A Review on Cybersecurity Analysis, Attack Detection, and Attack Defense Methods in Cyber-physical Power Systems

نویسندگان

چکیده

Potential malicious cyber-attacks to power systems which are connected a wide range of stakeholders from the top tail will impose significant societal risks and challenges. The timely detection defense crucial importance for safe reliable operation cyber-physical (CPPSs). This paper presents comprehensive review some latest attack strategies. Firstly, vulnerabilities brought by new information communication technologies (ICTs) analyzed, their impacts on security CPPSs discussed. Various cyber physical layers then analyzed within framework, features negative Secondly, two current mainstream methods including state estimation based machine learning benefits drawbacks Moreover, active passive comprehensively Finally, trends challenges in strategies provided.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Vulnerability Analysis of Power Systems Based on Cyber-Attack and Defense Models

Reliable operation of power systems is a primary challenge for the system operators. With the advancement in technology and grid automation, power systems are becoming more vulnerable to cyber-attacks. The main goal of adversaries is to take advantage of these vulnerabilities and destabilize the system. This paper describes a game-theoretic approach to attacker / defender modeling in power syst...

متن کامل

Attack and Defense : Improving Cybersecurity by 2014

tight and could turn on the tiniest misstep. Rep. Hill has a secret: She has been diagnosed with the early signs of Alzheimer's disease the past summer. Based on her doctor's diagnosis of slow progression that can be treated with experimental drugs, Rep. Hill has decided to stay in the race. Joe Cracker has an agenda: he does not want Rep. Hill elected to the Senate. He is strongly opposed to m...

متن کامل

Review of Attack Detection Scheme for Cyber Physical Security System

Cyber-Physical Systems (CPSs) are characterized by integrating computation and physical processes. The theories and applications of CPSs face the enormous challenges that are (1) general workflow of cyber physical systems, (2) identifying the unique properties of cyber-physical systems and (3) discussing security mechanisms applicable to cyber physical systems. In particular, we analyze and we ...

متن کامل

Deception in defense of computer systems from cyber-attack

While computer systems can be quite susceptible to deception by attackers, deception by defenders has increasingly been investigated in recent years. Military history has classic examples of defensive deceptions, but not all tactics and strategies have analogies in cyberspace. Honeypots are the most important example today; they are decoy computer systems designed to encourage attacks to collec...

متن کامل

Game-Theoretic Analysis of Attack and Defense in Cyber-Physical Network Infrastructures

Critical infrastructures rely on cyber and physical components that are both subject to natural, incidental or intentional degradations. Game theory has been used in studying the strategic interactions between attackers and defenders for critical infrastructure protection, but has not been extensively used in complex cyber-physical networks. This paper fills the gap by modeling the probabilitie...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of modern power systems and clean energy

سال: 2023

ISSN: ['2196-5420', '2196-5625']

DOI: https://doi.org/10.35833/mpce.2021.000604