Ioannis Zografopoulos, Charalambos Konstantinou, N. G. Tsoutsos, Dan Zhu, R. Broadwater
{"title":"Security assessment and impact analysis of cyberattacks in integrated T&D power systems","authors":"Ioannis Zografopoulos, Charalambos Konstantinou, N. G. Tsoutsos, Dan Zhu, R. Broadwater","doi":"10.1145/3470481.3472706","DOIUrl":null,"url":null,"abstract":"In this paper, we examine the impact of cyberattacks in an integrated transmission and distribution (T&D) power grid model with distributed energy resource (DER) integration. We adopt the OCTAVE Allegro methodology to identify critical system assets, enumerate potential threats, analyze, and prioritize risks for threat scenarios. Based on the analysis, attack strategies and exploitation scenarios are identified which could lead to system compromise. Specifically, we investigate the impact of data integrity attacks in inverted-based solar PV controllers, control signal blocking attacks in protective switches and breakers, and coordinated monitoring and switching time-delay attacks.","PeriodicalId":212112,"journal":{"name":"Proceedings of the 9th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 9th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3470481.3472706","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10
Abstract
In this paper, we examine the impact of cyberattacks in an integrated transmission and distribution (T&D) power grid model with distributed energy resource (DER) integration. We adopt the OCTAVE Allegro methodology to identify critical system assets, enumerate potential threats, analyze, and prioritize risks for threat scenarios. Based on the analysis, attack strategies and exploitation scenarios are identified which could lead to system compromise. Specifically, we investigate the impact of data integrity attacks in inverted-based solar PV controllers, control signal blocking attacks in protective switches and breakers, and coordinated monitoring and switching time-delay attacks.