub-network of the network are changed by an  ...  It is shown that unobservable state-and-topology cyber-physical attacks as studied in this paper can make the system operation more vulnerable to line outages and failures.  ...  We compare the load shifts caused by the attacks in both the linear and nonlinear system models and find that the load shifts in the nonlinear system model track those in the linear system model for most  ... 
arXiv:1509.00520v1 fatcat:ocre6peaj5fdzftgmqwjp2mhry

Survivability Evaluation Method for Cascading Failure of Electric Cyber Physical System Considering Load Optimal Allocation

Zhaoyang Qu, Yunchang Dong, Nan Qu, Lei Wang, Yang Li, Yu Zhang, Sylvere Mugemanyi
2019 Mathematical Problems in Engineering  
The scale of the electric cyber physical system (ECPS) is continuously extending, and the existing cascade failure models ignore both the information flow and power flow transferring characteristics and  ...  In this paper, the quantitative evaluation method for cascading failure of ECPS survivability considering optimal load allocation is proposed.  ...  When the cyber system is attacked, it may cause the physical system components to malfunction or refuse to function.  ... 
doi:10.1155/2019/2817586 fatcat:2eer4cwq6vc2hcilws6vf5n6ey

A Game Theory-Based Approach for Vulnerability Analysis of a Cyber-Physical Power System

Chen, Wen, Tseng, Chen, Yang, Zhao, Shang
2019 Energies  
In a Cyber-Physical Power System (CPPS), the interaction between the power cyber system and the power physical system becomes more extensive and more in-depth.  ...  On this basis, the system cascading failure under potential attacks is analyzed, followed with an optimal load curtailment operation when in an emergency.  ...  Nomenclature P-node Physical node C-node Cyber node PP-link Physical-physical link CC-link Cyber-cyber link CP-link Cyber-physical link L The collection of load in the system L a The collection of controllable  ... 
doi:10.3390/en12153002 fatcat:eianilwfibhuhimvdchxbvvg6y

Modern power system reliability assessment with cyber-intrusion on heat pump systems

Hasan Gunduz, Dilan Jayaweera
2020 IET Smart Grid  
The cyber-detection and system recovery process with the presence of cyber-physical interactive operation models suggest that a significant level of impacts could be generated by the interactive operation  ...  of the attack.  ...  • A new algorithm is proposed for the reliability assessment of HP systems with cyber-physical interactive operations. • An enhanced cyber-intrusion process model is presented for cyber-physical system  ... 
doi:10.1049/iet-stg.2020.0094 fatcat:sr3ten6oxjfljfslbfhw4ftvqi

Enhancing Power System Cyber-Security with Systematic Two-Stage Detection Strategy [article]

Xingpeng Li, Kory W. Hedman
2019 arXiv   pre-print
Thus, it is very important to detect such cyber-attack. In this paper, multiple metrics are proposed to monitor abnormal load deviations and suspicious branch flow changes.  ...  Recent work in the literature shows malicious cyber-attack can inject false measurements that bypass traditional bad data detection in state estimation and cause actual overloads.  ...  Stage 1 determines whether the system is under an FDI cyber-attack by analyzing the load profile change pattern.  ... 
arXiv:1810.05939v4 fatcat:rd3kfaqjmnfzrphnfbh64es554

Robustness of Cyber-Physical Systems against Simultaneous, Sequential and Composite Attack

Pengshuai Cui, Peidong Zhu, Peng Xun, Chengcheng Shao
2018 Electronics  
In this paper, a failure model of Cyber-Physical systems and an attack model are proposed. We divide the attacks into three kinds: simultaneous attack, sequential attack and composite attack.  ...  Through numerical simulations, we find that: (1) the sequential attack may bring more damage in single physical systems; (2) the coupling process of cyber system and physical systems makes it possible  ...  Author Contributions: P.C. and P.Z. proposed the model and attack strategies. P.C. designed the experiment. P.C., P.X. and S.C. completed the experiments and analysis together.  ... 
doi:10.3390/electronics7090196 fatcat:ekuqk635ufdrtlbvutuve2cb2q

Source-Load Coordinated Reserve Allocation Strategy Considering Cyber-Attack Risks

Qi Wang, Mengya Li, Yi Tang, Ming Ni
2019 IEEE Access  
With the developing cyber physical power systems and emerging threat of cyber-attacks, the traditional power services are faced with higher risks of being compromised, as vulnerabilities in cyber infrastructure  ...  INDEX TERMS Attack mitigation, cyber physical system security, coordinated control, risk assessment.  ...  Section II establishes the cyber-attack models for cyber and physical side, and performs vulnerability analysis in the service scenarios.  ... 
doi:10.1109/access.2019.2934646 fatcat:oky5d3xq2rcr7e53bak3i6qzrm

Social Collective Attack Model and Procedures for Large-Scale Cyber-Physical Systems

Peidong Zhu, Peng Xun, Yifan Hu, Yinqiao Xiong
2021 Sensors  
A large-scale Cyber-Physical System (CPS) such as a smart grid usually provides service to a vast number of users as a public utility.  ...  To provide a systematic description framework for such threats, we extend MITRE ATT&CK, the most used cyber adversary behavior modeling framework, to cover social, cyber, and physical domains.  ...  Figure 4 . 4 Social-cyber-physical: attack initiated from the social domain. Figure 5 . 5 Cyber-Physical System (CPS) model with social domains.  ... 
doi:10.3390/s21030991 pmid:33540605 fatcat:lju7phxfovf3xl5q3b4inwcoeu

Towards a Framework for Cyber Attack Impact Analysis of the Electric Smart Grid

Deepa Kundur, Xianyong Feng, Shan Liu, Takis Zourntos, Karen L. Butler-Purry
2010 2010 First IEEE International Conference on Smart Grid Communications  
We focus on the model synthesis stage in which both cyber and physical grid entity relationships are modeled as directed graphs.  ...  Each node of the graph has associated state information that is governed by dynamical system equations that model the physics of the interaction (for electrical grid components) or functionality (for cyber  ...  However, as cited in [32] , purely graphbased approaches do not sufficiently model the state changes within the physical system.  ... 
doi:10.1109/smartgrid.2010.5622049 fatcat:ir5ubl2vybdprd5ibzhptxozna

Cyber-physical risk modeling with imperfect cyber-attackers [article]

Efthymios Karangelos, Louis Wehenkel
2021 arXiv   pre-print
We model the risk posed by a malicious cyber-attacker seeking to induce grid insecurity by means of a load redistribution attack, while explicitly acknowledging that such an actor would plausibly base  ...  We also find common attacked cyber-assets and common affected physical-assets between all (random) imperfect cyber-attacks, which could be exploited in a preventive and/or corrective sense for effective  ...  Zhang and Sankar developed in [7] an elaborate bilevel formulation for an attacker using load redistribution in order to hide a physical change in the grid topology, while a model of an attacker seeking  ... 
arXiv:2110.00301v1 fatcat:hcmasfgzpvc6bae7ha2yfulgai

Resilience Evaluation of Demand Response as Spinning Reserve under Cyber-Physical Threats

Anas AlMajali, Arun Viswanathan, Clifford Neuman
2016 Electronics  
We quantify this evaluation by correlating the stability of the system in the presence of attacks measured by system frequency (Hz) and attack level measured by the amount of load (MW) that responds to  ...  In this paper, we evaluate the resilience of demand response when used as spinning reserve in the presence of cyber-physical threats.  ...  Abbreviations The following abbreviations are used in this manuscript:  ... 
doi:10.3390/electronics6010002 fatcat:mtrbidp4prhrlduxfbwujtrzde

Towards modelling the impact of cyber attacks on a smart grid

D. Kundur, X. Feng, S. Mashayekh, S. Liu, T. Zourntos, K.L. Butler Purry
2011 International Journal of Security and Networks (IJSN)  
This paper provides an introduction to cyber attack impact analysis in the smart grid and highlights existing research in the field.  ...  Each node of the graph has associated state information that is governed by dynamical system equations that model the physics of the interaction (for electrical grid components) or functionality (for cyber  ...  However, as cited in Ekstedt and Sommestad (2009) , purely graph-based approaches do not sufficiently model the state changes within the physical system.  ... 
doi:10.1504/ijsn.2011.039629 fatcat:eyh74pdedneyrgvp72nwyfdwyu

Study on Attack Paths of Cyber Attack in Cyber-Physical Power Systems

Lei Chen, Dong Yue, Chunxia Dou, Jianbo Chen, Zihao Cheng
2020 IET Generation, Transmission & Distribution  
By means of advanced information and communication technology, cyber-physical power systems can attain realtime monitor and control but have to suffer the damage caused by a cyber attack.  ...  In the attack model, the attack cost matrix is built to describe the cost between directly connected nodes in a communication network.  ...  Model description In this section, we introduce the cyber-physical power systems model and failure model in systems.  ... 
doi:10.1049/iet-gtd.2019.1330 fatcat:vtl2552fw5hdbf7nuf4ow3qvg4
« Previous Showing results 1 — 15 out of 9,849 results