2018 IEEE Innovative Smart Grid Technologies - Asia (ISGT Asia) 2018
DOI: 10.1109/isgt-asia.2018.8467972
|View full text |Cite
|
Sign up to set email alerts
|

Cyber-Induced Risk Modeling for Microprocessor-Based Relays in Substations

Abstract: Once critical substations are compromised, attack agents can coordinate among their peers to plot for maximizing disruption using local control devices. For defenders, it is critical to enumerate and identify all digital relays to determine the systemic risks. Any combination of disruptive switching via the compromised relays can result in misoperation or immediate effect to the system. The resulting consequence of these attack's initial events would possibly incur cascading failure to a grid. This paper quant… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 8 publications
(11 reference statements)
0
2
0
Order By: Relevance
“…However, the impact of those compromised SCADA and IEDs is not discussed. Reference [23] proposes a risk index and attempts to quantify which IED would give a more significant impact, refining the relevant work [19][20][21][22]. Despite the best efforts using the steady-state approach, the measure to identify worse-case combinations should be verified with dynamic simulation, including cascaded events.…”
Section: Introductionmentioning
confidence: 99%
“…However, the impact of those compromised SCADA and IEDs is not discussed. Reference [23] proposes a risk index and attempts to quantify which IED would give a more significant impact, refining the relevant work [19][20][21][22]. Despite the best efforts using the steady-state approach, the measure to identify worse-case combinations should be verified with dynamic simulation, including cascaded events.…”
Section: Introductionmentioning
confidence: 99%
“…Malware usually runs in a system through the concealed installation and embedded in the data payloads of legitimate metering data. When the invasion of a single meter is completed, the worm or virus quickly infects nearby meters and can even invade the main server and host [180,181,182], causing massive tampering. The infected devices with malware can be manipulated to perform unauthorized use of services covertly [183].…”
Section: Introductionmentioning
confidence: 99%