Cyber-attack research for integrated energy systems by the correlated matrix based object-oriented modeling method
The rise of an integrated energy system requires the integration of multiple sources of energy to be embraced and transited over the power grid; that means the information and communication systems of traditional power systems will be extended, and their complexity will be increased. As the informat...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Frontiers Media S.A.
2022-08-01
|
Series: | Frontiers in Energy Research |
Subjects: | |
Online Access: | https://www.frontiersin.org/articles/10.3389/fenrg.2022.774645/full |
_version_ | 1811339786979377152 |
---|---|
author | Heqin Tong Heqin Tong Heqin Tong Jianbing Xu Jianbing Xu Jianbing Xu Xiao Li Xiao Li Xiao Li Liquan Zhang Liquan Zhang Liquan Zhang |
author_facet | Heqin Tong Heqin Tong Heqin Tong Jianbing Xu Jianbing Xu Jianbing Xu Xiao Li Xiao Li Xiao Li Liquan Zhang Liquan Zhang Liquan Zhang |
author_sort | Heqin Tong |
collection | DOAJ |
description | The rise of an integrated energy system requires the integration of multiple sources of energy to be embraced and transited over the power grid; that means the information and communication systems of traditional power systems will be extended, and their complexity will be increased. As the information and communication systems play a more important role in the infrastructure of the power system, a cyber-attack on them may have an impact on the power system and cause a serious threat to the integrated energy system. To analyze the threat to the complex and integrated system, some researchers provide some modeling methods to study the impact of cyber-attacks on the information and communication systems, such as the Attack Tree Model, Attack Graph Model, Petri Net Model for cyber-attack, Attack Description Language Model, State Transition Graph Model, etc. However, these modeling methods have some shortcomings. For example, they cannot describe the systematical cyber-attack and show the secure status during the cyber-attack; it is hard for them to analyze the larger and more complicated information and communication systems. To overcome the shortages, in this paper, a correlated matrix-based object-oriented model is proposed for cyber-attack modeling. With this model, the relationship between the attacker and victim can be directly built; the cyber-attack path and packets from the attacker can be tracked; and the status of the nodes and links can be shown during a cyber-attack. There are two steps to build the cyber-attack model. Firstly, the procedure and approach of the cyber-attack will be modeled by an object-oriented method; then, a correlated matrix model will be built for network topology, attack path, and attack procedure. By combining these two models, the whole cyber-attack model is created. Finally, to demonstrate the modeling method and its benefits, we use the MITM (Man-in-the-middle Attack) attack on measurement data of an AVC (Automation Voltage Control) system as examples, and build a hardware-in-the-loop (HIL) co-simulation platform to verify the model. |
first_indexed | 2024-04-13T18:31:45Z |
format | Article |
id | doaj.art-c8c4d47e99c944d387a13f0ba4e1086a |
institution | Directory Open Access Journal |
issn | 2296-598X |
language | English |
last_indexed | 2024-04-13T18:31:45Z |
publishDate | 2022-08-01 |
publisher | Frontiers Media S.A. |
record_format | Article |
series | Frontiers in Energy Research |
spelling | doaj.art-c8c4d47e99c944d387a13f0ba4e1086a2022-12-22T02:35:03ZengFrontiers Media S.A.Frontiers in Energy Research2296-598X2022-08-011010.3389/fenrg.2022.774645774645Cyber-attack research for integrated energy systems by the correlated matrix based object-oriented modeling methodHeqin Tong0Heqin Tong1Heqin Tong2Jianbing Xu3Jianbing Xu4Jianbing Xu5Xiao Li6Xiao Li7Xiao Li8Liquan Zhang9Liquan Zhang10Liquan Zhang11State Grid Electric Power Research Institute, Nanjing, ChinaNARI Group Corporation, Nanjing, ChinaNARI Technology Co., Ltd., Nanjing, ChinaState Grid Electric Power Research Institute, Nanjing, ChinaNARI Group Corporation, Nanjing, ChinaNARI Technology Co., Ltd., Nanjing, ChinaState Grid Electric Power Research Institute, Nanjing, ChinaNARI Group Corporation, Nanjing, ChinaNARI Technology Co., Ltd., Nanjing, ChinaState Grid Electric Power Research Institute, Nanjing, ChinaNARI Group Corporation, Nanjing, ChinaNARI Technology Co., Ltd., Nanjing, ChinaThe rise of an integrated energy system requires the integration of multiple sources of energy to be embraced and transited over the power grid; that means the information and communication systems of traditional power systems will be extended, and their complexity will be increased. As the information and communication systems play a more important role in the infrastructure of the power system, a cyber-attack on them may have an impact on the power system and cause a serious threat to the integrated energy system. To analyze the threat to the complex and integrated system, some researchers provide some modeling methods to study the impact of cyber-attacks on the information and communication systems, such as the Attack Tree Model, Attack Graph Model, Petri Net Model for cyber-attack, Attack Description Language Model, State Transition Graph Model, etc. However, these modeling methods have some shortcomings. For example, they cannot describe the systematical cyber-attack and show the secure status during the cyber-attack; it is hard for them to analyze the larger and more complicated information and communication systems. To overcome the shortages, in this paper, a correlated matrix-based object-oriented model is proposed for cyber-attack modeling. With this model, the relationship between the attacker and victim can be directly built; the cyber-attack path and packets from the attacker can be tracked; and the status of the nodes and links can be shown during a cyber-attack. There are two steps to build the cyber-attack model. Firstly, the procedure and approach of the cyber-attack will be modeled by an object-oriented method; then, a correlated matrix model will be built for network topology, attack path, and attack procedure. By combining these two models, the whole cyber-attack model is created. Finally, to demonstrate the modeling method and its benefits, we use the MITM (Man-in-the-middle Attack) attack on measurement data of an AVC (Automation Voltage Control) system as examples, and build a hardware-in-the-loop (HIL) co-simulation platform to verify the model.https://www.frontiersin.org/articles/10.3389/fenrg.2022.774645/fullintegrated energy systemobject-oriented methodcorrelation matrixcyber-attackautomation voltage control system |
spellingShingle | Heqin Tong Heqin Tong Heqin Tong Jianbing Xu Jianbing Xu Jianbing Xu Xiao Li Xiao Li Xiao Li Liquan Zhang Liquan Zhang Liquan Zhang Cyber-attack research for integrated energy systems by the correlated matrix based object-oriented modeling method Frontiers in Energy Research integrated energy system object-oriented method correlation matrix cyber-attack automation voltage control system |
title | Cyber-attack research for integrated energy systems by the correlated matrix based object-oriented modeling method |
title_full | Cyber-attack research for integrated energy systems by the correlated matrix based object-oriented modeling method |
title_fullStr | Cyber-attack research for integrated energy systems by the correlated matrix based object-oriented modeling method |
title_full_unstemmed | Cyber-attack research for integrated energy systems by the correlated matrix based object-oriented modeling method |
title_short | Cyber-attack research for integrated energy systems by the correlated matrix based object-oriented modeling method |
title_sort | cyber attack research for integrated energy systems by the correlated matrix based object oriented modeling method |
topic | integrated energy system object-oriented method correlation matrix cyber-attack automation voltage control system |
url | https://www.frontiersin.org/articles/10.3389/fenrg.2022.774645/full |
work_keys_str_mv | AT heqintong cyberattackresearchforintegratedenergysystemsbythecorrelatedmatrixbasedobjectorientedmodelingmethod AT heqintong cyberattackresearchforintegratedenergysystemsbythecorrelatedmatrixbasedobjectorientedmodelingmethod AT heqintong cyberattackresearchforintegratedenergysystemsbythecorrelatedmatrixbasedobjectorientedmodelingmethod AT jianbingxu cyberattackresearchforintegratedenergysystemsbythecorrelatedmatrixbasedobjectorientedmodelingmethod AT jianbingxu cyberattackresearchforintegratedenergysystemsbythecorrelatedmatrixbasedobjectorientedmodelingmethod AT jianbingxu cyberattackresearchforintegratedenergysystemsbythecorrelatedmatrixbasedobjectorientedmodelingmethod AT xiaoli cyberattackresearchforintegratedenergysystemsbythecorrelatedmatrixbasedobjectorientedmodelingmethod AT xiaoli cyberattackresearchforintegratedenergysystemsbythecorrelatedmatrixbasedobjectorientedmodelingmethod AT xiaoli cyberattackresearchforintegratedenergysystemsbythecorrelatedmatrixbasedobjectorientedmodelingmethod AT liquanzhang cyberattackresearchforintegratedenergysystemsbythecorrelatedmatrixbasedobjectorientedmodelingmethod AT liquanzhang cyberattackresearchforintegratedenergysystemsbythecorrelatedmatrixbasedobjectorientedmodelingmethod AT liquanzhang cyberattackresearchforintegratedenergysystemsbythecorrelatedmatrixbasedobjectorientedmodelingmethod |