A Hybrid Cyber Attack Model for Cyber-Physical Power Systems

Haicheng TU, Yongxiang XIA*, Chi K. TSE, Xi CHEN

*Corresponding author for this work

Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

41 Citations (Scopus)
95 Downloads (CityUHK Scholars)

Abstract

Over the past decade, the cyber security of power systems has been widely studied. Most previous studies have focused on cyber physical attacks, and barely considered one typical cyber attack: availability attack. We propose a hybrid attack model and apply conventional state estimation processes to study cyber attacks on power grids in this paper. The proposed model considers both integrity attack and availability attack simultaneously. Compared with the particular attack, namely, false data injected attack, we analyze their consequences to power systems in the events of false negatives attack and false alarm attack. The results show that the hybrid attack can confuse the control center by manipulating the integrity and availability of measurements. More importantly, we evaluate the hybrid attack with different values of the cost ratio between integrity and availability attacks, and then verify that the hybrid attack can achieve the same goal with a reduced cost.
Original languageEnglish
Article number9120058
Pages (from-to)114876-114883
JournalIEEE Access
Volume8
Online published18 Jun 2020
DOIs
Publication statusPublished - 2020

Research Keywords

  • Cyberattack
  • Power systems
  • Transmission line measurements
  • Mathematical model
  • State estimation
  • Meters
  • SCADA systems
  • Cyber-physical power system
  • cyber security
  • attack cost
  • differential evolution algorithm
  • DATA-INJECTION ATTACKS
  • OPTIMIZATION

Publisher's Copyright Statement

  • This full text is made available under CC-BY 4.0. https://creativecommons.org/licenses/by/4.0/

Fingerprint

Dive into the research topics of 'A Hybrid Cyber Attack Model for Cyber-Physical Power Systems'. Together they form a unique fingerprint.

Cite this