...
首页> 外文期刊>Smart Grid, IEEE Transactions on >Sequential-Mining-Based Vulnerable Branches Identification for the Transmission Network Under Continuous Load Redistribution Attacks
【24h】

Sequential-Mining-Based Vulnerable Branches Identification for the Transmission Network Under Continuous Load Redistribution Attacks

机译:连续负载再分配攻击下传输网络的顺序挖掘脆弱分支识别

获取原文
获取原文并翻译 | 示例
           

摘要

Load redistribution (LR) attacks represent a major cyber threat to the power grid that can result in branch overloads and even cascading failures in the transmission network by injecting false data to load bus power injection and line power flow measurements. While the mechanism and defense strategies have been well studied for single-occurrence (i.e., discrete) LR attacks, this paper focuses on a yet unexplored category of LR attacks, namely, the continuous LR (CLR) attack, which continuously injects time-varying false data to one or more bus and branch measurements within the system for a certain period of time. To cope with the potentially ever-changing targeted branches (i.e., the branches under attack) and system vulnerability features caused by CLR attacks, this paper takes a different route from the traditional LR defense and mitigation approaches. We propose a novel correlation chain model to capture the vulnerability correlations among branches under the CLR attack. Then, a dynamic sequential-mining algorithm (DSMA) with top-k structure is proposed based on the specific nature of the CLR attack, to mine the historical SCADA measurement database, extract vulnerable branch sequences, and identify the most suitable branches to defend preventively. Simulation studies are conducted on IEEE RTS-96 system to evaluate the effectiveness of the proposed approach in terms of increasing attack costs for the attackers and reducing the potential impacts of CLR attacks.
机译:负载再分配(LR)攻击代表对电网的主要网络威胁,可以通过注入传输网络中的分支过载和级联故障来注入用于负载总线功率注入和线路电流测量来实现传输网络中的级联故障。虽然机制和防御策略已经很好地研究了单一事件(即离散的)LR攻击,但本文重点介绍了一个尚未开发的LR攻击,即连续的LR(CLR)攻击,这连续注射时变虚假数据到一个或多个总线和系统内的分支测量一段时间。为了应对可能不断变化的目标分支(即,攻击的分支机构)和由CLR攻击引起的系统漏洞功能,本文从传统的LR防御和缓解方法采取不同的路线。我们提出了一种新的相关链模型,以捕获CLR攻击下分支机构之间的脆弱性相关性。然后,基于CLR攻击的特定性质提出了一种具有TOP-K结构的动态顺序挖掘算法(DSMA),以挖掘历史SCADA测量数据库,提取易受攻击的分支序列,并识别最合适的分支以预防地防御。在IEEE RTS-96系统上进行了仿真研究,以评估所提出的方法的有效性,以提高攻击者的攻击成本,减少CLR攻击的潜在影响。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号