WeChat Mini Program
Old Version Features

Security Risk Assessment and Risk-Oriented Defense Resource Allocation for Cyber-Physical Distribution Networks Against Coordinated Cyber Attacks

JOURNAL OF MODERN POWER SYSTEMS AND CLEAN ENERGY(2025)

Southeast Univ

Cited 0|Views13
Abstract
With the proliferation of advanced communication technologies and the deepening interdependence between cyber and physical components, power distribution networks are subject to miscellaneous security risks induced by malicious attackers. To address the issue, this paper proposes a security risk assessment method and a risk-oriented defense resource allocation strategy for cyber-physical distribution networks (CPDNs) against coordinated cyber attacks. First, an attack graph-based CPDN architecture is constructed, and representative cyber-attack paths are drawn considering the CPDN topology and the risk propagation process. The probability of a successful coordinated cyber attack and incurred security risks are quantitatively assessed based on the absorbing Markov chain model and National Institute of Standards and Technology (NIST) standard. Next, a risk-oriented defense resource allocation strategy is proposed for CPDNs in different attack scenarios. The trade-off between security risk and limited resource budget is formulated as a multi-objective optimization (MOO) problem, which is solved by an efficient optimal Pareto solution generation approach. By employing a generational distance metric, the optimal solution is prioritized from the optimal Pareto set of the MOO and leveraged for subsequent atomic allocation of defense resources. Several case studies on a modified IEEE 123- node test feeder substantiate the efficacy of the proposed security risk assessment method and risk-oriented defense resource allocation strategy.
More
Translated text
Key words
Security,Cyberattack,Resource management,Risk management,Substations,Physical layer,Topology,Coordinated cyber attack,defense resource allocation,multi-objective optimization,power distribution network,security risk assessment
求助PDF
上传PDF
Bibtex
AI Read Science
AI Summary
AI Summary is the key point extracted automatically understanding the full text of the paper, including the background, methods, results, conclusions, icons and other key content, so that you can get the outline of the paper at a glance.
Example
Background
Key content
Introduction
Methods
Results
Related work
Fund
Key content
  • Pretraining has recently greatly promoted the development of natural language processing (NLP)
  • We show that M6 outperforms the baselines in multimodal downstream tasks, and the large M6 with 10 parameters can reach a better performance
  • We propose a method called M6 that is able to process information of multiple modalities and perform both single-modal and cross-modal understanding and generation
  • The model is scaled to large model with 10 billion parameters with sophisticated deployment, and the 10 -parameter M6-large is the largest pretrained model in Chinese
  • Experimental results show that our proposed M6 outperforms the baseline in a number of downstream tasks concerning both single modality and multiple modalities We will continue the pretraining of extremely large models by increasing data to explore the limit of its performance
Upload PDF to Generate Summary
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Data Disclaimer
The page data are from open Internet sources, cooperative publishers and automatic analysis results through AI technology. We do not make any commitments and guarantees for the validity, accuracy, correctness, reliability, completeness and timeliness of the page data. If you have any questions, please contact us by email: report@aminer.cn
Chat Paper
Summary is being generated by the instructions you defined