Optimal defense resource allocation against cyber-attacks in distributed generation systems

Huadong Mo, Xun Xiao, Giovanni Sansavini, Daoyi Dong
{"title":"Optimal defense resource allocation against cyber-attacks in distributed generation systems","authors":"Huadong Mo, Xun Xiao, Giovanni Sansavini, Daoyi Dong","doi":"10.1177/1748006x231196259","DOIUrl":null,"url":null,"abstract":"The deployment of advanced information and communication technologies necessitates considering new security threats, such as distributed denial of service attacks and malware, which can fault power generators and feeders and exacerbate power outages in distributed generation systems (DGS). Existing cyber-security studies fail to validate the attacker–defender game model between operators and hackers or provide a DGS model that accounts for realistic characteristics and operations. Furthermore, current game models may be infeasible for large-scale systems and are not robust against uncertainties owing to the use of metaheuristic algorithms. To overcome these gaps, this study quantified the result of a game using the contest success function and estimated the parameters of this function based on real-world evidence: the dataset of cyber crime incidents from Advisen, US. The DGS management was optimized using the power flow model considering the scenario-based uncertainty stemming from cyber-attacks. A three-stage attack+defend–defend–attack framework is proposed to optimize attack–defense resource allocation using the cooperative game and [Formula: see text]-subgradient method. The results for IEEE 4, 13, 34, 123 and 342 test node feeders show that the proposed framework is applicable to large-scale systems and robust to various types of cyber-attacks. The proposed model and algorithms further enhance the DGS performance under uncertainties by protecting the entire grid or only critical nodes according to the defenders’ objectives.","PeriodicalId":51266,"journal":{"name":"Proceedings of the Institution of Mechanical Engineers Part O-Journal of Risk and Reliability","volume":null,"pages":null},"PeriodicalIF":1.7000,"publicationDate":"2023-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the Institution of Mechanical Engineers Part O-Journal of Risk and Reliability","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1177/1748006x231196259","RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, INDUSTRIAL","Score":null,"Total":0}
引用次数: 0

Abstract

The deployment of advanced information and communication technologies necessitates considering new security threats, such as distributed denial of service attacks and malware, which can fault power generators and feeders and exacerbate power outages in distributed generation systems (DGS). Existing cyber-security studies fail to validate the attacker–defender game model between operators and hackers or provide a DGS model that accounts for realistic characteristics and operations. Furthermore, current game models may be infeasible for large-scale systems and are not robust against uncertainties owing to the use of metaheuristic algorithms. To overcome these gaps, this study quantified the result of a game using the contest success function and estimated the parameters of this function based on real-world evidence: the dataset of cyber crime incidents from Advisen, US. The DGS management was optimized using the power flow model considering the scenario-based uncertainty stemming from cyber-attacks. A three-stage attack+defend–defend–attack framework is proposed to optimize attack–defense resource allocation using the cooperative game and [Formula: see text]-subgradient method. The results for IEEE 4, 13, 34, 123 and 342 test node feeders show that the proposed framework is applicable to large-scale systems and robust to various types of cyber-attacks. The proposed model and algorithms further enhance the DGS performance under uncertainties by protecting the entire grid or only critical nodes according to the defenders’ objectives.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
分布式发电系统对网络攻击的最佳防御资源分配
先进信息和通信技术的部署需要考虑新的安全威胁,例如分布式拒绝服务攻击和恶意软件,它们可能导致发电机和馈线故障,并加剧分布式发电系统(DGS)的停电。现有的网络安全研究未能验证运营商和黑客之间的攻击防御博弈模型,也未能提供一个考虑现实特征和操作的DGS模型。此外,由于使用了元启发式算法,当前的博弈模型可能对大规模系统不可行,并且对不确定性的鲁棒性不强。为了克服这些差距,本研究使用竞赛成功函数量化了游戏的结果,并根据现实世界的证据(来自美国Advisen的网络犯罪事件数据集)估计了该函数的参数。考虑网络攻击的场景不确定性,采用潮流模型对DGS管理进行了优化。利用合作博弈和[公式:见文]-子梯度法,提出了一种三阶段攻击+防御-防御-攻击的优化攻防资源配置框架。IEEE 4、13、34、123和342测试节点馈线的结果表明,该框架适用于大规模系统,对各种类型的网络攻击具有鲁棒性。提出的模型和算法可以根据防御者的目标保护整个网格或仅保护关键节点,从而进一步提高不确定条件下DGS的性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
4.50
自引率
19.00%
发文量
81
审稿时长
6-12 weeks
期刊介绍: The Journal of Risk and Reliability is for researchers and practitioners who are involved in the field of risk analysis and reliability engineering. The remit of the Journal covers concepts, theories, principles, approaches, methods and models for the proper understanding, assessment, characterisation and management of the risk and reliability of engineering systems. The journal welcomes papers which are based on mathematical and probabilistic analysis, simulation and/or optimisation, as well as works highlighting conceptual and managerial issues. Papers that provide perspectives on current practices and methods, and how to improve these, are also welcome
期刊最新文献
Spare parts provisioning strategy of warranty repair demands for capital-intensive products Integrated testability modeling method of complex systems for fault feature selection and diagnosis strategy optimization Risk analysis of accident-causing evolution in chemical laboratory based on complex network Small-sample health indicator construction of rolling bearings with wavelet scattering network: An empirical study from frequency perspective Editoral on special issue “Text mining applied to risk analysis, maintenance and safety”
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1