Integrated Intelligent Energy ›› 2024, Vol. 46 ›› Issue (5): 41-49.doi: 10.3969/j.issn.2097-0706.2024.05.005

• Cyber Attack Defense • Previous Articles     Next Articles

Risk analysis on the source-grid-load-storage system affected by cyber attacks

YU Sheng1(), ZHOU Xia2a, SHEN Xicheng2a, DAI Jianfeng2b, LIU Zengji2b   

  1. 1. State Grid Electric Power Research Institute Company Limited, Nanjing 211106,China
    2a. Institute of Advanced Technology;b. College of Automation & College of Artificial Intelligence, Nanjing University of Posts and Telecommunications, Nanjing 210023, China
  • Received:2023-05-05 Revised:2023-06-04 Published:2024-05-25
  • Supported by:
    National Natural Science Foundation of China(61933005)

Abstract:

With the boost of Energy Internet, power grid dispatching is gradually taking "source-grid-load-storage" integrated optimization strategy. The optimization mode can realize effective use of clean energy,sharing of resources and demand response of an integrated system with optimal allocation of resources,multi-energy complementation,big data analysis and other advanced technologies. However, due to the deep coupling of physical devices and information systems, cyber attacks aiming at information systems might lead to physical faults. To evaluate the effect of cyber attacks on a source-grid-load-storage integrated system, the effect of cyber attacks is analyzed from the perspective of attackers. Then, the improved attack graph is built, and attack routes are determined by Frequent Pattern Growth(FP-Growth)association rule mining. Then, the probability of being aimed and attacked is obtained by vulnerability assessment and Bayesian theorem. The risk assessment index is the product of the probability of cyber attack on the source-grid-load-storage integrated system and the load loss. The risks of distribution network circuit breakers and distributed sources subjected to cyber attacks are quantitively assessed, and the effectiveness of the proposed method is verified.

Key words: Energy Internet, source-grid-load-storage system, multi-energy complementation, big data analysis, clean energy, cyber attack, attack graph, risk assessment

CLC Number: