scholarly journals Security Risk Analysis of Active Distribution Networks with Large-Scale Controllable Loads under Malicious Attacks

Complexity ◽  
2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Jiaqi Liang ◽  
Yibei Wu ◽  
Jun’e Li ◽  
Xiong Chen ◽  
Heqin Tong ◽  
...  

With the development of distributed networks, the remote controllability of the distributed energy objects and the vulnerability of user-side information security protection measures make distributed energy objects extremely vulnerable to malicious control by attackers. Hence, the large-scale loads may produce abnormal operation performance, such as load casting/dropping synchronously or frequent and synchronous casting and dropping, and hence, it can threaten the security and stable operation of the distribution networks. First, we analyze the security threats faced by industrial controllable load, civil controllable load, and the gains and losses of attacks on the distribution networks. Considering the factors of cyber attacks, we propose a control model and cyber attack model in active distribution networks (ADNs). And, three types of attacks that the target suffered are defined on the basis of “on” and “off” modes for control. Then, the controllable load was maliciously controlled as the research object, and a suitable scenario is selected. The impact of malicious control of the controllable load on the power supply reliability and power quality of the distribution networks are simulated and analyzed, and risk consequences for different types of attacks are provided.

2020 ◽  
Vol 11 (1) ◽  
pp. 285
Author(s):  
Runze Wu ◽  
Jinxin Gong ◽  
Weiyue Tong ◽  
Bing Fan

As the coupling relationship between information systems and physical power grids is getting closer, various types of cyber attacks have increased the operational risks of a power cyber-physical System (CPS). In order to effectively evaluate this risk, this paper proposed a method of cross-domain propagation analysis of a power CPS risk based on reinforcement learning. First, the Fuzzy Petri Net (FPN) was used to establish an attack model, and Q-Learning was improved through FPN. The attack gain was defined from the attacker’s point of view to obtain the best attack path. On this basis, a quantitative indicator of information-physical cross-domain spreading risk was put forward to analyze the impact of cyber attacks on the real-time operation of the power grid. Finally, the simulation based on Institute of Electrical and Electronics Engineers (IEEE) 14 power distribution system verifies the effectiveness of the proposed risk assessment method.


2020 ◽  
pp. 1-24
Author(s):  
Argyrios Alexopoulos ◽  
Nicholas J. Daras

The paper documents, based mainly on [3]-[6] published papers where a consistent mathematical description of cyberspace and various types of Cyber-Attacks and protection measures are presented, a holistic mathematical approach to a rigorous description of Advanced Persistent Threat (APT) actors’ modus operandi through various scenarios and Cyber Kill Chain stages [2]. After referring [6] to the various elements of Cyber-Attacks we propose some techniques (via 5 scenarios) of tracking the modus operandi of the most sophisticated and non-linear cyber actors, the Advanced Persistent Threat actors that are usually nation-state or nation-state backed and usually stay undetected for an extended time in later stages of Cyber Kill Chain in defenders’ networks. Keywords: Valuation of cyber assets, vulnerability of cyber assets, node supervision, sophistication of an attack germ of cyber-attack, cyber defense, proactive cyber protection, Advanced Persistent Threat (APT) actors, Indication of Compromise (IOC), Tactics, Techniques and Procedures (TTPs).


2018 ◽  
Vol 3 (1) ◽  
pp. 1 ◽  
Author(s):  
Mounir Hafsa ◽  
Farah Jemili

Cybersecurity ventures expect that cyber-attack damage costs will rise to $11.5 billion in 2019 and that a business will fall victim to a cyber-attack every 14 seconds. Notice here that the time frame for such an event is seconds. With petabytes of data generated each day, this is a challenging task for traditional intrusion detection systems (IDSs). Protecting sensitive information is a major concern for both businesses and governments. Therefore, the need for a real-time, large-scale and effective IDS is a must. In this work, we present a cloud-based, fault tolerant, scalable and distributed IDS that uses Apache Spark Structured Streaming and its Machine Learning library (MLlib) to detect intrusions in real-time. To demonstrate the efficacy and effectivity of this system, we implement the proposed system within Microsoft Azure Cloud, as it provides both processing power and storage capabilities. A decision tree algorithm is used to predict the nature of incoming data. For this task, the use of the MAWILab dataset as a data source will give better insights about the system capabilities against cyber-attacks. The experimental results showed a 99.95% accuracy and more than 55,175 events per second were processed by the proposed system on a small cluster.


Energies ◽  
2020 ◽  
Vol 13 (5) ◽  
pp. 1257 ◽  
Author(s):  
Shi Chen ◽  
Hong Zhou ◽  
Jingang Lai ◽  
Yiwei Zhou ◽  
Chang Yu

The ideal distributed network composed of distributed generations (DGs) has unweighted and undirected interactions which omit the impact of the power grid structure and actual demand. Apparently, the coupling relationship between DGs, which is determined by line impedance, node voltage, and droop coefficient, is generally non-homogeneous. Motivated by this, this paper investigates the phase synchronization of an islanded network with large-scale DGs in a non-homogeneous condition. Furthermore, we explicitly deduce the critical coupling strength formula for different weighting cases via the synchronization condition. On this basis, three cases of Gaussian distribution, power-law distribution, and frequency-weighted distribution are analyzed. A synthetical analysis is also presented, which helps to identify the order parameter. Finally, this paper employs the numerical simulation methods to test the effectiveness of the critical coupling strength formula and the superiority over the power-law distribution.


2012 ◽  
Vol 433-440 ◽  
pp. 1802-1810 ◽  
Author(s):  
Lin Guan ◽  
Hao Hao Wang ◽  
Sheng Min Qiu

A new algorithm as well as the software design for large-scale distribution network reliability assessment is proposed in this paper. The algorithm, based on fault traversal algorithm, obtains network information from the GIS. The structure of distribution network data storage formats is described, facilitating automatic output of the feeders’ topological and corresponding information from the GIS. Also the judgment of load transfer is discussed and the method for reliability assessment introduced in this paper. Moreover, The impact of the scheduled outage is taken into account in the assessment model, making the results more in accordance with the actual situation. Test Cases show that the proposed method features good accuracy and effectiveness when applied to the reliability assessment of large-scale distribution networks.


Author(s):  
Himan Hamedi ◽  
◽  
Vahid Talavat ◽  
Ali Tofighi ◽  
Reza Ghanizadeh ◽  
...  

In this paper, the interaction between energy sellers and buyers in utilizing active distribution networks is modeled with considering two networked and non-networked modes of microgrids (MGs). A retail electricity market is modeled as a bi-level problem. Accordingly, the Distribution Company (DISCO) in the upper level in order to maximize the profit offers an optimal price to MGs. While in the lower level, the MGs to compare the offered prices by DISCO with the prices of MGs generation sources for minimizing the total costs decided to whether to buy from the DISCO or not. As the first contribution of the paper is to consider the networked operation of the MGs under a unique beneficiary of MGs (BMG). As the second contribution, two very important indices reserve and self-adequacy are considered, which are necessary in the problems related to MGs. In this paper, the impact of considering and disregarding two important reserve and self-adequacy indices of MGs on the profit of the DISCO in two different scenarios is investigated. In each scenario, the impact of considering two modes networked and non-networked of MGs on the profit of DISCO is investigated. Simulation results show the efficiency the presented model.


Sign in / Sign up

Export Citation Format

Share Document