2023
DOI: 10.1109/access.2023.3317695
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Attacks on Power Grids: Causes and Propagation of Cascading Failures

Vetrivel Subramaniam Rajkumar,
Alexandru Ştefanov,
Alfan Presekal
et al.

Abstract: Cascading effects in the power grid involve an uncontrolled, successive failure of elements. The root cause of such failures is the combined occurrence of multiple, statistically rare events that may result in a blackout. With increasing digitalisation, power systems are vulnerable to emergent cyber threats. Furthermore, such threats are not statistically limited and can simultaneously occur at multiple locations. In the absence of real-world attack information, however, it is imperative to investigate if and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 81 publications
0
2
0
Order By: Relevance
“…Other attacks against power grids, as presented in [28], targeted components of the cyber and physical domains. An example is the exploitation of an unnoticed software bug in order to compromise a substation's controls.…”
Section: Energy Facilitiesmentioning
confidence: 99%
“…Other attacks against power grids, as presented in [28], targeted components of the cyber and physical domains. An example is the exploitation of an unnoticed software bug in order to compromise a substation's controls.…”
Section: Energy Facilitiesmentioning
confidence: 99%
“…Атака на доступность -это кибератака, которая препятствует своевременному получению необходимых данных или сигналов. К этому типу кибератак относятся атаки отказа [14][15][16][17][18][19][20][21][22][23][24][25][26][27][28].…”
Section: б классификация кибератак на информационно коммуникационную ...unclassified
“…In the last decade, several significant cyber incidents (in Europe and worldwide) have resulted in financial losses to the tune of millions of euros and a loss of electricity services to consumers for prolonged periods [125]. For example in April 2022, a large-scale communication network serving nearly 2000 wind turbines in Germany was targeted and compromised, paralyzing wind farm operations [126].…”
Section: Security Concernsmentioning
confidence: 99%
“…Intruders mainly gain access to industrial OT networks through the wide area network or the point of connection to the IT systems. These intruders collect sensitive information through phishing attacks, corrupted hyperlinks, and email attachments [126] and create malicious payload in Figure 8's ISA/IEC62443 Industrial Control System cyber kill chain Reconnaissance (planning) and Weaponization (preparation) stages [127,128]. For instance, intruders may gain unauthorized access to data at data centers or during transit, such as in man-in-the-middle (MiM) attacks.…”
Section: Security Concernsmentioning
confidence: 99%