Visible to the public Reserch on Cyber Attack of Key Measurement and Control Equipment in Power Grid

TitleReserch on Cyber Attack of Key Measurement and Control Equipment in Power Grid
Publication TypeConference Paper
Year of Publication2019
AuthorsFei, Jiaxuan, Shi, Congcong, Yuan, Xuechong, Zhang, Rui, Chen, Wei, Yang, Yi
Conference Name2019 IEEE International Conference on Energy Internet (ICEI)
Date Publishedmay
ISBN Number978-1-7281-1493-4
Keywordsattack flow construction technology, Attack process construction, attack process construction technology, Attack test case, attack test cases, attack test results, composability, Computer crime, Control equipment, cyber attack, cyber security risks, Grid cyber attack, Grid key control equipment, Grid key measurement equipment, key measurement, Loss measurement, Metrics, Operating systems, power grid, power grid vulnerability analysis, power grids, Power measurement, power system security, power system stability, pubcrawl, resilience, Resiliency, risk analysis, risk analysis results, safe operation, security of data, simulation penetration test environment, stable operation, subsequent attack test, subsequent KMCEPG-related attack penetration, terminal critical control devices, terminal key control equipment, test process, vulnerability mining

The normal operation of key measurement and control equipment in power grid (KMCEPG) is of great significance for safe and stable operation of power grid. Firstly, this paper gives a systematic overview of KMCEPG. Secondly, the cyber security risks of KMCEPG on the main station / sub-station side, channel side and terminal side are analyzed and the related vulnerabilities are discovered. Thirdly, according to the risk analysis results, the attack process construction technology of KMCEPG is proposed, which provides the test process and attack ideas for the subsequent KMCEPG-related attack penetration. Fourthly, the simulation penetration test environment is built, and a series of attack tests are carried out on the terminal key control equipment by using the attack flow construction technology proposed in this paper. The correctness of the risk analysis and the effectiveness of the attack process construction technology are verified. Finally, the attack test results are analyzed, and the attack test cases of terminal critical control devices are constructed, which provide the basis for the subsequent attack test. The attack flow construction technology and attack test cases proposed in this paper improve the network security defense capability of key equipment of power grid, ensure the safe and stable operation of power grid, and have strong engineering application value.

Citation Keyfei_reserch_2019