Cyber-attack research for integrated energy systems by the correlated matrix based object-oriented modeling method

The rise of an integrated energy system requires the integration of multiple sources of energy to be embraced and transited over the power grid; that means the information and communication systems of traditional power systems will be extended, and their complexity will be increased. As the informat...

Full description

Bibliographic Details
Main Authors: Heqin Tong, Jianbing Xu, Xiao Li, Liquan Zhang
Format: Article
Language:English
Published: Frontiers Media S.A. 2022-08-01
Series:Frontiers in Energy Research
Subjects:
Online Access:https://www.frontiersin.org/articles/10.3389/fenrg.2022.774645/full
_version_ 1811339786979377152
author Heqin Tong
Heqin Tong
Heqin Tong
Jianbing Xu
Jianbing Xu
Jianbing Xu
Xiao Li
Xiao Li
Xiao Li
Liquan Zhang
Liquan Zhang
Liquan Zhang
author_facet Heqin Tong
Heqin Tong
Heqin Tong
Jianbing Xu
Jianbing Xu
Jianbing Xu
Xiao Li
Xiao Li
Xiao Li
Liquan Zhang
Liquan Zhang
Liquan Zhang
author_sort Heqin Tong
collection DOAJ
description The rise of an integrated energy system requires the integration of multiple sources of energy to be embraced and transited over the power grid; that means the information and communication systems of traditional power systems will be extended, and their complexity will be increased. As the information and communication systems play a more important role in the infrastructure of the power system, a cyber-attack on them may have an impact on the power system and cause a serious threat to the integrated energy system. To analyze the threat to the complex and integrated system, some researchers provide some modeling methods to study the impact of cyber-attacks on the information and communication systems, such as the Attack Tree Model, Attack Graph Model, Petri Net Model for cyber-attack, Attack Description Language Model, State Transition Graph Model, etc. However, these modeling methods have some shortcomings. For example, they cannot describe the systematical cyber-attack and show the secure status during the cyber-attack; it is hard for them to analyze the larger and more complicated information and communication systems. To overcome the shortages, in this paper, a correlated matrix-based object-oriented model is proposed for cyber-attack modeling. With this model, the relationship between the attacker and victim can be directly built; the cyber-attack path and packets from the attacker can be tracked; and the status of the nodes and links can be shown during a cyber-attack. There are two steps to build the cyber-attack model. Firstly, the procedure and approach of the cyber-attack will be modeled by an object-oriented method; then, a correlated matrix model will be built for network topology, attack path, and attack procedure. By combining these two models, the whole cyber-attack model is created. Finally, to demonstrate the modeling method and its benefits, we use the MITM (Man-in-the-middle Attack) attack on measurement data of an AVC (Automation Voltage Control) system as examples, and build a hardware-in-the-loop (HIL) co-simulation platform to verify the model.
first_indexed 2024-04-13T18:31:45Z
format Article
id doaj.art-c8c4d47e99c944d387a13f0ba4e1086a
institution Directory Open Access Journal
issn 2296-598X
language English
last_indexed 2024-04-13T18:31:45Z
publishDate 2022-08-01
publisher Frontiers Media S.A.
record_format Article
series Frontiers in Energy Research
spelling doaj.art-c8c4d47e99c944d387a13f0ba4e1086a2022-12-22T02:35:03ZengFrontiers Media S.A.Frontiers in Energy Research2296-598X2022-08-011010.3389/fenrg.2022.774645774645Cyber-attack research for integrated energy systems by the correlated matrix based object-oriented modeling methodHeqin Tong0Heqin Tong1Heqin Tong2Jianbing Xu3Jianbing Xu4Jianbing Xu5Xiao Li6Xiao Li7Xiao Li8Liquan Zhang9Liquan Zhang10Liquan Zhang11State Grid Electric Power Research Institute, Nanjing, ChinaNARI Group Corporation, Nanjing, ChinaNARI Technology Co., Ltd., Nanjing, ChinaState Grid Electric Power Research Institute, Nanjing, ChinaNARI Group Corporation, Nanjing, ChinaNARI Technology Co., Ltd., Nanjing, ChinaState Grid Electric Power Research Institute, Nanjing, ChinaNARI Group Corporation, Nanjing, ChinaNARI Technology Co., Ltd., Nanjing, ChinaState Grid Electric Power Research Institute, Nanjing, ChinaNARI Group Corporation, Nanjing, ChinaNARI Technology Co., Ltd., Nanjing, ChinaThe rise of an integrated energy system requires the integration of multiple sources of energy to be embraced and transited over the power grid; that means the information and communication systems of traditional power systems will be extended, and their complexity will be increased. As the information and communication systems play a more important role in the infrastructure of the power system, a cyber-attack on them may have an impact on the power system and cause a serious threat to the integrated energy system. To analyze the threat to the complex and integrated system, some researchers provide some modeling methods to study the impact of cyber-attacks on the information and communication systems, such as the Attack Tree Model, Attack Graph Model, Petri Net Model for cyber-attack, Attack Description Language Model, State Transition Graph Model, etc. However, these modeling methods have some shortcomings. For example, they cannot describe the systematical cyber-attack and show the secure status during the cyber-attack; it is hard for them to analyze the larger and more complicated information and communication systems. To overcome the shortages, in this paper, a correlated matrix-based object-oriented model is proposed for cyber-attack modeling. With this model, the relationship between the attacker and victim can be directly built; the cyber-attack path and packets from the attacker can be tracked; and the status of the nodes and links can be shown during a cyber-attack. There are two steps to build the cyber-attack model. Firstly, the procedure and approach of the cyber-attack will be modeled by an object-oriented method; then, a correlated matrix model will be built for network topology, attack path, and attack procedure. By combining these two models, the whole cyber-attack model is created. Finally, to demonstrate the modeling method and its benefits, we use the MITM (Man-in-the-middle Attack) attack on measurement data of an AVC (Automation Voltage Control) system as examples, and build a hardware-in-the-loop (HIL) co-simulation platform to verify the model.https://www.frontiersin.org/articles/10.3389/fenrg.2022.774645/fullintegrated energy systemobject-oriented methodcorrelation matrixcyber-attackautomation voltage control system
spellingShingle Heqin Tong
Heqin Tong
Heqin Tong
Jianbing Xu
Jianbing Xu
Jianbing Xu
Xiao Li
Xiao Li
Xiao Li
Liquan Zhang
Liquan Zhang
Liquan Zhang
Cyber-attack research for integrated energy systems by the correlated matrix based object-oriented modeling method
Frontiers in Energy Research
integrated energy system
object-oriented method
correlation matrix
cyber-attack
automation voltage control system
title Cyber-attack research for integrated energy systems by the correlated matrix based object-oriented modeling method
title_full Cyber-attack research for integrated energy systems by the correlated matrix based object-oriented modeling method
title_fullStr Cyber-attack research for integrated energy systems by the correlated matrix based object-oriented modeling method
title_full_unstemmed Cyber-attack research for integrated energy systems by the correlated matrix based object-oriented modeling method
title_short Cyber-attack research for integrated energy systems by the correlated matrix based object-oriented modeling method
title_sort cyber attack research for integrated energy systems by the correlated matrix based object oriented modeling method
topic integrated energy system
object-oriented method
correlation matrix
cyber-attack
automation voltage control system
url https://www.frontiersin.org/articles/10.3389/fenrg.2022.774645/full
work_keys_str_mv AT heqintong cyberattackresearchforintegratedenergysystemsbythecorrelatedmatrixbasedobjectorientedmodelingmethod
AT heqintong cyberattackresearchforintegratedenergysystemsbythecorrelatedmatrixbasedobjectorientedmodelingmethod
AT heqintong cyberattackresearchforintegratedenergysystemsbythecorrelatedmatrixbasedobjectorientedmodelingmethod
AT jianbingxu cyberattackresearchforintegratedenergysystemsbythecorrelatedmatrixbasedobjectorientedmodelingmethod
AT jianbingxu cyberattackresearchforintegratedenergysystemsbythecorrelatedmatrixbasedobjectorientedmodelingmethod
AT jianbingxu cyberattackresearchforintegratedenergysystemsbythecorrelatedmatrixbasedobjectorientedmodelingmethod
AT xiaoli cyberattackresearchforintegratedenergysystemsbythecorrelatedmatrixbasedobjectorientedmodelingmethod
AT xiaoli cyberattackresearchforintegratedenergysystemsbythecorrelatedmatrixbasedobjectorientedmodelingmethod
AT xiaoli cyberattackresearchforintegratedenergysystemsbythecorrelatedmatrixbasedobjectorientedmodelingmethod
AT liquanzhang cyberattackresearchforintegratedenergysystemsbythecorrelatedmatrixbasedobjectorientedmodelingmethod
AT liquanzhang cyberattackresearchforintegratedenergysystemsbythecorrelatedmatrixbasedobjectorientedmodelingmethod
AT liquanzhang cyberattackresearchforintegratedenergysystemsbythecorrelatedmatrixbasedobjectorientedmodelingmethod