Sorry, you need to enable JavaScript to visit this website.

Information Forensics and Security

Load Distribution Vector Based Attack Strategies against Power Grid Systems (Poster)


Security issues in complex systems such as power grid, communication network, Internet, among others have attracted wide attention from academic, government and industry. In this paper, we investigate the vulnerabilities of power grid under a topology-based network model in the context of cascading failures caused by physical attacks against substations and transmission lines. In particular, we develop attack strategies from the attackers' points of view, aiming to cause severe damage to the network efficiency, as a way to revealing the vulnerability of the system.

Paper Details

Authors:
Submitted On:
23 February 2016 - 1:43pm
Short Link:
Type:

Document Files

LDV_AttackStrategy_Poster.pdf

LDV_AttackStrategy_Poster.pdf

Subscribe

[1] , "Load Distribution Vector Based Attack Strategies against Power Grid Systems (Poster)", IEEE SigPort, 2014. [Online]. Available: http://sigport.org/9. Accessed: Mar. 20, 2019.
@article{9-14,
url = {http://sigport.org/9},
author = { },
publisher = {IEEE SigPort},
title = {Load Distribution Vector Based Attack Strategies against Power Grid Systems (Poster)},
year = {2014} }
TY - EJOUR
T1 - Load Distribution Vector Based Attack Strategies against Power Grid Systems (Poster)
AU -
PY - 2014
PB - IEEE SigPort
UR - http://sigport.org/9
ER -
. (2014). Load Distribution Vector Based Attack Strategies against Power Grid Systems (Poster). IEEE SigPort. http://sigport.org/9
, 2014. Load Distribution Vector Based Attack Strategies against Power Grid Systems (Poster). Available at: http://sigport.org/9.
. (2014). "Load Distribution Vector Based Attack Strategies against Power Grid Systems (Poster)." Web.
1. . Load Distribution Vector Based Attack Strategies against Power Grid Systems (Poster) [Internet]. IEEE SigPort; 2014. Available from : http://sigport.org/9

Security of Online Reputation Systems: Evolution of Attacks and Defenses


The Internet has created vast opportunities to interact with strangers. The interactions can be fun, informative, and even profitable [1]. However, there is also risk involved. Will an eBay seller ship the product in time? Is the advice from a self-proclaimed expert on Epinion.com trustworthy? Does a product from Amazon.com have high quality as described?

The full version of the paper is available at http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6153140&tag=1

Paper Details

Authors:
Submitted On:
23 February 2016 - 1:43pm
Short Link:
Type:

Document Files

4. Security of Online Reputation.pdf

Subscribe

[1] , "Security of Online Reputation Systems: Evolution of Attacks and Defenses", IEEE SigPort, 2014. [Online]. Available: http://sigport.org/7. Accessed: Mar. 20, 2019.
@article{7-14,
url = {http://sigport.org/7},
author = { },
publisher = {IEEE SigPort},
title = {Security of Online Reputation Systems: Evolution of Attacks and Defenses},
year = {2014} }
TY - EJOUR
T1 - Security of Online Reputation Systems: Evolution of Attacks and Defenses
AU -
PY - 2014
PB - IEEE SigPort
UR - http://sigport.org/7
ER -
. (2014). Security of Online Reputation Systems: Evolution of Attacks and Defenses. IEEE SigPort. http://sigport.org/7
, 2014. Security of Online Reputation Systems: Evolution of Attacks and Defenses. Available at: http://sigport.org/7.
. (2014). "Security of Online Reputation Systems: Evolution of Attacks and Defenses." Web.
1. . Security of Online Reputation Systems: Evolution of Attacks and Defenses [Internet]. IEEE SigPort; 2014. Available from : http://sigport.org/7

The Sequential Attack against Power Grid Networks (Slides)


The vulnerability analysis is vital for safely running power grids. The simultaneous attack, which applies multiple failures simultaneously, does not consider the time domain in applying failures, and is limited to find unknown vulnerabilities of power grid networks. In this paper, we discover a new attack scenario, called the sequential attack, in which the failures of multiple network components (i.e., links/nodes) occur at different time. The sequence of such failures can be carefully arranged by attackers in order to maximize attack performances.

Paper Details

Authors:
Submitted On:
23 February 2016 - 1:43pm
Short Link:
Type:

Document Files

SequentialAttack_Slides_ICC.pdf

Subscribe

[1] , "The Sequential Attack against Power Grid Networks (Slides)", IEEE SigPort, 2014. [Online]. Available: http://sigport.org/5. Accessed: Mar. 20, 2019.
@article{5-14,
url = {http://sigport.org/5},
author = { },
publisher = {IEEE SigPort},
title = {The Sequential Attack against Power Grid Networks (Slides)},
year = {2014} }
TY - EJOUR
T1 - The Sequential Attack against Power Grid Networks (Slides)
AU -
PY - 2014
PB - IEEE SigPort
UR - http://sigport.org/5
ER -
. (2014). The Sequential Attack against Power Grid Networks (Slides). IEEE SigPort. http://sigport.org/5
, 2014. The Sequential Attack against Power Grid Networks (Slides). Available at: http://sigport.org/5.
. (2014). "The Sequential Attack against Power Grid Networks (Slides)." Web.
1. . The Sequential Attack against Power Grid Networks (Slides) [Internet]. IEEE SigPort; 2014. Available from : http://sigport.org/5

Multi-contingency Cascading Analysis of Smart Grid based on Self-organizing Map (Poster)


In the study of power grid security, the cascading failure analysis in multi-contingency scenarios has been a challenge due to its topological complexity and computational cost. Both network analyses and load ranking methods have their own limitations. In this paper, based on self-organizing map (SOM), we propose an integrated approach combining spatial feature (distance)-based clustering with electrical characteristics (load) to assess the vulnerability and cascading effect of multiple component sets in the power grid.

Paper Details

Authors:
Submitted On:
23 February 2016 - 1:43pm
Short Link:
Type:

Document Files

Jun_URI_SecSymp13_SOM_Time.pdf

Subscribe

[1] , "Multi-contingency Cascading Analysis of Smart Grid based on Self-organizing Map (Poster)", IEEE SigPort, 2014. [Online]. Available: http://sigport.org/3. Accessed: Mar. 20, 2019.
@article{3-14,
url = {http://sigport.org/3},
author = { },
publisher = {IEEE SigPort},
title = {Multi-contingency Cascading Analysis of Smart Grid based on Self-organizing Map (Poster)},
year = {2014} }
TY - EJOUR
T1 - Multi-contingency Cascading Analysis of Smart Grid based on Self-organizing Map (Poster)
AU -
PY - 2014
PB - IEEE SigPort
UR - http://sigport.org/3
ER -
. (2014). Multi-contingency Cascading Analysis of Smart Grid based on Self-organizing Map (Poster). IEEE SigPort. http://sigport.org/3
, 2014. Multi-contingency Cascading Analysis of Smart Grid based on Self-organizing Map (Poster). Available at: http://sigport.org/3.
. (2014). "Multi-contingency Cascading Analysis of Smart Grid based on Self-organizing Map (Poster)." Web.
1. . Multi-contingency Cascading Analysis of Smart Grid based on Self-organizing Map (Poster) [Internet]. IEEE SigPort; 2014. Available from : http://sigport.org/3

Revealing Cascading Failure Vulnerability in Power Grids using Risk-Graph (Slide)


Security issues related to power grid networks have attracted the attention of researchers in many fields. Recently, a new network model that combines complex network theories with power flow models was proposed. This model, referred to as the extended model, is suitable for investigating vulnerabilities in power grid networks. In this paper, we study cascading failures of power grids under the extended model. Particularly, we discover that attack strategies that select target nodes (TNs) based on load and degree do not yield the strongest attacks.

Paper Details

Authors:
Submitted On:
23 February 2016 - 1:43pm
Short Link:
Type:

Document Files

Riskgraph_Slides.pdf

Subscribe

[1] , "Revealing Cascading Failure Vulnerability in Power Grids using Risk-Graph (Slide)", IEEE SigPort, 2014. [Online]. Available: http://sigport.org/2. Accessed: Mar. 20, 2019.
@article{2-14,
url = {http://sigport.org/2},
author = { },
publisher = {IEEE SigPort},
title = {Revealing Cascading Failure Vulnerability in Power Grids using Risk-Graph (Slide)},
year = {2014} }
TY - EJOUR
T1 - Revealing Cascading Failure Vulnerability in Power Grids using Risk-Graph (Slide)
AU -
PY - 2014
PB - IEEE SigPort
UR - http://sigport.org/2
ER -
. (2014). Revealing Cascading Failure Vulnerability in Power Grids using Risk-Graph (Slide). IEEE SigPort. http://sigport.org/2
, 2014. Revealing Cascading Failure Vulnerability in Power Grids using Risk-Graph (Slide). Available at: http://sigport.org/2.
. (2014). "Revealing Cascading Failure Vulnerability in Power Grids using Risk-Graph (Slide)." Web.
1. . Revealing Cascading Failure Vulnerability in Power Grids using Risk-Graph (Slide) [Internet]. IEEE SigPort; 2014. Available from : http://sigport.org/2

Pages