تعداد نشریات | 44 |
تعداد شمارهها | 1,304 |
تعداد مقالات | 15,960 |
تعداد مشاهده مقاله | 52,317,399 |
تعداد دریافت فایل اصل مقاله | 15,075,414 |
تحلیل حمله و دفاع سایبری در سطح پردازش پستهای دیجیتال با روش تئوری بازی | ||
مجله مهندسی برق دانشگاه تبریز | ||
مقاله 29، دوره 48، شماره 3 - شماره پیاپی 85، آذر 1397، صفحه 1273-1285 اصل مقاله (1.32 M) | ||
نویسندگان | ||
نورالله فرداد؛ سودابه سلیمانی* ؛ فرامرز فقیهی | ||
دانشگاه آزاد اسلامی - واحد علوم و تحقیقات تهران - گروه برق، قدرت - تهران | ||
چکیده | ||
استفاده از پستهای هوشمند مبتنی بر فناوری دیجیتال در شبکه قدرت در حال افزایش است. در این پستها انتقال اطلاعات از تجهیزات هوشمند سطح پردازش با سطوح مختلف، آنها را مستعد حملات سایبری نموده است. در این مقاله حملات سایبری به حسگرهای سطح پردازش پستهای دیجیتال در سه تجهیز سختافزاری سوئیچ، واحد جمع کننده و واحد کنترل هوشمند بررسی میشود. تجزیه و تحلیل میزان حملات مهاجمین و دفاع صورت گرفته توسط مدافعین با روش نظریه بازیها انجام میشود. بر اساس تعیین نقطه تعادل نش در درخت بازی معرفیشده، استراتژی بهینه حمله و دفاع تعیین میشود. روش پیشنهادی، میزان خسارت به حسگرهای سطح پردازش پست دیجیتال را مشخص میکند. با ارزیابی استراتژی دفاع سایبری، بودجه دفاعی بهینه جهت تأمین امنیت سایبری برآورد میشود. | ||
کلیدواژهها | ||
شبکه هوشمند؛ حملات سایبری؛ نظریه بازی؛ پست دیجیتال؛ سطح پردازش؛ حسگر | ||
مراجع | ||
[1] M. Panteli and D. S. Kirschen, “Assessing the effect of failures in the information and communication infrastructure on power system reliability,” Power Systems Conference and Exposition (PSCE) , pp. 1-7, 2011. [2] D. Kirschen and F. Bouffard, “Keeping the lights on and the information flowing,” IEEE Power and Energy magazine, vol. 7, no. 1, 2009. [3] Y. W. Law, T. Alpcan, and M. Palaniswami, “Security games for voltage control in smart grid,” Communication, Control, and Computing (Allerton), , pp. 212-219, 2012. [4] W. Saad, Z. Han, H. V. Poor, and T. Basar, “Game-theoretic methods for the smart grid: An overview of microgrid systems, demand-side management, and smart grid communications,” IEEE Signal Processing Magazine, vol. 29, no. 5, pp. 86-105, 2012. [5] معصومه جوادی, سیدمازیار میرحسینی مقدم، موسی مرزبند، «مدیریت بهینه انرژی ریزشبکهها در بازار خردهفروشی بر پایه روش تئوری بازی غیر همکارانه با در نظر گرفتن عدم قطعیت»، مجله مهندسی برق دانشگاه تبریز, دوره 46، شماره 1، صفحه 74-63 بهار 1395. [6] X. Liang and Y. Xiao, “Game theory for network security, ” IEEE Communications Surveys & Tutorials, vol. 15, no. 1, pp. 472-486, 2013. [7] A. K. Farraj, E. M. Hammad, A. Al Daoud, and D. Kundur, “A game-theoretic control approach to mitigate cyber switching attacks in smart grid systems, ” IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 958-963, 2014. [8] R. Hewett, S. Rudrapattana, and P. Kijsanayothin, “Smart Grid security: Deriving informed decisions from cyber attack game analysis,” IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 946-951, 2014. [9] Z. Ismail, J. Leneutre, D. Bateman, and L. Chen, “A game-theoretical model for security risk management of interdependent ict and electrical infrastructures, ” IEEE 16th International Symposium on High Assurance Systems Engineering (HASE), pp. 101-109, 2015. [10] M. Sheng-Wei and Z. Jian-Quan, “Mathematical and control scientific issues of smart grid and its prospects,” Acta Automatica Sinica, vol. 39, no. 2, pp. 119-131, 2013. [11] A. A. Cardenas, T. Roosta, and S. Sastry, “Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems,” Ad Hoc Networks, vol. 7, no. 8, pp. 1434-1447, 2009. [12] C. Wang, C-W. Ten, Y. Hou, and A. Ginter, “Cyber Inference System for Substation Anomalies Against Alter-and-Hide Attacks,” IEEE Transactions on Power Systems, vol. 32, pp. 896-909, 2016. [13] M. Marzband, F. Azarinejadian, M. Savaghebi, and J. M. Guerrero, “An optimal energy management system for islanded microgrids based on multiperiod artificial bee colony combined with Markov chain,” IEEE Systems Journal, vol. 11, pp. 1712-1722, 2015. [14] M. Marzband, S. S. Ghazimirsaeid, H. Uppal, and T. Fernando, “A real-time evaluation of energy management systems for smart hybrid home Microgrids,” Electric Power Systems Research, vol. 143, pp. 624-633, 2017. [15] S. Mousavian, J. Valenzuela, and J. Wang, “A probabilistic risk mitigation model for cyber-attacks to PMU networks,” IEEE Transactions on Power Systems, vol. 30, no. 1, pp. 156-165, 2015. [16] M. T. A. Rashid, S. Yussof, and Y. Yusoff, “Trust System Architecture for Securing GOOSE Communication in IEC 61850 Substation Network,” International Journal of Security and Its Applications, vol. 10, no. 4, pp. 289-302, 2016. [17] T. A. Youssef, M. El Hariri, N. Bugay, and O. Mohammed, “IEC 61850: Technology Standards and Cyber-Security Threats,” in Proceedings of the 16th IEEE International Conference on Environment and Electrical Engineering (EEEIC), Florence, Italy, vol. 710, pp. 1-6, 2016. [18] R. Macwan et al., “Collaborative defense against data injection attack in IEC61850 based smart substations,” IEEE Power and Energy Society General Meeting (PESGM), pp. 1-5, 2016. [19] J. Yue and K. Zhang, “Vulnerability Threat Assessment Based on AHP and Fuzzy Comprehensive Evaluation,” IEEE Seventh International Symposium on Computational Intelligence and Design (ISCID), vol. 2, pp. 513-516, 2014. [20] N. Liu, J. Zhang, H. Zhang, and W. Liu, “Vulnerability assessment for communication network of substation automation systems to cyber attack,” PSCE'09. IEEE/PES Power Systems Conference and Exposition, pp. 1-7, 2009. [21] C. Taylor, P. W. Oman, and A. W. Krings, “Assessing Power Substation Network Security and Survivability: A Work in Progress Report,” Security and Management, pp. 281-287, 2003. [22] Y. Xiang, L. Wang, and Y. Zhang, “Power system adequacy assessment with probabilistic cyber attacks against breakers,” IEEE Conference & Exposition in PES General Meeting, pp. 1-5, 2014. [23] Y. Zhang, L. Wang, and Y. Xiang, “Power system reliability analysis with intrusion tolerance in SCADA systems,” IEEE Transactions on Smart Grid, vol. 7, no. 2, pp. 669-683, 2016. [24] M. Wei and Z. Chen, “Reliability analysis of cyber security in an electrical power system associated WAN,” IEEE Meeting in Power and Energy Society General, pp. 1-6, 2012. [25] A. Patrascu and E. Simion, “Applied cybersecurity using game theory elements,” 10th International Conference on Communications (COMM), pp. 1-4, 2014. [26] Q. Zhu, Game-theoretic methods for security and resilience in cyber-physical systems, Ph.D. Thesis, University of Illinois, Urbana, Illinois, 2013. [27] M. Adamiak, D. Baigent, and R. Mackiewicz, “IEC 61850 Communication Networks and Systems In Substations,” The Protection & Control Jurnal-Smart Grid, pp. 61-68, 2010. [28] M. Humphreys and J. J. Heon, Research Topics in Game Theory, Political ScienceW4210 , 2004. [29] L. Wei, A. Sarwat, W. Saad, and S. Biswas, “Stochastic games for power grid protection against coordinated cyber-physical attacks,” IEEE Transactions on Smart Grid, vol. PP, pp. 1-11, 2016. [30] M. Marzband, M. Javadi, J. L. Domínguez-García, and M. M. Moghaddam, “Non-cooperative game theory based energy management systems for energy district in the retail market considering DER uncertainties,” IET Generation, Transmission & Distribution, vol. 10, no. 12, pp. 2999-3009, 2016. [31] T. Alpcan and T. Başar, Network security: A decision and game-theoretic approach, Cambridge University Press, 2010. [32] Y. Yang et al., “Cybersecurity test-bed for IEC 61850 based smart substations,” IEEE in Power & Energy Society General Meeting, pp. 1-5,2015. [33] P. Wood , Symantec internet security threat report 2016, Symantec Corp., Mountain View, CA, USA, Tech. Rep, 2016. [34] J. Hong, C.-C. Liu, and M. Govindarasu, “Detection of cyber intrusions using network-based multicast messages for substation automation,” IEEE PES in Innovative Smart Grid Technologies Conference (ISGT), pp. 1-5, 2014. [35] P. Maynard, K. McLaughlin, and B. Haberler, “Towards understanding man-in-the-middle attacks on iec 60870-5-104 scada networks,” in Proceedings of the 2nd International Symposium on ICS & SCADA Cyber Security Research, pp. 30-42, 2014. [36] رضا رافع، فرشته خدادادی, "ارائه یک الگوریتم شناسایی گرههای کپی در شبکههای حسگر بیسیم به کمک انتشارات محلی و کانالهای کرمچاله قانونی," مجله مهندسی برق دانشگاه تبریز, دوره 44، شماره 4، صفحه 33-22 زمستان 1393. [37] S. Jeba and B. Paramasivan, “False data injection attack and its countermeasures in wireless sensor networks,” European Journal of Scientific Research, vol. 82, no. 2, pp. 248-257, 2012. [38] E. Fabrizio et al., “Monitoring of a micro-smart grid: Power consumption data of some machineries of an agro-industrial test site,” Data Brief, vol. 10, pp. 564-568, 2017. [39] I. Syamsuddin and J. Hwang, “The application of AHP to evaluate information security policy decision making,” International Journal of Simulation, Systems, Science and Technology, vol. 10, no. 4, pp. 46-50, 2009. [40] F. P. DRAFT, “Recommended security controls for federal information systems and organizations,” NIST Special Publication, vol. 800, p. 53, 2009. [41] L. Evans, Standards for Security Categorization of Federal Information and Information Systems, FIPS PUB 199, 2004 [42] J. Ratliff. Extensive-Form Solution Concepts, 1994, http://virtualperfection.com/gametheory. | ||
آمار تعداد مشاهده مقاله: 1,085 تعداد دریافت فایل اصل مقاله: 588 |