Journal of Modern Power Systems and Clean Energy

ISSN 2196-5625 CN 32-1884/TK

网刊加载中。。。

使用Chrome浏览器效果最佳,继续浏览,你可能不会看到最佳的展示效果,

确定继续浏览么?

复制成功,请在其他浏览器进行阅读

Defensive Resource Allocation Method for Improving Survivability of Communication and Information System in CPPS Against Cyber-attacks  PDF

  • Yingjun Wu 1
  • Hao Xu 2
  • Ming Ni 3
1. College of Energy and Electrical Engineering, Hohai University, Nanjing, China, and he is also with the College of Automation & College of Artificial Intelligence, Nanjing University of Posts and Telecommunications, Nanjing, China; 2. College of Automation and College of Artificial Intelligence, Nanjing University of Posts and Telecommunications, Nanjing, China; 3. NARI Group Corporation (State Grid Electric Power Research Institute), Nanjing, China

Updated:2020-07-10

DOI:10.35833/MPCE.2019.000148

  • Full Text
  • Figs & Tabs
  • References
  • Authors
  • About
OUTLINE

Abstract

With the widespread use of communication and information technology, power system has been evolving into cyber-physical power system (CPPS) and becoming more vulnerable to cyber-attacks. Therefore, it is necessary to enhance the ability of the communication and information system in CPPS to defend against cyber-attacks. This paper proposes a method to enhance the survivability of the communication and information system in CPPS. Firstly, the communication and information system for critical business of power system is decomposed into certain types of atomic services, and then the survivability evaluation indexes and their corresponding calculation method for the communication and information system are proposed. Secondly, considering the efficacy and cost defensive resources, a defensive resource allocation model is proposed to maximize the survivability of communication and information system in CPPS. Then, a modified genetic algorithm is adopted to solve the proposed model. Finally, the simulation results of CPPS for an IEEE 30-node system verify the proposed method.

I. Introduction

WITH the large-scale application of modern advanced communication and information technology, power system has been evolving into cyber-physical power system (CPPS) [

1]. Modern advanced communication and information technology not only enhances the safety and efficiency of power system operations [2], [3], but also makes the power system more vulnerable to cyber-attacks due to its critical businesses which are increasingly dependent on the communication and information system. In such case, by weakening or even destroying the functions of the communication and information system, cyber-attacks will threaten the safe and stable operation of power systems [4], [5].

In recent years, many researches on the decision making of real-time defense strategy against cyber-attacks have been reported. The behavior and purpose of cyber-attacks are analyzed in [

6], [7], and a corresponding detection and identification method for cyber-attacks is proposed in [8]. The forms and the propagation processes of cyber-attacks are studied in [9], [10]. Based on these researches, [11] proposes a method to deploy security countermeasures to protect an organization by its attack graph, and [5] uses a graph-theoretical formulation for attacks of false data injection in smart grids and proposes the defense mechanisms to mitigate this type of attacks. However, these defensive methods are targeting for one or several types of cyber-attacks, and there is no guarantee that these defenses will succeed. So, even with the defense strategy, the communication and information system is still facing the security risks [12]. For example, the “Stuxnet” virus attacked a nuclear power plant in Iran and the plant stopped operating in 2010. A cyber-attack attacked the power grid in Ukraine and finally resulted in a large-scale blackout in 2015 [13]. And the corresponding defense countermeasures were implemented in time after a cyber-attack occurred in Israel in 2016, which blocked the spread of the cyber-attack effect and avoided a large-scale blackout, but cost a lot in economic terms [14].

Therefore, for existing power systems and their auxiliary communication and information system, there may be cyber-attacks that cannot be defended or can be defended but costly even with cyber-attack defense measures. This problem can only be solved by optimizing the defense resource allocation and improving the inherent survivability of CPPS. Many researchers have proposed some resource allocation methods for improving the survivability of CPPS. References [

15] and [16] explore the survivability of the communication and information system and the effect of survivability in the process of defending against cyber-attacks. References [17]-[22] propose some survivability defensive methods for improving the vulnerability of the communication and information system in smart grids. However, the above references only investigate the methods to improve the survivability of communication and information system in CPPS, and do not consider how to maximize the survivability from a systemic perspective. There is still no effective optimization model of defense resource allocation to improve the survivability of the communication and information system in CPPS.

Targeting at improving the survivability of the communication and information system in CPPS, this paper proposes a model and the method for the defense resource allocation. Firstly, based on the analysis of the evaluation of the survivability in CPPS, each critical power business of CPPS is broken down into many atomic services. Then, a set of survivability indexes of atomic services and the corresponding calculation methods are proposed, and the defense resources for improving different survivability are given. Secondly, a defensive resource allocation model to decide the kind and number of defensive measures for enhancing the survivability of atomic services is established. The main contributions of this paper are as follows.

1) The goal of cyber-attack defense is to guarantee the key power businesses undertaken by the communication and information system in CPPS, but these critical businesses are difficult to be guaranteed. By decomposing the critical businesses into more operational atomic services, the critical businesses can be guaranteed by enhancing the survivability of these atomic services.

2) From the perspectives of attack identification ability at the beginning of the cyber-attacks, the resistance during the effect propagation of cyber-attacks and the recovering ability of critical businesses after cyber-attacks, the defensive resource allocation model for enhancing the survivability of the atomic services is established.

The rest of this paper is organized as follows. The method for assessing the survivability of communication and information system is given in Section II. A defensive resource allocation model for improving the survivability of communication and information system is proposed in Section III. An improved genetic algorithm for solving the optimal configuration of defensive resources is introduced in Section IV. Section V shows the simulations and Section VI draws the conclusion.

II. Survivability Evaluation of Communication and Information System in CPPS

A. Definition of Survivability for Communication and Information System

The main mission of the communication and information system in CPPS is to complete the power businesses. According to the regulations issued by the Economic and Trade Commission of the People’s Republic of China [

23] and the Electricity Regulatory Commission [24], the power businesses are classified into four major security areas. Area 1 contains safety and stability system (SSS), relay protection (RP) and power dispatch (PD). Area 2 contains protection management information system (PMIS) and electricity market (EM), etc. Area 3 contains hydrological information system (HIS) and lightning positioning system (LPS), etc. Area 4 contains shared resource management (SRM) and official document approval business (ODAB), etc. The businesses that the power system will not function properly after their failures are called critical businesses such as SSS, RP and PD in Area 1. In this paper, the survivability of the communication and information system in CPPS is defined as the ability to ensure the critical businesses of power system after cyber-attacks.

B. Decomposition of Power Businesses into Atomic Services

The power businesses are difficult to be guaranteed. In this section, the concept of atomic service is defined as the smallest independent unit of power business and can be implemented by one or several communication and information elements. Therefore, the consequences of attacking atomic services are independent of each other [

25] and the critical businesses can be guaranteed by enhancing the survivability of these atomic services.

C. Survivability Indexes of Atomic Services

Three indexes are selected based on the time scale which are defined as follows.

1) Identifiability index: the ability of CPPS to identify cyber-attack at the beginning.

2) Resistibility index: the ability of CPPS to ensure critical businesses during the effect propagation of cyber-attack.

3) Recoverability index: the ability of CPPS to recover the critical businesses after cyber-attack.

D. Framework of Survivability Evaluation

In this section, the framework of survivability evaluation is proposed, as shown in Fig. 1. Firstly, the critical businesses are selected which need to be guaranteed according to the specific needs of the survivability in power system. Secondly, based on the concept of atomic service, the critical businesses are decomposed into the smallest independent unit that can impose the measures to enhance the survivability. Finally, the survivability of atomic services is evaluated for the perspectives of the ability to identify cyber-attacks at the beginning, the ability to ensure critical businesses during the effect propagating of cyber-attacks, and the ability to recover the critical businesses after cyber-attacks.

Fig. 1 Framework of survivability evaluation by decomposing power businesses into atomic services.

E. Calculation Method of Survivability Evaluation Indexes

1) Effect of Defensive Measures for Calculating Survivability Evaluation Index

The effect of defensive measures is needed to calculate the survivability evaluation indexes of atomic services. In order to calculate the survivability index, the effect of defensive measures is collected through the simulation after the defense resources are configured. The steps shown in Fig. 2 are given as follows.

Fig. 2 Process of data acquisition.

Step 1:   based on the steps for the execution process of critical businesses, the critical businesses are decomposed into atomic services. The cyber-attacks are selected to form a cyber-attack library according to the degree of cyber-attack threat to different atomic services. The cyber-attack library includes the probability that different attacks choose different types of atomic services as targets.

Step 2:   an unselected cyber-attack is selected in the cyber-attack library randomly.

Step 3:   based on the characteristics of cyber-attacks, the consequences of cyber-attacks on the system are simulated for multiple times. And the basic data used to calculate the evaluation indexes are collected.

Step 4:   judge if all cyber-attacks in the cyber-attack library have been selected. If yes, Step 5 is executed. Otherwise, go back to Step 2.

Step 5:   calculate the expectation values of the collected data used to calculate the evaluation indexes.

2) Calculation of Survivability Evaluation Indexes

This section quantifies the survivability indexes. The attack hazard index and the attack impedance rate index are used to evaluate the resistibility. The indexes of attack identification rate and the attack identification time are adopted to evaluate the identifiability while the indexes of attack recovery time and the attack recovery rate are utilized to evaluate the recoverability.

1) Calculation of identifiability index

The index of attack identification rate for the jth atomic service in the mth critical business atomic service is:

RIA,mj=i=1KRImjiPD,mji (1)
RImji=1    attack can be identified0    attack cannot be identified (2)

where RImji is the identification result when jth atomic service in the mth critical business suffers the ith cyber-attack; PD,mji is the probability that the jth atomic service in the mth critical business suffers the ith cyber-attack; i is the number of cyber-attacks; and K is the total number of attacks in the attack library.

The attack identification rate indexes of the mth critical business and the entire system are RIS,m and RIS, respectively.

RIS,m=j=1NmRIA,mjWA,mj (3)
RIS=m=1MRIS,mWS,m (4)

where Nm is the total number of atomic services included in the mth critical business; M is the total number of critical businesses; WA,mj is the relative weight of the jth atomic service in the mth critical business; and WS,m is the relative weight of the mth critical business. The sum of the relative weights of all atomic services is 1. The size of the weight depends on the impact of atomic service fault on the critical business. The sum of the relative weights of all critical businesses is 1. The weight depends on the impact of critical business failures on system security and stability.

The index of attack identification time for the jth atomic service in the mth critical business TIA,mj is:

TIA,mj=i=1KTImjiPD,mji (5)
TImji=1.0Tmji10 s0.810 s<Tmji1 min0.51 min<Tmji5 min0.25 min<Tmji10 min0Tmji>10 min (6)

where TImji is the rate of Tmji; and Tmji is the attack identification time when the jth atomic service in the mth critical business suffers the ith cyber-attack.

The indexes of attack identification time for the mth critical business and the entire system are TIS,m and TIS, respectively.

TIS,m=j=1NmTIA,mjWA,mj (7)
TIS=m=1MTIS,mWS,m (8)

2) Calculation of resistibility index

The extent to which an atomic service is destroyed by an attack is:

ADA,mj=i=1KADmjiPD,mji (9)
ADmji=1atomic service cannot work0atomic service works properly (10)

where ADA,mj is the attack hazard index of the jth atomic service in the mth critical business; and ADmji is the attack result when the jth atomic service in the mth critical business suffers the ith cyber-attack.

The attack hazard index of the mth critical business with Nm atomic services is:

ADS,m=j=1NmADA,mjWA,mj (11)

The attack hazard index of the entire system is:

ADS=1ADS,m1m=1MADS,mWS,melse (12)

The probability that an atomic service is attacked successfully is:

ASA,mj=i=1KASmjiPD,mji (13)

where ASmji is the probability that the ith cyber-attack will be succeed in the jth atomic service of the mth critical business.

The probability of successful attack on the mth critical business with Nm atomic services is:

ASS,m=j=1NmASA,mjWA,mj (14)

The probability of successful attack on the entire system is:

ASS=1ASS,m1m=1MASS,mWS,melse (15)

The attack impedance index for the entire system is:

APS=1-ASS (16)

3) Calculation of recoverability index

The attack recovery time index of atomic service is:

RTmji=TR,mji/T0,mj    TR,mjiT0,mj1                     TR,mji>T0,mj (17)
RTA,mj=i=1KRTmjiPD,mji (18)

where RTA,mj is the index of attack recovery time for the jth atomic service in the mth critical business; RTmji is the recovery time index when the jth atomic service in the mth critical business suffers the ith cyber-attack; TR,mji is the actual recovery time when the jth atomic service in the mth service suffers the ith cyber-attack; and T0,mj is the demand recovery time of the jth atomic service in the mth critical business.

The indexes of attack recovery time for critical business and the entire system are:

RTS,m=j=1NmRTA,mjWA,mj (19)
RTS=m=1MRTS,mWS,m (20)

where RTS,m is the index of attack recovery time for the mth critical business; and RTS is the index of attack recovery time for the entire system.

The index of attack recovery rate for critical business is:

RRS,m=i=1KQR,iPD,mjiQ0 (21)

where QR,i is the system suffering from the ith cyber-attack; and Q0 is the number of atomic services involved in the mth critical business during normal operation. The number of atomic services involved in the mth critical business after the system is restored.

The index of attack recovery rate for the entire system is:

RRS=m=1MRRS,mWS,m (22)

4) Fusion of survivability assessment indexes

The fusion index can directly reflect the survivability of the system. Among all the above indexes, the smaller the ADS and RTS, the better the system survivability, and the larger the RIS, TIS, APS and RRS, the better the system survivability. The relationship between unified indexes and survivability is that the composition vector R= [RIS, TIS, APS, RRS, 1ADS, 1RTS]. The formula for calculating the fusion index is:

h(R)=a1ER1+bR (23)

where a and b are the weight coefficients which satisfy a+b=1, and this paper takes a=b=0.5; E is the total number of indexes; and R1 and R are the 1 norm and the infinite norm of the vector R, respectively.

R1=e=1EReR=maxRe (24)

where Re is the eth element in vector R.

F. Defensive Resources for Improving Survivability

Defensive resources are defense measures (hardware or software) equipped in CPPS to enhance its survivability. Corresponding to the survivability assessment indexes, the defensive resources are divided into three categories, which are respectively used to enhance the corresponding survivability [

19]-[22].

1) Identifiability defensive resources are used to enhance the system recognizability. Commonly-used defensive measures include intrusion detection technology, honeypot technology [

19], [20]. The cost is:

Cide1nide1,mj+Cide2nide2,mj=Cide,mj (25)

where Cide1 is the cost of adding an intrusion detection software to the atomic service; Cide2 is the cost of adding a honeypot component to the atomic service; nide1,mj is the number of intrusion detection software on the jth atomic service in the mth critical business; nide2,mj is the number of honeypot components on the jth atomic service in the mth critical business; and Cide,mj is the identifiability defensive resource cost of the jth atomic service in the mth critical business.

2) Resistibility defensive resources are used to enhance the system resistance ability. Commonly-used defensive measures are firewall technology, access control technology, and the deployment of camouflage components [

19], [21]. The cost is:

Cres1nres1,mj+Cres2nres2,mj+Cres3nres3,mj=Cres,mj (26)

where Cres1 is the cost of adding a firewall to the atomic service; nres1,mj is the number of firewalls on the jth atomic service in the mth critical business; Cres2 is the cost of adding a right control software to the atomic service; nres2,mj is the number of right control software on the jth atomic service in the mth critical business; Cres3 is the cost of adding a camouflage component to the atomic service; nres3,mj is the number of camouflage components on the jth atomic service in the mth critical business; and Cres,mj is the resistibility defensive resource costs of the jth atomic service in the mth critical business.

3) Recoverability defensive resources are used to enhance the system recoverability capabilities. Commonly-used defensive measures include the creation of redundant components, data backup and recovery technology [

22]. The cost is:

Crec1nrec1,mj+Crec2nrec2,mj=Crec,mj (27)

where Crec1 is the cost of adding a spare component to the atomic service; nrec1,mj is the number of spare components on the jth atomic service in the mth critical business; Crec2 is the cost of adding a data backup and recovery component to the atomic service; nrec2,mj is the number of data backup and recovery components on the jth atomic service in the mth critical business; and Crec,mj is the recoverability defensive resource costs of the jth atomic service in the mth critical business.

III. Model of Defensive Resource Allocation

Different defense effects can be achieved by configuring different numbers and types of defensive measures on the atomic service. Considering the constraints of defense resource configuration, we configure different numbers and types of defensive measures on all atomic services, and form different configuration schemes of defense resources. The optimization variables in the model are the number and type of defense measures on atomic services. The consequences of cyber-attacks are simulated and the survivability defense effect is evaluated by calculating the indexes.

A. Objective Function

Quantify system survivability through survivability fusion indexes based on (23). The objective function is:

maxF(L)=h(R) (28)

where L is the atomic service defensive measure allocation matrix. The number of columns in L represents different atomic services. The number of rows in L represents the type of defensive measures. The elements in L represent the number of types of defensive measures configured on different atomic services.

B. Constraints

Resource allocation in the system is subject to the following conditions.

1) The total amount of defensive resources is limited as:

m=1Mj=1Nm(Cide,mj+Cres,mj+Crec,mj)C0 (29)

where C0 is the total cost of defensive resources.

2) Each defensive resource configurable on each atomic service also has a cost cap as:

Cide,mjCide0Cres,mjCres0Crec,mjCrec0    j=1,2,...,Nm, m=1,2,...,M (30)

where Cide0 is the upper limit of the cost of identifiability defensive resource on atomic services; Cres0 is the upper limit of the cost of resistibility defensive resource on atomic services; and Crec0 is the upper limit of the cost of identifiability defensive resource on atomic services.

IV. Modified Genetic Algorithm for Proposed Model

A. Improvement of Genetic Algorithm

This paper uses an improved genetic algorithm [

26]. The specific improvements are as follows:

1) In the encoding process, the decimal encoding is adopted.

2) The objective function of the proposed model is not directly selected as the fitness function. The following fitness function is used.

H=F-Fmin+11+e-t(Fmax-Fmin)F-F¯F¯-Fmin<kF1+etF-F¯F¯-Fmink (31)

where H is an improved fitness function; F is the objective function value in (28); Fmax and Fmin are the maximum and minimum values of the objective function without consideration of constraints, respectively; F¯ is the average of the maximum and minimum values of the objective function; and t is an evolutionary algebra with different values depending on the environment.

3) Roulette selection operator, adaptive crossover operator and adaptive mutation operator are adopted.

4) Chaotic perturbations are added to the algorithm. After performing selection, crossover, and mutation operations, we add some individuals with low fitness to the progeny population. Therefore, it is difficult for the group to fall into the local optimal solution.

B. Algorithm Flow

The specific process of applying improved genetic algorithm to the survivability defensive resource allocation of the communication and information system is given in Algorithm 1.

Algorithm 1  : improved genetic algorithm

Input the maximum number of iterations λ; the weight of critical business in the system WS,m; the weight of atomic services in critical business WA,mj; the group size MG; the individual coding method C; the terminate evolutionary algebra T; the crossover probability Pc; and the variation probability Pv. Configure the defense effect of different defense measures.

Output the defensive measure configuration scheme.

Initialize the number of iterations t = 0 and the defensive measure configured on the atomic service.

Repeat

Step 1: randomly assign different numbers and types of defensive measures on atomic services within the constraints. The nodes are sorted by the number when encoding. Encode the number of defensive resources on the atomic service to obtain the individual gene Cg and generate the initial population Q0.

Step 2: defensive effect data are brought into account based on the number and the type of defensive measures on the atomic service. Calculate the survivability assessment indexes APS, RIS, TIS, RRS, ADS, RTS according to the formula in Section II. Calculate the fusion index and the fitness function. Get the individual fitness H.

Step 3: perform crossover, selection, and mutation operations. The individual Cn that does not meet the constraint of defense resource cost is deleted, and the progeny population Rt is generated.

Step 4: perform chaotic perturbation operations, randomly add individuals that have been eliminated due to low fitness, ensure the population diversity, and obtain the population Qt+1.

Step 5: if the termination condition is satisfied, the termination condition that the maximum number of iterations reach, go to Step 6. Else go back to Step 2.

Step 6: calculate the fitness of the resulting population and obtain the optimal solution set.

End

V. Simulations

This section takes IEEE 30-node system as an example. The single-line diagram and its communication and information system are given in Fig. 3.

Fig. 3 Diagram of IEEE 30-node system and its communication network. (a) IEEE 30-node system. (b) Communication network.

A. Basic Introduction of System

1) Atomic services of critical businesses

The functions of SSS include: data collection (DC) on the power nodes such as frequency, voltage, and power data, data uploading (DU) to the substation, substation processing (SP) of the data, transmitting data to control center (CC) through communication nodes (CNs) by the substation, making decisions by CC, transmitting orders to substation through CNs by CC, substation analysis (SA) of orders, substation sending orders (SI), controlling the action (CA) of electric components to adjust the power output of power plant. Based on these functions, the SSS can be decomposed into the following atomic services, as shown in Fig. 4.

Fig. 4 Schematic diagram of SSS decomposition into atomic services.

The functions of RP include: DC (current, voltage, and phase data), DU, SP, CN, CC, CN, SA, SI, CA (adjusting the power output of the power plant). Based on these functions, the RP can be decomposed into the following atomic services, as shown in Fig. 5.

Fig. 5 Schematic diagram of RP decomposition into atomic services.

The functions of PD include: DC (frequency, voltage, and power data), DU, SP, CN, CC, CN, SA, SI, CA (adjusting power to power plants and loads). Based on these functions, the PD can be decomposed into the following atomic services, as shown in Fig. 6.

Fig. 6 Schematic diagram of PD decomposition into atomic services.

According to the functions of atomic services, they are classified into three categories: data acquisition atomic services (DCAS), data transfer and processing atomic services (DTPAS) and control action atomic services (CAAS). The number of atomic services of all power businesses are shown in Table I.

Table I Number of Atomic Services for All Power Businesses
Power businessAtomic serviceNumber
SSS DCAS 90
DTPAS 162
CAAS 6
RP DCAS 90
DTPAS 198
CAAS 24
PD DCAS 69
DTPAS 170
CAAS 24

ALL the CN critical services are in the same topology. The DCAS in PD and part of the DCAS in SSS are the same. In summary, there are 180 DCAS, 378 DTPAS, 54 CAAS, and a total of 612 atomic services.

2) Cyber-attack library

Three various cyber-attacks F1, F2, and F3 are set in the simulation. The probabilities of each atomic service being attacked by these cyber-attacks are given in Table II [

17].

Table II Probability of Three Atomic Services Suffering from ThreeCyber-attacks
Atomic serviceProbability (%)
F1F2F3
DCAS 50 25 25
DTPAS 25 50 25
CAAS 25 25 50

3) Defensive resource library

Seven defensive measures of three defensive resource are adopted for enhancing the survivability of atomic services. Since the cost of these defensive measures is difficult to determine, this paper does not quantify the specific value of defensive measures. The cost and cost caps for all types of defensive measures are shown in Table III [

20]-[23].

Table III Defensive Resource Composition and Their Costs
Defensive resourceDefensive measureCostDefensive resource cost cap on atomicservicesDefensiveresourcecost capon system
Resistibility defensive measure Firewall technology 1 8 12000
Access control technology 1
Deployment of camouflage components 2
Identifiability Intrusion detection technology 1 6
Honeypot technology 2
Recoverability Redundant components 3 10
Data backup and recovery technology 2

4) Weights of atomic services for power business

Different atomic services have different degrees of impact on the survivability of power business. The weights of atomic services in Table IV [

27] are used in calculating the survivability evaluation indexes.

Table IV Weights of Atomic Services for Different Power Businesses
Atomic serviceWA1j (SSS)WA2j (RP)WA3j (PD)
DC 0.003 0.0025 0.0030
DU 0.003 0.0025 0.0030
SP 0.005 0.0035 0.0035
CN 0.005 0.0045 0.0040
SA 0.010 0.0045 0.0060
SI 0.010 0.0040 0.0050
CA 0.010 0.0040 0.0050

B. Simulation Results and Analysis

1) Effect of defensive measures

Firstly, the effect of defensive measures used to calculate the indexes is collected by simulation. There are three types of atomic services, and each type of atomic services can suffer from three types of cyber-attacks, with a total of nine attack scenarios. In Fig. 7, the abscissa is the number of different defensive measures (NDM), and the ordinate is divided into three groups from left to right: ① the effect of configuring firewall technology, access control technology, and camouflage components on ADS and APS; ② the effect of configuring intrusion detection technology and honeypot technology on RIS and TIS; ③ the effect of configuring redundant components, data backup and recovery technologies on RTS and RRS.

Fig. 7 Effect of defensive measures. (a) In the case of DCAS attacked by F1. (b) In the case of DCAS attacked by F2 or F3. (c) In the case of DTPAS attacked by F1 or F3. (d) In the case of DTPAS attacked by F2. (e) In the case of CAAS attacked by F1 or F2. (f) In the case of CAAS attacked by F3.

2) Allocation scheme of defense resources

With the data in Fig. 7, the survivability assessment indexes can be calculated. Then, the model of defensive resource allocation can be solved by the improved genetic algorithm. The defense resource configuration scheme is shown in Fig. 8. Vectors are used to represent the number of defensive measures. For example, [a, b, c, d, e, f, g] indicates the numbers of firewall technology, access control technology, camouflage components, intrusion detection technology, honeypot technology, redundant components and data backup and recovery technologies, respectively.

Fig. 8 Overall allocation of defensive resources.

As shown in Fig. 8, a large number of defense resources are allocated at all CNs because the execution of all critical businesses requires CN. Also, a large number of defense resources are allocated on the atomic services connected to the load nodes or generator nodes because the data collected on the load nodes or generator nodes are used for the SSS and the PD. The greatest number of defensive resources are allocated on the atomic services connected to the nodes conceded with both loads and generators. The specific allocation scheme of defense resources on atomic services of the SSS, the RP and the PD is shown in Fig. 9.

Fig. 9 Specific allocation of defensive resources on atomic services. (a) SSS. (b) RP. (c) PD.

3) Effect of survivability improvement

A total 1000 simulations have been performed, in which the system configured with defensive resources are attacked by a randomly selected cyber-attack. As a comparison, 1000 simulations have been also performed for the system without defense resources. Then, the objective function of the proposed model and the fusion indexes are calculated based on these simulations. The results are shown in Fig. 4. It can be seen from Table V that after the defensive resources are configured, the survivability of the system increases significantly, which proves the effectiveness of the proposed method.

Table V Survivability Comparison
Whether to configure defensive resourcesFusion index
No 0.5938
Yes 0.7413

VI. Conclusion

Considering there may be cyber-attacks that cannot be defended or can be defended but costly for the existing power systems and their auxiliary communication and information system, even with cyber-attack defense measures, a method of defense resource allocation is proposed to enhance the survivability of the communication and information system in CPPS.

Simulation results show that the method of defense resource allocation is effective to enhance the inherent survivability of the CPPS. This paper is a preliminary study on the research methods of cyber-attack defense resource allocation. In the future, it can be further studied from the following aspects: ① after configuring defense resources on atomic services, the survivability of atomic services can be enhanced. But the degree of improvement is still quantified by the simulation. In the future, the effect of defensive measures can be obtained through actual experiments to make the optimization result more realistic; ② this paper focuses on how to enhance the survivability by configuring defense resources on atomic services (that is, configuring defense resources on the nodes of the communication and information system). One of the most noteworthy aspects of future research is how to optimize the topology of the communication and information system to enhance its survivability.

REFERENCES

1

Y. Han, C. Guo, S. Ma et al., “Modeling cascading failures and mitigation strategies in PMU based cyber-physical power systems,” Journal of Modern Power Systems and Clean Energy, vol. 6, no. 5, pp. 944-957, Sept. 2018. [百度学术

2

Z. Su, L. Xu, S. Xin et al., “A future outlook for cyber-physical power system,” in Proceedings of IEEE Conference on Energy Internet and Energy System Integration, Beijing, China, Nov.2017, pp. 1-4. [百度学术

3

K. D. Kim and P. R. Kumar, “Cyber-physical systems:a perspective at the centennial,” Proceedings of the IEEE, vol. 100, pp.1287-1380, May 2012. [百度学术

4

Y. Tang, Q. Chen, M. Li et al., “Overview on cyber-attacks against cyber physical power system,” Automation of Electric Power Systems, vol. 40, no. 17, pp. 59-69, Sept. 2016. [百度学术

5

M. H. Ansari, V. T. Vakili, B. Bahrak et al., “Graph theoretical defense mechanisms against false data injection attacks in smart grids,” Journal of Modern Power Systems and Clean Energy, vol. 6, no. 5, pp. 860-871, Sept. 2018. [百度学术

6

G. Liang, J. Zhao, F. Luo et al., “A review of false data injection attacks against modern power systems,” IEEE Transactions on Smart Grid, vol. 8, no. 4, pp. 1630-1638, Jul.2017. [百度学术

7

S. Amini, F. Pasqualetti, and H. Mohsenian-Rad, “Dynamic load altering attacks against power system stability: attack models and protection schemes,” IEEE Transactions on Smart Grid, vol. 9, no. 4, pp. 2862-2872, Oct.2016. [百度学术

8

N. Živkovic and A. T. Saric, “Detection of false data injection attacks using unscented Kalman filter,” Journal of Modern Power Systems and Clean Energy, vol. 6, no. 5, pp. 847-859, Sept. 2018. [百度学术

9

J. Zhao, G. Zhang, M. L. Scala et al., “Short-term state forecasting-aided method for detection of smart grid general false data injection attacks,” IEEE Transactions on Smart Grid, vol. 8, no. 4, pp. 1580-1590, Jul.2017. [百度学术

10

J. Letchford and Y. Vorobeychik, “Optimal interdiction of attack plans,” in Proceedings of International Conference on Autonomous Agents and Multi-Agent Systems, Saint Paul, USA, May 2013, pp. 199-206. [百度学术

11

A. K. Nandi, H. R. Medal, and S. Vadlamani, “Interdicting attack graphs to protect organizations from cyber attacks: a bi-level defender-attacker model,” Computers & Operations Research, vol. 75, pp. 118-131, Nov.2016. [百度学术

12

S. Mei, Y. Wang, and L. Chen, “Overviews and prospects of the cyber security of smart grid from the view of complex network theory,” High Voltage Engineering, vol. 37, no. 3, pp. 672-679, Mar.2011. [百度学术

13

Q. Guo, S. Xin, J. Wang et al., “Comprehensive security assessment for a cyber physical energy system: a lesson from Ukraine’s blackout,” Automation of Electric Power Systems, vol. 40, no. 5, pp. 145-147, Mar.2016. [百度学术

14

Z. Li, W. Tong, and X. Jin, “Construction of cyber security defense hierarchy and cyber security testing system of smart grid: thinking and enlightenment for network attack events to national power grid of Ukraine and Israel,” Automation of Electric Power Systems, vol. 40, no. 8, pp. 147-151, Apr.2016. [百度学术

15

X. Yi and Y. Zhang, “Survivability of information system,” in Proceedings of International Conference on Information, Communications and Signal Processing, Bangkok, Thailand, Dec.2005, pp. 1551-1555. [百度学术

16

I. Garasym, “Information security system survivability assessment method based on logical-probabilistic models,” in Proceedings of International Conference on the Experience of Designing and Application of CAD Systems in Microelectronics (CADSM), Polyana-Svalyava, Ukraine, Feb.2011, pp. 160-161. [百度学术

17

A. K. Srivastava, T. A. Ernster, R. Liu et al., “Graph-theoretic algorithms for cyber-physical vulnerability analysis of power grid with incomplete information,” Journal of Modern Power Systems and Clean Energy, vol. 6, no. 5, pp. 887-899, Sept. 2018. [百度学术

18

H. Abie, R. Savola, J. Bigham et al., “Self-healing and secure adaptive messaging middleware for business-critical systems,” International Journal on Advances in Security, vol. 3, no. 1 & 2, 2010. [百度学术

19

Z. Bao, “Active defense of security risk in train control system,” Ph.D. dissertation, Beijing Jiaotong University, Beijing, China, 2017. [百度学术

20

X. Dong, L. Lin, X. Zhang et al., “The application of active defense technology in the communication network,” Information Security & Technology, no. 1, Jan.2016. [百度学术

21

S. Huang, H. Zhang, J. Wang et al., “Markov differential game for network defense decision-making method,” IEEE Access, vol. 6, pp. 39621-39634, Jun.2018. [百度学术

22

L. Zhang, “Research on network information system survivability technology,” Ph.D. dissertation, Harbin Engineering University, Harbin, China, 2008. [百度学术

23

Power Grid and Power Plant Computer Monitoring System and Dispatching Data Network Security Protection Rules, Order No. 30 of the National Economic and Trade Commission of the People’s Republic of China, 2002. [百度学术

24

Power Secondary System Security Protection Regulations, State Electricity Regulatory Commission Order No. 5, 2005. [百度学术

25

D. Chen, S. Han, M. Munro et al., “An analytic model of atomic service for services descriptions,” in Proceedings of International Conference on Service Sciences (ICSS), Hangzhou, China, May 2010, pp. 197-202. [百度学术

26

P. Wei, M. Yan, Y. Tan et al.,“Micro variation Chaos genetic algorithm,” in Proceedings of Chinese Control and Decision Conference (CCDC), Shenyang, China, Jun.2018, pp. 4523-4528. [百度学术

27

T. L. Saaty, “How to make a decision: the analytic hierarchy process,” European Journal of Operational Research, vol. 48, no. 1, pp. 9-26, Jan.1990. [百度学术