Journal of Modern Power Systems and Clean Energy

ISSN 2196-5625 CN 32-1884/TK

网刊加载中。。。

使用Chrome浏览器效果最佳,继续浏览,你可能不会看到最佳的展示效果,

确定继续浏览么?

复制成功,请在其他浏览器进行阅读

Security Risk Assessment and Risk-oriented Defense Resource Allocation for Cyber-physical Distribution Networks Against Coordinated Cyber Attacks  PDF

  • Shuheng Wei 1
  • Zaijun Wu 1
  • Junjun Xu 2
  • Yanzhe Cheng 3
  • Qinran Hu 1
1. School of Electrical Engineering, Southeast University, Nanjing210096, China; 2. College of Automation and College of Artificial Intelligence, Nanjing University of Posts and Telecommunications, Nanjing210023, China; 3. Shenzhen Power Supply Bureau Co., Ltd., Shenzhen518001, China

Updated:2025-01-22

DOI:10.35833/MPCE.2024.000288

  • Full Text
  • Figs & Tabs
  • References
  • Authors
  • About
CITE
OUTLINE

Abstract

With the proliferation of advanced communication technologies and the deepening interdependence between cyber and physical components, power distribution networks are subject to miscellaneous security risks induced by malicious attackers. To address the issue, this paper proposes a security risk assessment method and a risk-oriented defense resource allocation strategy for cyber-physical distribution networks (CPDNs) against coordinated cyber attacks. First, an attack graph-based CPDN architecture is constructed, and representative cyber-attack paths are drawn considering the CPDN topology and the risk propagation process. The probability of a successful coordinated cyber attack and incurred security risks are quantitatively assessed based on the absorbing Markov chain model and National Institute of Standards and Technology (NIST) standard. Next, a risk-oriented defense resource allocation strategy is proposed for CPDNs in different attack scenarios. The trade-off between security risk and limited resource budget is formulated as a multi-objective optimization (MOO) problem, which is solved by an efficient optimal Pareto solution generation approach. By employing a generational distance metric, the optimal solution is prioritized from the optimal Pareto set of the MOO and leveraged for subsequent atomic allocation of defense resources. Several case studies on a modified IEEE 123-node test feeder substantiate the efficacy of the proposed security risk assessment method and risk-oriented defense resource allocation strategy.

I. Introduction

IN order to effectuate a reliable and efficient power supply, power distribution networks have gradually evolved into cyber-physical distribution networks (CPDNs) with the accelerating development of smart grids [

1], [2]. As a result, the observability and controllability of CPDNs are greatly enhanced by the bidirectional interaction between cyber and physical constituents. However, the relatively inadequate defense means of CPDNs can hardly isolate cyberspace risks from the physical system, thereby allowing potential cyber attackers to exploit exposed vulnerabilities to damage critical system facilities [3], [4]. Therefore, it is indispensable to accurately assess the operational security risk and reasonably distribute restricted defense resources for CPDNs.

In the context of CPDN that is subject to potential cyber-attack threats, security risk can be generally seen as a comprehensive measure of the occurrence probability and severity of attacks. Existing security risk assessment methods can be broadly categorized into two groups, i.e., risk modeling [

5]-[9] and quantification [10]-[14]. In the former group, the security risk assessment for state estimation was devised as a mixed-integer linear programming problem [5]. A Bayesian-regime-based risk assessment model was proposed for gauging security implications by using the epidemic model and optimal load shedding ratio [6]. Denial-of-service (DoS) attacks, known as their capability of jamming cyber communication networks, have drawn much attention in the realm of cyber-physical systems, e.g., sampled-data control [7] and stability analysis [8]. From a game-theoretic point of view, a risk assessment framework was established for power systems with external DoS attacks [9]. However, previous studies mainly focus on exploring risk modeling methods under single-domain attacks, indicating a lack of consideration for complex coordinated attacks in an ever-evolving environment.

For risk quantification methods, the semi-Markov process model was utilized to delineate the process of cyber attacks against the supervisory control and data acquisition (SCADA) system [

10], [11]. Involving the feeder automation systems, an entropy-like risk quantification approach was developed for CPDNs [12]. In [13], the cyber intrusion process against substations was emulated by generalized stochastic Petri nets, whereby the security risk was quantified by the product of successful intrusion probability and load loss [13], [14]. In general, the risk provoked by cyber attacks can be well evaluated by the studies above. Nonetheless, the impact of defense resources (also called hardening measures) on the risk propagation process has yet to be further investigated.

To ensure robust cyber-physical interaction and mitigate security risks, researchers have begun probing how to allocate defense resources [

15]-[20], which can be seen as an inclusive abstraction of invested physical facilities and defense-related software. With the goal of improving observability and state estimation accuracy, optimal phasor measurement unit (PMU) placement methods have been developed under cyber attacks, e.g., [15], [16], but the demerit is that deploying PMUs cannot fundamentally protect CPDNs from cyber attacks (considering the spoofing of global positioning system) and introduces additional investment. For fortifying operation reliability, robust optimization techniques were adopted to allocate line defense resources and distributed generators against multi-period attacks [17]. When it comes to the transmission level, an actuarial insurance principle was designed to incentivize the optimal defense resource allocation as a Stackelberg security game [18]. Likewise, a two-layer defense resource allocation framework was established considering bounded rationalities in the attack-defense game [19]. In [20], the risk incurred by cyber attacks was quantified via the success rate, and optimal allocation methods with a fixed risk value and limited budget were presented respectively. However, the aforementioned studies either focus on small-scale microgrids [17] or devise game-theoretic models for generator-dominated transmission power grids [18], [19], which yield restricted applicability in CPDNs with unbalanced features and deeply intertwined cyber-physical components. Complex cyber topology and analyses of the cyber-attack process were not considered in [20], which led to an over-idealized risk assessment result and the defense resource was simply allocated according to the risk value proportionally. Moreover, the majority of previous studies presume that system measurements can be fully protected in the presence of cyberspace threats, but such an assumption is not feasible for practical CPDNs. It is more reasonable to assume that the ability of a measurement to withstand cyber attacks depends on the amount of deployed defense resources. In this regard, how to optimize the allocation settings (e.g., the resource budget and allocation precision) and prioritize the optimal solution from the suboptimal strategy set are the key issues that need to be resolved in further research.

Driven by the limitations and challenges above, this paper proposes a security risk assessment method and a risk-oriented defense resource allocation strategy for CPDNs. Evolving from existing studies that mainly consider single-domain attacks, the proposed method takes into account the risk propagation process and vulnerabilities of system measurements according to the attack graph-based CPDN architecture. Based on an absorbing Markov chain model, the CPDN security risk is quantified under coordinated cyber attacks that aim to corrupt pseudo and real-time measurements. The devised resource allocation strategy is risk-oriented following the previous security risk assessment results. By solving a multi-objective optimization (MOO) problem, the optimal defense resource allocation setting is prioritized via a generational distance metric and leveraged for the atomic allocation approach. Overall, the contributions of this paper are mainly threefold:

1) A security risk assessment method for CPDN is proposed under coordinated cyber attacks, in which the probability of a successful attack and provoked security risk are quantitively evaluated based on the constructed attack graph-based CPDN architecture and representative cyber-attack paths.

2) A risk-oriented defense resource allocation strategy is designed to mitigate the quantified security risk. Specifically, the formulated MOO problem addresses the trade-off between security risk and limited resource budget, which is solved by an efficient optimal Pareto solution generation approach.

3) An atomic allocation approach for defense resources is developed to further alleviate the overall system risk, in which the limited budget is divided into atomic units and iteratively deployed to the measurement with the highest risk reduction.

The remainder of this paper is structured as follows. Section II presents the preliminaries and problem formulation. Section III details the proposed security risk assessment method. The risk-oriented defense resource allocation strategy is given in Section IV. Case studies are shown and analyzed in Section V. Finally, Section VI concludes the paper.

II. Preliminaries and Problem Formulation

A. CPDN Structure

Fueled by the proliferating information and communication technologies (ICTs) and advanced metering infrastructures (AMIs), distribution networks are transforming into CPDNs with deep cyber-physical coupling. The schematic diagram of CPDN is displayed in Fig. 1, which can be generally divided into two parts: physical and cyber layers. The physical layer includes transformers, distribution lines, feeder switches, circuit breakers, plug-in electric vehicles, and virtual plants (i.e., the aggregation of wind turbines, photovoltaics, and controllable energy storage devices), etc. The cyber layer is comprised of communication software, protocols, cyber network topology, and other ICT equipment.

Fig. 1  Schematic diagram of CPDN.

As shown in Fig. 1, the typical CPDN can be described as a three-layer hierarchical nested structure. The bottom physical layer contains the user-side feeder and other primary equipment components, as well as intelligent electronic devices (IEDs), feeder terminal units (FTUs), and intelligent terminals. The intermediate access layer adopts mixed communication technologies, e.g., Ethernet passive optical network (EPON), Ethernet with transmission control protocol/Internet protocol (TCP/IP), and wireless public/private network, to exchange command and response between distribution substations and terminal units in the physical layer. In general, the reliability of access and physical layers is relatively lower than that of the backbone layer. The topmost backbone layer (i.e., backbone network) located in the master station is comprised of the SCADA, management information system (MIS), energy management system (EMS), and man-machine interface, thereby realizing advanced functionalities such as energy management, feeder automation, mobile connectivity, and human-computer interaction. Based on synchronous digital hierarchy (SDH) or multi-service transport platform (MSTP), the backbone network is equipped with the highest level of security protection and is remotely connected to downstream substations via switches and routers.

B. Coordinated Cyber Attacks Against CPDN

While the observability and controllability of the network are significantly upgraded by advanced ICTs and widely deployed AMIs, CPDN is also becoming more susceptible to external security risks caused by malicious attacks, which can be categorized according to their targets (e.g., substations, communication links, and physical terminals) into two types: cyber attacks and physical attacks [

3], [21].

From the perspective of system operators, to mitigate the mounting cybersecurity threats, intrusion detection systems (IDSs) and firewalls are massively deployed for the backbone layer, which operates in a relatively isolated manner with a very limited number of channels that adversaries can exploit (see Case 1 in Fig. 1). Owing to the relatively low security of the access layer, attackers can take advantage of the security loopholes to invade the cyber network (see Case 2 in Fig. 1), thereby launching data replay, jamming, DoS, man-in-the-middle, and other cyber attacks to interfere the cyber-physical interaction and jeopardize operation reliability. Meanwhile, the broadly distributed IEDs, lines, feeder switches, and breakers can be leveraged by adversaries to initiate data manipulation, line overload, topology, and other physical attacks (see Case 3 in Fig. 1), so as to falsify the system topology and parameters to vandalize the decision-making strategies in the master station. Considering the compulsory N-1 and N-2 security checks of CPDN, attackers tend to randomly combine multiple cyber and physical attacks in Cases 2 and 3 under different spatial and temporal conditions to boost the severity and success probability [

22], thus exposing CPDN to superimposed and intensified security risks. In this study, such a combined attack is defined as a coordinated cyber attack.

III. Proposed Security Risk Assessment Method

Referring to previous records of major outage events [

22], antagonistic attacks aiming at damaging power grids typically exhibit a coordinated nature. However, prevailing security risk assessment methods have difficulty in evaluating the coordinated risk and the corresponding propagation path. To bridge the gaps, this section proposes a security risk assessment method for CPDN in the presence of coordinated cyber attacks.

A. Probabilistic Analysis of Successful Attacks

Note that the access and physical layers in CPDN are more susceptible to external security threats, thereby different kinds of cyber and physical attacks under Cases 2 and 3 in Fig. 1 can be arbitrarily combined to form a coordinated cyber attack, which is taken as the focus of this study. Besides, this study aims to develop defense countermeasures against cyber attacks that compromise load profiles and real-time measurements, which are critical for situation awareness and reliable system operation. Since distribution lines, feeder switches, and circuit breakers are spread over a large geographical area in the physical layer, it is rather challenging to coordinate multiple physical attacks simultaneously under different spatial conditions [

23]. Therefore, IEDs connected to the access layer are more easily exploited by antagonists to achieve data manipulation attacks. In accordance with Fig. 1, we presume routers, substations, access network, and IEDs (nodes/devices with relatively weak hardening measures) as potential coordinated cyber-attack portals.

To characterize the cross-domain security risk propagation process triggered by coordinated cyber attacks against load profiles and real-time measurements, two representative graph-based cyber-attack paths consisting of logical nodes and topology are drawn in Fig. 2. As can be observed, potential cyber attacks commenced from the router, substation, access network, and IED are denoted by the orange nodes. CPDN nodes/devices are represented by the blue nodes, which are denoted as logical nodes in the sequel. Communication networks and the attack target are marked by green nodes and red dashed circles, respectively. Arrows in different colors show the direction of security risk propagation. For each attack portal, a certain number of security loopholes are assumed to be exploitable, thus constructing the subsequent propagation path. However, it should be noted that the number of loopholes that need to be exploited to form an attack path should be as few as possible considering the attacker’s limited attack means. Thus, it is reasonable to assume that after infiltrating the loophole at the entry point in Fig. 2, the attacker is likely to manipulate the attack to propagate through the black arrows (i.e., the transition probability between logical nodes) in sequence [

24], instead of continuing to exploit intractable security loopholes.

Fig. 2  Graph-based cyber-attack paths in CPDN. (a) Load profile attack. (b) Real-time measurement attack.

1) Selection of Attack Portals

Malicious cyber attackers can randomly pick attack portals and exploit the corresponding security loopholes to capture the control permissions. In CPDN, the logical nodes are assumed to be independent of each other, namely, the infiltration of a specific portal does not affect the attack path formed by other portals. Therefore, it is presumed that: ① the selection of attack portals is independent of each other; and ② an attack path can only be formed from a single attack portal. In this way, the attacker can intercept and spoof data packets to eavesdrop or falsify the load profile/real-time measurement starting from the orange arrows in Fig. 2. The following constraint specifies the probability range of an attack portal being selected:

PR,i,PSub,i,PIED,i,PAN,i[0,1] (1)

where PR,i, PSub,i, PAN,i, and PIED,i are the independent probabilities of router, substation, access network, and IED being designated to form a specific attack path i, respectively.

2) Selection of Security Loopholes

The yellow nodes and purple arrows in Fig. 2 represent the inherent security loopholes of portals and the selected probabilities, respectively. However, the differences in the availability of different security loopholes will also lead to the attacker’s varying intrusion choices. That is, the higher the exploitability, the greater the probability of security loopholes being selected by the attacker. Therefore, for a single attack path, we define the likelihood of a loophole being chosen as the ratio of its exploitability to the sum of the exploitability of all adjacent loopholes, which is expressed as:

PSel(Lj)=PExp(Lj)/j=1nLPExp(Lj) (2)

where PSel(Lj) and PExp(Lj) are the selected probability and exploitability of the security loophole Lj, respectively; and nL is the total number of loopholes (j=1,2,,nL) at a specific portal.

3) Exploitability of Security Loopholes

The exploitability of security loophole Lj (i.e., PExp(Lj)) is represented by the green arrows in Fig. 2. Analytically, PExp(Lj) is related to the access vector (AV), access complexity (AC), and authentication (AU) under the common vulnerability scoring system (CVSS) standard [

25], [26]. Besides, the exposure duration of loopholes tLj also exerts a significant influence on PExp(Lj). Taking into account the factors above, the Pareto distribution and CVSS standard are leveraged to describe the exploitability of security loopholes [27], which can be expressed as:

PExp(Lj)=[1-(k1/tLj)k2]CLjAVCLjACCLjAU (3)

where k1 and k2 are the scale and shape parameters, respectively; and CLjAV, CLjAC, and CLjAU are the AV, AC, and AU scores of Lj under the CVSS standard, respectively.

4) Transition Probability Between Logical Nodes

The black arrows in Fig. 2 indicate the transition probability between logical nodes, which is pertinent to the vulnerability of communication links and attack resources available to the adversary. In this study, the specific tools or technical levels the attacker possesses are considered as the attack resource and its practical significance will be detailed in Section III-B. Analogous to the equipment failure setting in [

10] and [28], this study adopts the exponential function to model the relationship between the vulnerability of communication links and offensive resources. Formally, for the ith attack path, the transition probability within the communication link between logical nodes is:

PiTr(riA)=1-e-λiriA    0<PiTr(riA)1 (4)

where riA is the disposed attack resource for a single attack; and λi is the scaling coefficient, which yields λi=-ln(1-AFi)/ACi. The fraction AFi satisfies 0<AFi1, and ACi indicates the attacker’s cost for exploiting the vulnerability of the communication link.

5) Success Probability of Multiple Attack Paths

To derive the probabilistic expression for cyber-attack paths shown in Fig. 2, this study constructs the attack graph based on the absorbing Markov chain model [

29] as it encompasses the following properties: ① an attack graph contains at least one absorbing state; and ② in an attack graph, starting from every state, one can eventually reach an absorbing state.

Attack portals and the pseudo/real-time measurements in Fig. 2 are defined as the initial state and attack target (i.e., the absorbing state), respectively, and other logical nodes are defined as transient states. Once a single attack reaches the absorbing state, CPDN is considered to be in a compromised state. As a result, the system remains in this state until security practitioners react to eliminate the anomaly.

Combining (1)-(4), the transition probabilities between different logical nodes can be calculated, thereby constituting the transition matrix of an absorbing Markov chain as:

Ctrans=TA0IR(t+a)×(t+a) (5)

where ARt×a and TRt×t are the matrices of a absorbing states and t transient states, respectively; and I is the identity matrix.

Recall the Property ② above, the probability that the chain will be absorbed always equals one. Hence, when the cardinality of states n, we have Tn0. For the canonical form (5) of absorbing Markov chain Ctrans, the matrix I-T has an inverse Inv=(I-T)-1=I+T+T2+T3+, which is the fundamental matrix of Ctrans. To measure the likelihood of a single attack eventually reaching the absorbing state, Inv and A in the canonical form (5) are used to calculate the success probability of each attack path Q=InvA. The element qij signifies the probability of being absorbed by state j given an initial state i. Therefore, Q can be described as Q=(I-T)-1A, which is derived by successively multiplying the selected probability, loophole exploitability, and logical node transition probabilities (1)-(4).

Different attack paths can be elaborately combined for a single attack target to reconfigure the load profile or real-time measurements. Thus, it is assumed that multiple attack paths can be exploited concurrently and the success probability of a single attack path is independent of each other. As a result, the success probability of multiple attack paths can be calculated:

Pm=i=1NPQ{i}=i=1NP(I-T{i})-1A{i} (6)

where NP is the number of all possible attack paths for compromising the mth attack target; Q{i} is the success probability; and T{i} and A{i} are the matrix quantities (which have been defined above) corresponding to the ith attack path.

B. Security Risk Assessment

As illustrated in Section III-A, specific approaches and skill levels of an attacker are considered as the attack resource. Similarly, the defense resource can be represented by the degrees of practical defense means. To evaluate the risk, the attack and defense resources need to be quantified by the same metric considering the practical significance. That is, all attack and defensive means can be evaluated by the monetary value.

Practical security controls, e.g., IDSs, firewalls, anti-virus software/hardware, and data integrity checking software, require significant monetary expense to be effective. Likewise, a great amount of monetary expenditure is indispensable for antagonists to elaborate on valid attack strategies. Therefore, the practical significance of the amount of attack/defense resources is defined by the monetary value, and the base number of a resource unit can be presumed as one thousand or one million in any currency. In this way, the attacker/system operator can quantify the employed intrusion techniques or security controls via dividing their monetary investments by the base number of a resource unit, so as to derive the dimensionless resource value.

Since the attack in this study targets load profiles and real-time measurements, the attack resource is represented by the relative cost of exploiting loopholes and executing attacks for a cyber intrusion, while the expense required (i.e., invested physical facilities and defensive software) for mitigating the vulnerability of a single measurement signifies the defense resource. Real-time measurements originate from meter units in the physical domain, and a successful attack on a single unit means that any measurement channel collected by that unit can be falsified. As for the load profile represented by pseudo measurements, we presume that it interacts with other logical nodes through data packets, of which successful interception can manipulate an arbitrary load data it contains. Similar to (4), the relationship between measurement vulnerability vm and deployed defense resource rmD is written as [

10], [24]:

vm(rmD)=e-αmrmD    0<vm(rmD)1 (7)
αm=-ln(DFm)/DCm    0<DFm1 (8)

where rmD is the disposed defense resource for the mth measurement unit; and αm is the defender’s cost DCm to reduce vm(rmD) with the predetermined fraction DFm.

Without losing generality, assuming that an attacker aims to alter N measurements. For the single mth measurement unit with NP attack paths available, the probability of a successful attack can be obtained by firstly accumulating the success probability of each path by (6), and then multiplying them by the measurement vulnerability (7) as: Pmvm(rmD). As a consequence, the success probability of a coordinated cyber attack can be computed by multiplying the success probability of each measurement unit cumulatively:

PCO=m=1NPmvm(rmD)=m=1Ni=1NP(I-Ti)-1Ai)e-αmrmD (9)

Remark 1: it can be intuitively inferred from (9) that the success probability is proportional to the number of attack paths NP for a single target measurement. However, raising the number of target measurement units N can degrade the likelihood of successful coordinated cyber attacks.

Referring to the National Institute of Standards and Technology (NIST) SP 800-82r3 standard for risk assessment [

30], the accidental risk is denoted by the product of accident probability and its physical consequence, whereas system risk is the sum of all anticipated accidental risks. Hence, the coordinated cyber attack is considered as a special kind of incident in this study based on the NIST standard, and the resultant security risk is expressed as the product of its success probability (9) and physical consequence. As a result, the overall system risk of CPDN RSys can be defined as the sum of risks induced by all coordinated cyber attacks as:

RkCO=PkCOCkRSys=k=1NKRkCO (10)

where RkCO and Ck are the security risk and physical consequences provoked by the kth coordinated cyber attack, respectively; PkCO is the success probability of the kth attack; and NK is the total number of coordinated cyber attacks.

Remark 2: existing studies mostly employ load shedding as the indicator for Ck. However, such a metric for transmission systems may not be applicable to CPDNs under quasi-steady operation conditions. In contrast, the number of corrupted measurements is adopted for modeling the game in [

31], which can be defined as the attacker’s and defender’s objective simultaneously. Thus, the physical consequence Ck is denoted by the number of falsified measurement units, thereby simplifying the calculation process and facilitating the subsequent risk-oriented defense resource allocation.

IV. Risk-oriented Defense Resource Allocation Strategy

CPDNs generally suffer from the inadequacy of security controls, thereby the protection of critical assets needs to be prioritized. To fully utilize the limited defense resource budget and mitigate cybersecurity risks, a novel risk-oriented defense resource allocation strategy is proposed in this section.

A. Attack-defense Interactions

Because the system risk RSys is delineated by the product of occurrence probability and physical impact, the attacker can boost the risk level by distributing more resources for a cyber intrusion, and the risk can be mitigated by an increased number of defense resources. Thus, from the perspective of system operators, the defense resource allocation problem can be investigated considering the interaction of attackers and defenders, where each player’s action space comprises all the possible attack and defense strategies. For the attacker, the attack strategy is the practical means by which coordinated cyber attacks can be implemented and the amount of attack resources can be deployed for a specific one. Assume the attacker launches NK coordinated cyber attacks, then the disposed attack resource γ can be written as a column vector:

γ=[r1A,r2A,,rNKA]T (11)
k=1NKrkA=τA (12)

where rkA is the attack resource positioned for the kth attack and satisfies 0rkAτA,k=1,2,,NK; and τA is the limited attack resource budget. On the contrary, the defender distributes a limited defense resource budget τD over all the NM system measurements. Similarly, the column vector of defense resource ξ is given by:

ξ=[r1D,r2D,,rND]T (13)
m=1NrmD=τD (14)

where rmD is the deployed defense resource for the mth measurement and satisfies 0rmDτD,m=1,2,,N. Note that the practical significance of attack and defense resources have been illustrated in Section III-B.

The payoff within attack-defense interactions is generally assessed by the system loss/gain value (i.e., the variation of system risks) caused by the attack/defense strategy. The attacker’s objective is to maximize the risk by increasing the success probability and physical consequence to the greatest possible extent, whose payoff can be formulated as:

{γ*,ξ}argmaxγ𝒫A(γ,ξ)argmaxγΔRSys(γ,ξ) (15)

where γ and ξ are the arbitrary non-optimal strategies of the attacker and defender, respectively; and γ* is the attacker’s optimal strategy that can maximize the payoff 𝒫A(γ,ξ), denoted by the incremental risk ΔRSys(γ,ξ).

For the defender, an opposite objective is endowed, who intends to minimize the incremental risk ΔRSys(γ,ξ) in the presence of an attack strategy γ as:

{γ,ξ*}argminξ𝒫D(γ,ξ)argminξΔRSys(γ,ξ) (16)

where ξ* is the optimal defense resource allocation strategy that can minimize ΔRSys(γ,ξ), i.e., the payoff 𝒫D(γ,ξ). Therefore, the four-tuple strategy {γ*,ξ*,γ,ξ} of attack-defense interactions subjects to the following inequality set:

𝒫A(γ*,ξ)𝒫A(γ,ξ)0 (17)
𝒫D(γ,ξ*)𝒫D(γ,ξ)0 (18)
RSys(γ*,ξ)RSys(γ*,ξ*)RSys(γ,ξ*)0 (19)

B. MOO and Solution Selection

Referring to related studies [

32], [33], the cybersecurity concerns are well addressed by MOO-based defensive approaches. To address the decision-making issue, i.e., the comprehensive trade-off between overall system security risk and limited resource budget, the determination of defense resource allocation settings is devised as a MOO problem from the defender’s point of view. Based on Section IV-A, the MOO is devised to identify the optimal solution that minimizes the security risk RkCO and defense resource budget τkD simultaneously in the presence of coordinated cyber attacks. Formally, the MOO can be formulated as:

minγ,ξk=1NKRkCOminγ,ξk=1NKτkD (20)

s.t.

RkCO=PkCOCk    γ,ξ,k (21)
τA=k=1NKrkAτkD=m=1Nrm,kD    γ,ξ,k (22)
τminDτkDτmaxD    γ,ξ,k (23)
xminDxkDxmaxD    γ,ξ,k (24)
τkD: r1,kD=r2,kD==rN-1,kD=rN,kD    γ,ξ,k (25)

where rm,kD is the defense resource deployed for the mth measurement against the kth attack; τminD and τmaxD are the lower and upper bounds of resource budget, respectively; and xminD and xmaxD are the lower and upper limits of allocation precision, respectively.

The MOO objective (20) aims to minimize RkCO and τkD simultaneously with the defense strategy (i.e., the decision variable ξ) under all the NK potential coordinated cyber attacks (i.e., the decision variable γ). Constraints (21) and (22) specify the constitution of RkCO, τA, and τkD from (10), (12), and (14). Constraints (23) and (24) indicate the lower and upper limits for the defense resource budget τkD and the allocation precision xkD (which will be detailed in Section IV-C), respectively. Constraint (25) ensures that defense resources are initially allocated to each measurement equally.

By solving the formulated MOO, the optimal solution can only be described by a set of optimal Pareto solutions due to the contradiction of the two objective functions. Note that the number of attacks is relatively small at the beginning of cyber intrusions, and the defense strategy space scale is therefore limited. In this case, traversing methods can be leveraged to approach the optimal Pareto front. However, the strategy space can be exponentially expanded in practice as the attack-defense interactions evolve with time. To address the issue, the nondominated sorting genetic algorithm III (NSGA-III) [

34] is employed to solve the MOO with a relatively large strategy space. Based on a reference-point-oriented elitist selection approach, NSGA-III is capable of converging to the optimal Pareto front with superior efficiency and diversity preservation performance, in contrast with traditional traversing methods and the nondominated sorting genetic algorithm II (NSGA-II).

Initially, a parent population P0 is arbitrarily generated in the NSGA-III, thus the two objective values corresponding to each individual in P0 can be evaluated. Then, each individual is ranked by the nondominated sorting procedure [

35], where its nondomination rank (irank) and perpendicular distance to the reference line (idist) are also calculated according to the objective values. Afterward, the lth generation of NSGA-III can be described by the following step-by-step loop.

1) Given the parent population Pl with N individuals from (l-1)th generation, the offspring population Ql of size N is created from Pl using crossover and mutation operators.

2) Form a combined population of size 2N from Pl and Ql as: Rl=PlQl.

3) Evaluate objective values for each individual in Rl, then compute its nondomination rank (irank) and perpendicular distance to the reference line (idist).

4) Go through the nondominated sorting procedure, then form a new population Pl+1 for the next generation by the reference-point-oriented elitist selection approach [

35].

5) Increment the generation counter: ll+1.

The step-by-step loop above is iterated until the counter l reaches the maximum number of generations, and the detailed formulation of NSGA-III can be found in [

34] and [36].

To satisfy the requirements of optimizing multiple objective functions, it is necessary to select an optimal solution Xp from the optimal Pareto set P derived from NSGA-III. Hence, the generational distance metric in [

37] is adopted to evaluate the optimality of different solutions in P. According to (20), the vector corresponding to a solution XpP is defined as the objective vector, given by (26). Such objective vectors are combined to form the Pareto front.

RpSys=k=1NKRkCO,τpD=k=1NKτkD (26)

where RpSys and τpD are the sum of security risks and the sum of defense resources under all the NK cyber attacks, respectively.

A random vector in the Pareto front can be seen as a scatter point in the two-dimensional space, where the x-axis and y-axis are represented by RpSys and τpD, respectively. Then, the generational distance metric measures the proximity between a random objective vector and the ideal vector, thus the optimality of the corresponding solution Xp in the optimal Pareto set P can be quantitively evaluated. As shown in (20), the minimum value of each objective in the Pareto front constitutes the ideal vector, described by:

minXpPRpSys,minXpPτpD (27)

Then, each objective vector is normalized based on the ideal vector value in the two-dimensional space:

R¯pSys=RpSys-minXpPRpSys/maxXpPRpSys-minXpPRpSysτ¯pD=τpD-minXpPτpD/maxXpPτpD-minXpPτpD (28)

where R¯pSys and τ¯pD are the normalized values of RpSys and τpD, respectively.

Finally, the 2-norm of the normalized objective vector is computed to derive the generational distance metric Dis as:

Dis(Xp)2=(R¯pSys)2+(τ¯pD)2 (29)

Remark 3: according to the generational distance metric, different solutions in the optimal Pareto set can be prioritized. The solution with the minimum distance metric is the optimal one, since it enables the corresponding objective vector closest to the ideal vector in the two-dimensional space.

C. Atomic Allocation Approach for Defense Resources

Based on prioritized optimal solutions, the defense resource allocation budget τD can be specified for the subsequent defensive countermeasure design. However, it is noteworthy that defense resources are equally allocated for each measurement in the previous step, which is not applicable in the face of varying coordinated cyber attacks. To allocate the limited budget more efficiently, an atomic allocation approach is proposed in this subsection for the defender to further trim down the overall system risk.

Referring to [

38], defense resources should be deployed according to the fastest descent direction of the overall system risk RSys. In such cases, the problem can be categorized as an atomic allocation, where the term “atomic” indicates that the defense budget has reached the minimum unit and cannot be divided further. As the atomic unit is repeatedly allocated, the system risk can be mitigated as the cost of defense resources gradually increases. In this study, supposing the defense budget τD is divided into multiple atomic units, whose base number can be arbitrarily presumed as a small value in any currency. At each allocation step, a single atomic unit is deployed to the measurement with the highest risk reduction value through all the coordinated cyber attacks. The flow chart of the proposed atomic allocation approach for defense resources is shown in Fig. 3, and detailed procedures are illustrated in the following.

Fig. 3  Flow chart of proposed atomic allocation approach for defense resources.

Step 1:   initialization. Initially, the defense resources on all measurement devices are set to be r0D=0. The defense resource budget τD is divided into multiple atomic units according to the allocation precision xD, and set the iteration counter t=1.

Step 2:   iteration of measurements. At the tth iteration, deploy an atomic unit (i.e., τD/xD) to each measurement as:

rt,mD=rt,mD+τD/xD    m=1,2,,N (30)

where rt,mD is the deployed resource of the mth measurement.

Then, calculate the system risk RSys under all the NK possible cyber attacks, and the set of system risks after each measurement is equipped with an atomic unit can be obtained as:

RtSys={Rt,1Sys,Rt,2Sys,,Rt,mSys,,Rt,NSys} (31)

where Rt,mSys is the system risk when the mth measurement is equipped with an atomic unit at the tth iteration.

Step 3:   atomic unit allocation. Identify the minimum value in RtSys (assumed to be the jth element Rt,jSys), then assign the tth atomic unit to the jth measurement:

rjD=rjD+τD/xD (32)

where rjD is the allocated resource for the jth measurement.

Step 4:   terminate evaluation. Except for the jth measurement, defense resources of all the measurements are reset to be r0D=0 for the next iteration. Moreover, set t=t+1, if t>xD, the iteration terminates, indicating that all the xD atomic units have been distributed, and the system risk value RSys can be determined based on the current allocation scheme. Else, the iteration continues and returns to Step 2.

V. Case Study

A. Experimental Setup

The proposed security risk assessment method and risk-oriented defense resource allocation strategy are developed in MATLAB R2022b environment. The simulation is implemented on a PC with an Intel Core i5-10400F CPU and 32 GB RAM. To emulate the CPDN, an unbalanced distribution test feeder consisting of pseudo measurements, SCADA units, and PMUs is employed as the testbed for the proposed method. The standard IEEE 123-node test feeder is modified by integrating several DGs with a P-Q controlling strategy. Details of feeder configuration, line impedances, regulator data, and transformer data can be found in [

39].

Referring to the U.S. National Vulnerability Database [

40], specific information of the exploitable security loopholes at attack portals is tabulated in Table I, where each loophole is unique and denoted by a common vulnerability and exposure (CVE)-ID. The assigned values of CVSS scores are presented in Table II. With the CVSS scores, the exploitability of each loophole can be calculated by (3). Due to the multiplicity and accessibility of IEDs, their loopholes are assigned as L1, L4, L5, L6, and L12. For routers and the access network, potential loopholes consist of L2, L3, L9, and L11 with the moderate exploitability. L7, L8, and L10 are defined as the loophole of the substation due to its relatively secure cyberspace. Scale and shape parameters of the Pareto distribution are set as: k1=0.00161 and k2=0.26 [41]. For modeling the transition probability between logical nodes, the attacker’s fraction AF and cost AC are set to be 0.9 and 100, respectively [42]. To derive the measurement vulnerability, the defender resource fraction DF is set to be 0.1 for all meter units [41], and the costs DC are set to be 100, 200, and 300 for the 127 pseudo measurements, 21 SCADA units, and 4 PMUs, respectively, to address their varying security levels [24].

TABLE I  Exploitable Security Loopholes at Attack Portals
No.CVE-IDCVSS scoreExploitability
L1 CVE-2016-5053 CAV: N,CAC: L,CAU: N 0.5403
L2 CVE-2020-10923 CAV: A,CAC: L,CAU: N 0.3848
L3 CVE-2015-7599 CAV: N,CAC: H,CAU: N 0.3088
L4 CVE-2018-5678 CAV: N,CAC: L,CAU: N 0.5387
L5 CVE-2018-19524 CAV: N,CAC: L,CAU: N 0.5368
L6 CVE-2020-8958 CAV: N,CAC: L,CAU: N 0.5282
L7 CVE-2018-0453 CAV: L,CAC: L,CAU: S 0.1398
L8 CVE-2015-4684 CAV: N,CAC: L,CAU: S 0.1626
L9 CVE-2014-8684 CAV: A,CAC: L,CAU: N 0.3857
L10 CVE-2014-3569 CAV: A,CAC: H,CAU: N 0.2146
L11 CVE-2015-4879 CAV: N,CAC: L,CAU: S 0.4064
L12 CVE-2015-2822 CAV: N,CAC: L,CAU: N 0.5056
TABLE II  Assigned Values of CVSS Scores
MetricLevelValue
AV CAV Local (CAV: L) 0.55
Adjacent network (CAV: A) 0.62
Network (CAV: N) 0.85
AC CAC High (CAC: H) 0.44
Medium (CAC: M) 0.58
Low (CAC: L) 0.77
AU CAU Multiple (CAU: M) 0.27
Single (CAU: S) 0.61
None (CAU: N) 0.85

B. Study of Security Risk Assessment

The CPDN is assumed to be exposed to external attacks in this subsection, whereby the budget value τD is initialized to zero without deploying defense resources. Load profiles are distributed in CPDN in the form of pseudo measurements, represented by all the nodal power injections except for the reference node at the slack bus in Fig. 4. Besides, the set of real-time measurements is constituted by SCADA units and PMUs, which are marked in yellow and pink in Fig. 4, respectively. Faced with realistic constraints, the attacker is assumed to possess a limited resource budget τA=2000 and distribute it evenly for each attack considering a bounded rationality. For each measurement, success probabilities of single-target cyber attacks are calculated and shown in Fig. 5. As can be observed, attacks against pseudo measurements generally yield a higher success rate of about 0.2, while the ones for SCADA units and PMUs are at relatively low levels (about 0.08 to 0.15). For a single-target attack, the success probability of each attack path is shown in Fig. 6. In Fig. 6(a), with more exploitable attack paths, pseudo measurements are more susceptible to cyber intrusions in contrast with SCADA units and PMUs in Fig. 6(b) and 6(c). This is because attack paths of pseudo measurements (40 paths) are significantly more than those against SCADA units or PMUs (24 paths). Since the success probabilities are computed by accumulating multiple paths according to (6), load profile attacks are therefore more likely to succeed in the CPDN.

Fig. 4  Modified IEEE 123-node test feeder and its network topology.

Fig. 5  Success probabilities of single-target cyber attacks for each measurement.

Fig. 6  Success probabilities of different attack paths of single-target attacks for each meter unit. (a) Pseudo measurements. (b) SCADA units. (c) PMUs.

Coordinated cyber attacks can be categorized according to the number of targets, i.e., the attack indexed by N indicates that it randomly chooses N targets out of all the vulnerable measurements. This study considers coordinated cyber attacks indexed from 1 to 10 (N=1,2,,10), where each index is randomly launched 100 times against pseudo measurements, SCADA units, or PMUs. The risk RNCO and probability PNCO are cumulatively and averagely computed under different N, respectively. Utilizing the security risk assessment method in Section III-B, success probabilities and induced risks of coordinated cyber attacks are summarized in Table III. It can be observed that attacks with a smaller index tend to yield a higher success possibility. This is because when N is greater than 2, calculating the success probability of a coordinated attack needs to involve a cumulative multiplication in (9), i.e., the success probability is inversely proportional to the number of attack targets, which is coincident with Remark 1. Overall, it can be concluded that the overall system risk RSys is mostly dominated by the first three attacks (N=1,2,3) since i=13RiCO/RSys=99.10%.

TABLE III  Security Risk Assessment Results of Coordinated Cyber Attacks
NMPNMCORNMCONMPNMCORNMCO
1 1.7290×10-1 18.1952 6 3.3802×10-6 2.3012×10-3
2 1.9400×10-2 3.8387 7 6.2835×10-7 4.5991×10-4
3 6.1096×10-3 1.2373 8 8.0135×10-8 5.8516×10-5
4 5.3866×10-4 0.1984 9 1.3116×10-8 1.0798×10-5
5 1.1987×10-5 0.0102 10 2.2315×10-9 1.5379×10-6

To validate the efficacy of the proposed method, two probabilistic risk assessment methods, namely, the method based on resource conversion coefficients (RCCs) [

9] and the risk-based contingency screening (RCS) method [14], are used for benchmarking.

Cyber attacks with index N=1 are first adopted against pseudo measurements since such a scenario exhibits the highest risk. Figure 7 shows the success probability of each attack path derived by the three methods. As can be observed, a large number of success probabilities are simply quantified by zero values using RCC and RCS, since the attack propagation process and complex cyberspace topology are not taken into account. By contrast, the attack paths for compromising a pseudo unit are well delineated by the proposed method, whose nonzero probabilities are much more realistic. Table IV presents the cumulative risk assessment results of different methods under one hundred random attacks against pseudo units with N=1,2,3. The product of load reduction and load outage time is used by RCC as the evaluation metric. Analogously, RCS employs the maximum load shedding as the consequence indicator. However, it is noteworthy that CPDN operates under quasi-steady conditions and the cyber attack against system measurements would not instantly provoke significant load loss. Thus, true risk levels are undoubtedly underestimated by RCC and RCS, as shown in Table IV. In comparison, the number of falsified meter units well quantifies the physical impact of cyber attacks, thereby verifying the superiority of the proposed method.

Fig. 7  Success probability of each attack path using different methods.

TABLE IV  Cumulative Risk Assessment Results of Different Methods
MethodSecurity risk value RNMCO
NM=1NM=2NM=3
RCC [9] 4.4702×10-5 2.2640×10-6 9.3206×10-7
RCS [14] 1.3010×10-1 5.0400×10-2 1.8591×10-3
Proposed 2.1133×101 4.1695×100 1.2548×100

C. Study of Defense Resource Allocation

The formulated MOO and solution selection procedure are evaluated under coordinated cyber attacks against arbitrary measurements. Attack settings are the same as in Table III. The population size and maximum iteration numbers of NSGA-III are both set to be 100 [

24], while interval limits for resource budget [τminD,τmaxD] and allocation precision [xminD,xmaxD] are [0,10000] and [2500,5000], respectively, to ensure the atomic unit is sufficiently small for accurate allocation. Figure 8 visually shows the obtained optimal Pareto solutions of MOO with irank=1,2,3. As can be observed, the overall risk value RSys falls off a cliff as the deployed defense resource budget τD gradually increases from zero. When the defense resource value is taken over 7500, risk values of all three nondomination ranks are reduced to less than 1. Besides, optimal Pareto solutions with higher irank yield a strong dominance over those with lower ranks, i.e., the scattered points with higher irank are generally closer to the origin (0,0) as the MOO intends to simultaneously minimize the overall risk value RSys and limited resource budget τD.

Fig. 8  Optimal Pareto solutions of MOO.

Besides, it is noteworthy in Fig. 8 that when the deployed defense resource value is more than 6000, the corresponding decline in security risk value with irank=1,2 is quite insignificant. Therefore, to avoid excessive resource allocation, it is necessary to address the trade-off between system risk and restricted resource budget. Table V summarizes the optimality evaluation results of candidate strategies s1D,s2D,,s10D from optimal Pareto solutions with irank=1,2, as shown by the enlarged part in Fig. 8. According to the generational distance metric, the ideal vector is formed by the two minimum objectives in Table V as: RSys=1.7547,τD=2270. It can be observed that different solutions have been prioritized by the generational distance-based selection procedure in this table. The solution with lower ranks generally exhibits a significantly larger distance value, which indicates its suboptimality and verifies the strong dominance of higher-rank solutions. Among s1D,s2D,,s10D, strategy s5D with the least Dis(Xp)2 metric of 0.6426 is closest to the ideal vector in the two-dimensional space. As a result, the corresponding resource budget τD=2882 is adopted for subsequent atomic allocation.

TABLE V  Optimality Evaluation Results of Optimal Pareto Solutions
StrategyRSysτDDis(Xp)2irank
s1D 1.7547 3454 1.0000 1
s2D 2.0115 3273 0.8560 1
s3D 2.1477 3167 0.7808 1
s4D 2.2481 3063 0.7105 1
s5D 2.5493 2882 0.6426 1
s6D 2.9278 2673 0.6584 1
s7D 3.1192 3353 1.1253 2
s8D 3.2689 2500 0.7529 1
s9D 3.4729 2408 0.8336 1
s10D 3.8363 2270 1.0000 1

Existing allocation approaches [

20] and [43] are employed to verify the superiority of the proposed atomic allocation approach. Assume the proposed security risk assessment method has been applied beforehand, and two contrastive approaches are integrated into the CPDN under the varying coordinated cyber attacks (N=1,2,,10) in Table III as follows.

Approach I [

20]: for a coordinated attack with index N, the defense resource budget is distributed according to the risk ratio of each cyber attack as (RN CO/RSys)τD.

Approach II [

43]: the budget τD is first divided into multiple units by the allocation precision xD. At each iteration, a single unit τD/xD is assigned for the targets of a certain coordinated cyber attack that triggers the highest risk RNCO.

Given the same budget value τD and allocation precision xD (set as 5000 for satisfying the upper limit and ensuring accurate allocation), comparative defense resource allocation results for each measurement are presented in Fig. 9. It can be observed from Fig. 9(a) that Approaches I and II distribute the resource budget to specific pseudo measurements, while the vast majority of pseudo units are emplaced with a considerable amount of resource by the proposed approach. Comparing Fig. 9(b) with Fig. 9(a), it is observed that all three approaches allocate less resources for SCADA units and PMUs. The reason for this discrepancy is that numerous pseudo measurements have been introduced to CPDNs to address the low observability. In addition, Section V-B has demonstrated that pseudo units are more susceptible to cyber attacks than SCADA units and PMUs. Therefore, these approaches assign more resources for such measurements to alleviate the overall system security risk. Moreover, it can be observed from Fig. 9(b) that defense resources are not sufficiently deployed for each SCADA unit or PMU by Approaches I and II, e.g., the No. 1, No. 2, No. 3, No. 7, No. 24, and No. 25 measurements with zero resources. On the contrary, the iterative allocation procedure of the proposed approach ensures that each meter unit is equipped with at least one atomic unit of resource budget, thereby enabling system measurements not completely exposed to external attacks.

Fig. 9  Defense resource allocation results. (a) Pseudo measurements. (b) SCADA units and PMUs.

By applying the three allocation approaches, the risk incurred by each coordinated cyber attack and the overall system risk are both cumulatively calculated. As shown in Table VI, the overall system risk RSys is still dominated by attacks with N=1,2,3, which is consistent with the results in Table III. According to Table VI, it is validated that the proposed approach can reduce the security risk more effectively than the other two benchmarks when N ranges from 1 to 10. This is because the iterative allocation mechanism of Approach I is dependent on the risk ratio of RNCO to RSys. Meanwhile, Approach II focuses on the coordinated cyber attack that triggers the highest risk RNCO, indicating the low success probability of such an attack has been overlooked. By contrast, in all the attack scenarios, each atomic unit is deployed according to the fastest descent direction of RSys, thereby the measurement corresponding to the highest risk reduction value is prioritized by the proposed approach. As shown in the bottom row, the minimum overall system risk value can be derived using the proposed approach by contrast with Approaches I and II.

TABLE VI  Security Risk Values Using Different Allocation Approaches
NMSecurity risk value
No defenseApproach IApproach IIProposed
1 1.8195×101 6.2164×100 3.9439×100 1.5791×100
2 3.8387×100 2.3025×100 1.2984×100 5.1200×10-1
3 1.2373×100 4.3120×10-1 2.1750×10-1 4.6000×10-3
4 1.9840×10-1 1.3200×10-2 7.5392×10-3 5.3725×10-4
5 1.0200×10-2 8.2942×10-4 3.9350×10-4 7.1204×10-5
6 2.3012×10-3 6.5645×10-5 1.4296×10-5 3.2655×10-6
7 4.5991×10-4 7.2703×10-6 2.0103×10-6 3.0728×10-7
8 5.8516×10-5 5.2238×10-7 1.6333×10-7 1.2726×10-8
9 1.0798×10-5 9.2246×10-8 4.6166×10-8 9.6958×10-10
10 1.5379×10-6 1.6478×10-8 6.8449×10-9 4.7354×10-10
RSys 2.3483×101 8.9642×100 5.4677×100 2.0963×100

VI. Conclusion

This paper proposes a novel security risk assessment method and risk-oriented defense resource allocation strategy for CPDNs. By constructing an attack graph-based CPDN architecture, the success rate of a coordinated cyber attack and corresponding security risks are properly evaluated using the security risk assessment method. Moreover, the incurred risk is efficiently mitigated by the developed risk-oriented defense resource allocation strategy, in which the prioritized MOO solution is able to reasonably address the trade-off between security risk and limited resource budget. Extensive simulation results on the modified IEEE 123-node test feeder have verified the efficacy of the proposed method and strategy in evaluating security risk, solving the formulated MOO problem, and allocating limited defense resources in the presence of multiple coordinated cyber attacks.

Results derived from this paper can shed some light on the defensive studies for assessing the mounting cyberspace risks in CPDNs. A plausible defense resource allocation framework is also provided for addressing the security issues in modern CPDNs under cyber attacks. In the future, we will focus on taking additional vulnerable system components and a realistic cyber-physical coupling environment into account, so as to devise more comprehensive and representative risk assessment methods in the context of varying attack scenarios. Besides, the scalability of the proposed method and strategy in the variants of CPDNs, e.g., industrial control systems and industrial Internet of Things, is worthy of further investigation.

References

1

Y. Zhang, M. Ni, and Y. Sun, “Fully distributed economic dispatch for cyber-physical power system with time delays and channel noises,” Journal of Modern Power Systems and Clean Energy, vol. 10, no. 6, pp. 1472-1481, Nov. 2022. [Baidu Scholar] 

2

Y. Yang, P. Zhang, C. Wang et al., “State transition modeling method for optimal dispatching for integrated energy system based on cyber-physical system,” Journal of Modern Power Systems and Clean Energy, vol. 12, no. 5, pp. 1617-1630, Sept. 2024. [Baidu Scholar] 

3

D. Du, M. Zhu, X. Li et al., “A review on cybersecurity analysis, attack detection, and attack defense methods in cyber-physical power systems,” Journal of Modern Power Systems and Clean Energy, vol. 11, no. 3, pp. 727-743, May 2023. [Baidu Scholar] 

4

Z. Wei, K. Xie, B. Hu et al., “Distribution system restoration with cyber failures based on co-dispatching of multiple recovery resources,” Journal of Modern Power Systems and Clean Energy, vol. 12, no. 4, pp. 1096-1112, Jul. 2024. [Baidu Scholar] 

5

K. Pan, A. Teixeira, M. Cvetkovic et al., “Cyber risk analysis of combined data attacks against power system state estimation,” IEEE Transactions on Smart Grid, vol. 10, no. 3, pp. 3044-3056, May 2019. [Baidu Scholar] 

6

S. Deng, J. Zhang, D. Wu et al., “A quantitative risk assessment model for distribution cyber-physical system under cyber attack,” IEEE Transactions on Industrial Informatics, vol. 19, no. 3, pp. 2899-2908, Mar. 2023. [Baidu Scholar] 

7

S. Li, C. K. Ahn, and Z. Xiang, “Decentralized sampled-data control for cyber-physical systems subject to DoS attacks,” IEEE Systems Journal, vol. 15, no. 4, pp. 5126-5134, Dec. 2021. [Baidu Scholar] 

8

W. He, S. Li, C. K. Ahn et al., “Sampled-data stabilization of stochastic interconnected cyber-physical systems under DoS attacks,” IEEE Systems Journal, vol. 16, no. 3, pp. 3844-3854, Sept. 2022. [Baidu Scholar] 

9

H. Qin, J. Weng, D. Liu et al., “Risk assessment and defense resource allocation of cyber-physical distribution system under denial of service attack,” CSEE Journal of Power and Energy Systems, doi: 10.17775/CSEEJPES.2020.04550 [Baidu Scholar] 

10

Y. Zhang, L. Wang, and Y. Xiang, “Power system reliability analysis with intrusion tolerance in SCADA systems,” IEEE Transactions on Smart Grid, vol. 7, no. 2, pp. 669-683, Mar. 2016. [Baidu Scholar] 

11

Z. Liu, W. Wei, L. Wang et al., “An actuarial framework for power system reliability considering cybersecurity threats,” IEEE Transactions on Power Systems, vol. 36, no. 2, pp. 851-864, Mar. 2021. [Baidu Scholar] 

12

R. Zeng, Y. Cao, Y. Li et al., “A general real-time cyberattack risk assessment method for distribution network involving the influence of feeder automation system,” IEEE Transactions on Smart Grid, vol. 15, no. 2, pp. 2102-2115, Mar. 2024. [Baidu Scholar] 

13

Y. Zhao, Y. Li, Y. Cao et al., “Risk-based contingency analysis for power systems considering a combination of different types of cyber-attacks,” Applied Energy, vol. 348, pp. 1-10, Oct. 2023. [Baidu Scholar] 

14

Y. Zhao, Y. Cao, Y. Li et al., “Risk-based contingency screening method considering cyber-attacks on substations,” IEEE Transactions on Smart Grid, vol. 13, no. 6, pp. 4973-4976, Nov. 2022. [Baidu Scholar] 

15

W. Xia, D. He, and J. Chen, “On the PMU placement optimization for the detection of false data injection attacks,” IEEE Systems Journal, vol. 17, no. 3, pp. 3794-3797, Sept. 2023. [Baidu Scholar] 

16

M. Zhang, Z. Wu, J. Yan et al., “Attack-resilient optimal PMU placement via reinforcement learning guided tree search in smart grids,” IEEE Transactions on Information Forensics and Security, vol. 17, pp. 1919-1929, May 2022. [Baidu Scholar] 

17

H. Lei, S. Huang, Y. Liu et al., “Robust optimization for microgrid defense resource planning and allocation against multi-period attacks,” IEEE Transactions on Smart Grid, vol. 10, no. 5, pp. 5841-5850, Sept. 2019. [Baidu Scholar] 

18

P. Lau, W. Wei, L. Wang et al., “A cybersecurity insurance model for power system reliability considering optimal defense resource allocation,” IEEE Transactions on Smart Grid, vol. 11, no. 5, pp. 4403-4414, Sept. 2020. [Baidu Scholar] 

19

C. Shao and Y. Li, “Optimal defense resources allocation for power system based on bounded rationality game theory analysis,” IEEE Transactions on Power Systems, vol. 36, no. 5, pp. 4223-4234, Sept. 2021. [Baidu Scholar] 

20

W. Chen, W. Chen, and A. Xue, “Security risk assessment and defense resource allocation of power system under synergetic cyber attacks,” Power System Technology, vol. 43, no. 7, pp. 2353-2360, Jul. 2019. [Baidu Scholar] 

21

Y. Song, X. Liu, Z. Li et al., “Intelligent data attacks against power systems using incomplete network information: a review,” Journal of Modern Power Systems and Clean Energy, vol. 6, no. 4, pp. 630-641, Jul. 2018. [Baidu Scholar] 

22

G. Liang, S. R. Weller, J. Zhao et al., “The 2015 Ukraine blackout: implications for false data injection attacks,” IEEE Transactions on Power Systems, vol. 32, no. 4, pp. 3317-3318, Jul. 2017. [Baidu Scholar] 

23

M. Zhou, C. Liu, A. A. Jahromi et al., “Revealing vulnerability of N-1 secure power systems to coordinated cyber-physical attacks,” IEEE Transactions on Power Systems, vol. 38, no. 2, pp. 1044-1057, Mar. 2023. [Baidu Scholar] 

24

Y. Cheng, “State estimation in three-phase unbalanced distribution system with false data injection attacks,” M.S. thesis, School of Cyber Science and Engineering, Southeast University, Nanjing, China, 2021. [Baidu Scholar] 

25

M. Schiffman. (2023, Sept.). Common vulnerability scoring system (CVSS). [Online]. Available: http://www.first.org/cvss/ [Baidu Scholar] 

26

A. Ali, P. Zavarsky, D. Lindskog et al., “A software application to analyze affects of temporal and environmental metrics on overall CVSS v2 score,” in Proceedings of 2011 World Congress on Internet Security, London, UK, Feb. 2011, pp. 1-5. [Baidu Scholar] 

27

S. Abraham and S. Nair, “Exploitability analysis using predictive cybersecurity framework,” in Proceedings of 2015 IEEE 2nd International Conference on Cybernetics, Gdynia, Poland, Aug. 2015, pp. 317-323. [Baidu Scholar] 

28

N. Fardad, S. Soleymani, and F. Faghihi, “Cyber defense analysis of smart grid including renewable energy resources based on coalitional game theory,” Journal of Intelligent & Fuzzy Systems, vol. 35, no. 2, pp. 2063-2077, Aug. 2018. [Baidu Scholar] 

29

S. Abraham and S. Nair, “Cyber security analytics: A stochastic model for security quantification using absorbing Markov chains,” Journal of Communications, vol. 9, no. 12, pp. 899-907, Dec. 2014. [Baidu Scholar] 

30

NIST. (2023, Oct.). NIST special publication 800-82r3. [Online]. Available: https://doi.org/10.6028/NIST.SP.800-82r3 [Baidu Scholar] 

31

J. M. Hendrickx, K. H. Johansson, R. M. Jungers et al., “Efficient computations of a security index for false data attacks in power networks,” IEEE Transactions on Automatic Control, vol. 59, no. 12, pp. 3194-3208, Dec. 2014. [Baidu Scholar] 

32

W. Hao, P. Yao, T. Yang et al., “Industrial cyber-physical system defense resource allocation using distributed anomaly detection,” IEEE Internet of Things Journal, vol. 9, no. 22, pp. 22304-22314, Nov. 2022. [Baidu Scholar] 

33

Z. Sun, Y. Liu, and L. Tao, “Attack localization task allocation in wireless sensor networks based on multi-objective binary particle swarm optimization,” Journal of Network and Computer Applications, vol. 112, pp. 29-40, Jun. 2018. [Baidu Scholar] 

34

K. Deb and H. Jain, “An evolutionary many-objective optimization algorithm using reference-point-based nondominated sorting approach, part I: solving problems with box constraints,” IEEE Transactions on Evolutionary Computation, vol. 18, no. 4, pp. 577-601, Aug. 2014. [Baidu Scholar] 

35

K. Deb, A. Pratap, S. Agarwal et al., “A fast and elitist multiobjective genetic algorithm: NSGA-II,” IEEE Transactions on Evolutionary Computation, vol. 6, no. 2, pp. 182-197, Apr. 2002. [Baidu Scholar] 

36

H. Jain and K. Deb, “An evolutionary many-objective optimization algorithm using reference-point based nondominated sorting approach, part II: handling constraints and extending to an adaptive approach,” IEEE Transactions on Evolutionary Computation, vol. 18, no. 4, pp. 602-622, Aug. 2014. [Baidu Scholar] 

37

S. Jiang, Y. S. Ong, J. Zhang et al., “Consistencies and contradictions of performance metrics in multiobjective optimization,” IEEE Transactions on Cybernetics, vol. 44, no. 12, pp. 2391-2404, Dec. 2014. [Baidu Scholar] 

38

G. Chen, Z. Y. Dong, D. J. Hill et al., “Exploring reliable strategies for defending power systems against targeted attacks,” IEEE Transactions on Power Systems, vol. 26, no. 3, pp. 1000-1009, Aug. 2011. [Baidu Scholar] 

39

IEEE PES AMPS DSAS Test Feeder Working Group. (2023, Aug.). Resources. [Online]. Available: https://cmte.ieee.org/pes-testfeeders/resources/ [Baidu Scholar] 

40

NIST. (2024, Jan.). National vulnerability database. [Online]. Available: https://nvd.nist.gov/ [Baidu Scholar] 

41

S. Frei. (2009, Apr.). Security econometrics: the dynamics of (in) security. [Online]. Available: https://www.research-collection.ethz.ch/bitstream/handle/20.500.11850/151394/eth-154-02.pdf [Baidu Scholar] 

42

W. I. A. Mannai, “Development of a decision support tool to inform resource allocation for critical infrastructure protection in homeland security,” Ph.D. dissertation, Naval Postgraduate School, Monterey, USA, 2008. [Baidu Scholar] 

43

L. Shi and Z. Jian, “Vulnerability assessment of cyber physical power system based on dynamic attack-defense game model,” Automation of Electric Power Systems, vol. 40, no. 17, pp. 99-105, Sept. 2016. [Baidu Scholar]