DocumentCode :
3561347
Title :
Security Assessment for Communication Networks of Power Control Systems Using Attack Graph and MCDM
Author :
Liu, Nian ; Zhang, Jianhua ; Zhang, Hao ; Liu, Wenxia
Author_Institution :
Key Lab. of Power Syst. Protection & Dynamic Security Monitoring & Control Under Minist. of Educ., North China Electr. Power Univ., Beijing, China
Volume :
25
Issue :
3
fYear :
2010
fDate :
7/1/2010 12:00:00 AM
Firstpage :
1492
Lastpage :
1500
Abstract :
The security assessment is a key function that should be performed in advance of any security deployment. Since experiences of cyber attack in power control systems are still limited, a complete methodology of security assessment for communication networks of power control systems is needed. According to past research, the difficulties of security assessment include the security analysis of power control process, and the security degree of each control step. Therefore, the attack graph and multiple criteria decision-making (MCDM) are introduced to deal with these difficulties. The overall security assessment is decomposed into two parts. One is the security analysis model for power control systems using attack graph, includes the basic concepts definition, construction algorithm, vulnerability function of each control step, and connection model-based system vulnerability calculation. Another one is focused on the quantification of the security degree in each control step-a hybrid MCDM approach integrated with an analytic hierarchy process (AHP) and a technique for order preference by similarity to ideal solution (TOPSIS) are proposed to value the vulnerability factors derived by the security analysis model. Finally, an instance communication network of power control system is modeling to test the validity of security assessment. The result supports the usefulness of the security assessment.
Keywords :
graph theory; power control; power system control; power system security; AHP; MCDM; TOPSIS; analytic hierarchy process; attack graph; communication networks; multiple criteria decision-making; power control systems; security assessment; technique for order preference by similarity to ideal solution; Algorithm design and analysis; Communication networks; Communication system control; Communication system security; Computer security; Decision making; Power control; Power system modeling; Power system security; System testing; Attack graph; communication network; multiple criteria decision-making; power control system; security assessment;
fLanguage :
English
Journal_Title :
Power Delivery, IEEE Transactions on
Publisher :
ieee
Conference_Location :
7/1/2010 12:00:00 AM
ISSN :
0885-8977
Type :
jour
DOI :
10.1109/TPWRD.2009.2033930
Filename :
5491356
Link To Document :
بازگشت