Skip to main content
Top

2020 | OriginalPaper | Chapter

The Petri Net Based Probability Transfer Analysis of Cyber-Physical Power System Under False Data Injection Attacks

Authors : Xiaofei Zhang, Luolin Zheng, Rui Zhou

Published in: Proceedings of PURPLE MOUNTAIN FORUM 2019-International Forum on Smart Grid Protection and Control

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Since the physical equipment inside the substation may be uncontrollable due to malicious attacks, which affects the state estimation of the system and the reliability of related advanced analysis and decision functions, this paper models the substation system based on Petri net and analyzes the system under false data injection. The probability distribution characteristics of each device being attacked. Focus on the attack mode under the false data injection attack, Petri net provides a solid foundation for CPS modeling. We first describe the typical attack scenarios in the substation, Secondly, the Petri net is used to refine the important equipment in the cyber system, and based on the observed real-time attack events, attack graph is used to dynamically update the attack behavior probability. Finally, the optimal load control strategy considering node failure is proposed to comprehensively and evaluate the impact of false data injection attack, the results show that the probability distribution of equipment attack in substation under false data injection is consistent with Poisson distribution.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Guo Q, Xin S, Sun H et al (2016) Power system cyber-physical modeling and security assessment; motivation and ideas. Proc CSEE 36(6):1481–1488 Guo Q, Xin S, Sun H et al (2016) Power system cyber-physical modeling and security assessment; motivation and ideas. Proc CSEE 36(6):1481–1488
5.
go back to reference Sridhar S, Hahn A, Govindarasu M (2011) Cyber-physical system security for the electric power grid. Proc IEEE 100(1):210–224 Sridhar S, Hahn A, Govindarasu M (2011) Cyber-physical system security for the electric power grid. Proc IEEE 100(1):210–224
6.
go back to reference Liu N, Zhang J, Zhang H et al (2010) Security assessment for communication networks of power control systems using attack graph and MCDM. IEEE Trans Power Delivery 25(3):1492–1500CrossRef Liu N, Zhang J, Zhang H et al (2010) Security assessment for communication networks of power control systems using attack graph and MCDM. IEEE Trans Power Delivery 25(3):1492–1500CrossRef
7.
go back to reference Ten C-W, Liu C-C, Manimaran G (2008) Vulnerability assessment of cybersecurity for SCADA systems. IEEE Trans Power Syst 23(4):1836–1846CrossRef Ten C-W, Liu C-C, Manimaran G (2008) Vulnerability assessment of cybersecurity for SCADA systems. IEEE Trans Power Syst 23(4):1836–1846CrossRef
8.
go back to reference Li Q, Sun H, Sheng T, Zhang B, Wu W, Guo Q (2016) Analysis of transformer false data injection attack in substation state estimation. Autom Electr Power Syst 40(17):79–86 Li Q, Sun H, Sheng T, Zhang B, Wu W, Guo Q (2016) Analysis of transformer false data injection attack in substation state estimation. Autom Electr Power Syst 40(17):79–86
9.
go back to reference Tong X, Wang X (2016) Thoughts on network attacks caused by Ukrainian blackouts and grid information security. Autom Electr Power Syst 40(07):144–148 Tong X, Wang X (2016) Thoughts on network attacks caused by Ukrainian blackouts and grid information security. Autom Electr Power Syst 40(07):144–148
10.
go back to reference Liu N, Yu X, Zhang J (2016) Network synergy attack: deduction and enlightenment of Ukrainian blackout event. Autom Electr Power Syst 40(06):144–147 Liu N, Yu X, Zhang J (2016) Network synergy attack: deduction and enlightenment of Ukrainian blackout event. Autom Electr Power Syst 40(06):144–147
Metadata
Title
The Petri Net Based Probability Transfer Analysis of Cyber-Physical Power System Under False Data Injection Attacks
Authors
Xiaofei Zhang
Luolin Zheng
Rui Zhou
Copyright Year
2020
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-13-9779-0_70