Empirical framework for identification of the most harmful malicious attacks on a smart grid

@article{Albarakati2022EmpiricalFF,
  title={Empirical framework for identification of the most harmful malicious attacks on a smart grid},
  author={Aiman J. Albarakati and Marwan U. Bikdash},
  journal={Applied Network Science},
  year={2022},
  volume={7},
  pages={1-21}
}
The aim of this paper is the identification of the most harmful malicious attacks in a smart grid with basis on the removal of buses in a particular sequence. For that, we define the Electrical Most Damaging Element (EMDE) and the Iterated Centrality Measure (ICM). The EMDE is the element that leads to the largest unsatisfied load increase after removed, in the current state of the smart grid. The ICM is a meaningful scaled centrality for iterated attacks. Attack strategies such as the IEMDE… 
1 Citations

References

SHOWING 1-10 OF 67 REFERENCES

Cascade-based attack vulnerability on the US power grid.

Performance of Electric Power Systems Under Physical Malicious Attacks

TLDR
This paper focuses on deliberate acts aimed at the disruption of the electric power infrastructure and their impact on its operational capability by modeling of potential cascading events through calculation of transmission grid components' loading, a Monte Carlo simulation of hidden failures, and operator performance analysis based on a simple human reliability model.

A Bayesian Attack Tree Based Approach to Assess Cyber-Physical Security of Power System

  • Rounak Meyur
  • Computer Science
    2020 IEEE Texas Power and Energy Conference (TPEC)
  • 2020
TLDR
A Bayesian attack tree based approach is used to model cyber attacks in the SCADA network and the associated risk is evaluated as the combined effect on the communication and power system.

Revealing Cascading Failure Vulnerability in Power Grids Using Risk-Graph

TLDR
It is discovered that attack strategies that select target nodes (TNs) based on load and degree do not yield the strongest attacks, so a novel metric is proposed, called the risk graph, and novel attack strategies are developed that are much stronger than the load-based and degree-based attack strategies.

Review of major approaches to analyze vulnerability in power system

Cyber-physical attacks and defences in the smart grid: a survey

TLDR
This paper provides a comprehensive and systematic review of the critical attack threats and defence strategies in the smart grid, and focuses on prominent CP attack schemes with significant impact on the smartgrid operation and corresponding defense solutions.

The Concept of Betweenness in the Analysis of Power Grid Vulnerability

TLDR
An electrical betweenness metric is defined which considers several of specific features of power systems such as power transfer distribution and line flow limits and shows that the tested network is more vulnerable when the components of the network are attacked according to their criticalities ranked by electrical betweenhood.

Using hybrid attack graphs to model cyber-physical attacks in the Smart Grid

TLDR
A cyber-physical attack against a substation where the attacker causes a transformer to overheat is presented using a hybrid attack graph (HAG), which provides a means to model both the physical and cyber components of the attack.

Risk Assessment of Malicious Attacks Against Power Systems

TLDR
A mixed-strategy game-theory model able to capture the strategic interactions between malicious agents that may be willing to attack power systems and the system operators, with its related bodies, that are in charge of defending them is presented.

Robust Defense Strategy for Gas–Electric Systems Against Malicious Attacks

This paper proposes a methodology to identify and protect vulnerable components of connected gas and electric infrastructures from malicious attacks, and to guarantee a resilient operation by
...