...
首页> 外文期刊>Computers & Security >Successive direct load altering attack in smart grid
【24h】

Successive direct load altering attack in smart grid

机译:智能电网中的连续直接负载更改攻击

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

In smart grid, a malicious entity can launch a direct load altering attack by injecting false commands into aggregators responsible for direct load control. It may remotely manipulate load, causing deviation in the operating frequency, and consequently lead to disruption in the system. In this paper, we mainly focus on the successive direct load altering attack, with which the attacker can continuously manipulate aggregators to achieve the larger impact. In addition to resulting in a larger impact, it is difficult for the controllers to detect such attacks as the attackers can inject false data to contaminate feedback data from aggregators to controllers. We present an attack model, and our analysis in this paper is from an attacker's perspective. Our model and analysis can serve as an important component also in the future for designing the counter strategies to such attacks. We propose a new frequency response model, which shows changes of the frequency undergoing a successive direct load altering attack. Attackers can utilize this model to analyze the impact of an attack sequence. Considering that attack sequences with different false commands can result in different levels of impact, we develop a three-step optimization method to analyze and find the optimal attack sequence. Our simulation results validate the feasibility and effectiveness of the successive direct load altering attacks. (C) 2018 Elsevier Ltd. All rights reserved.
机译:在智能电网中,恶意实体可以通过向负责直接负载控制的聚合器中注入错误命令来发起直接负载更改攻击。它可能会远程控制负载,导致工作频率出现偏差,从而导致系统中断。在本文中,我们主要集中于连续的直接负载更改攻击,攻击者可以利用该攻击不断操纵聚合器以实现更大的影响。除了造成更大的影响外,控制器还难以检测到此类攻击,因为攻击者可能注入虚假数据以污染从聚合器到控制器的反馈数据。我们提出了一种攻击模型,本文的分析是从攻击者的角度出发的。我们的模型和分析将来也可以用作设计此类攻击的对策的重要组成部分。我们提出了一个新的频率响应模型,该模型显示了经历连续的直接负载改变攻击的频率变化。攻击者可以利用此模型来分析攻击序列的影响。考虑到带有不同错误命令的攻击序列会导致不同程度的影响,我们开发了一种三步优化方法来分析和找到最佳攻击序列。我们的仿真结果验证了连续直接负载改变攻击的可行性和有效性。 (C)2018 Elsevier Ltd.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号