ارزش‌گذاری بودجه دفاع و حمله در امنیت سایبری پست‌های فشارقوی مبتنی بر طبقه‌بندی کاربردی به روش AHP فازی

نویسندگان

آزاد اسلامی واحد علوم و تحقیقات

چکیده

حفاظت و دفاع از پست‌های فشارقوی در شبکه هوشمند بستگی به ملاحظات شرکت‌های برق نسبت به سطح تهدیدات و ارزش دارایی‌های آن‌ها دارد. تعداد اقدامات متقابل یا دفاعی برای سطح خطر قابل‌ قبول بستگی به تعداد تجهیزات دفاعی نظیر امکانات و روش‌های نرم‌افزاری، سخت‌افزاری، شیلدینگ و انتخاب مسیر بهینه برای تجهیزات ارسال اطلاعات در سطح پست دارد. تعداد این اقدامات با توجه به وضعیت هر پست و میزان سرمایه‌گذاری و اهمیت آن بایستی تخمین زده شود. روش‌های دفاعی مناسب با توجه به تعداد، نوع، وضعیت طراحی و موقعیت پست‌ها، می‌تواند نقاط ضعف امنیتی سیستم را پوشش دهد. در این مقاله براساس داده‌ها و تجربیات قبلی مبتنی بر دانش افراد خبره و داده‌های آموزشی، میزان اهمیت پست‌های فشارقوی مورد‌ مطالعه در مقابل حملات سایبری تعیین می‌گردد. پست‌ها از نقطه‌‌نظر کاربرد به انواع ژئو‌استراتژیک، راه‌بردی صنعتی، سیستم‌های اتوماسیون و کنترلی و مخاطره‌آمیزبودن تقسیم می‌شوند. با استفاده از اطلاعات به‌دست‌آمده از نظرسنجی و تحلیل با روش سلسله مراتبی فازی (FAHP) سهم بودجه مورد نیاز برای انواع دفاع سایبری در پست‌های فشارقوی محاسبه می‌گردد. تحلیل حساسیت، صحت نتایج روش ارائه‌شده را تایید می‌نماید.

کلیدواژه‌ها


Y. Xiang, Z. Ding, and L. Wang, “Power system adequacy assessment with load redistribution attacks,” in Innovative Smart Grid Technologies Conference (ISGT), 2015 IEEE Power & Energy Society, Washington, DC, USA, pp. 1-5, 18-20 Feb. 2015.
V. Bier, S. Oliveros, and L. Samuelson, “Choosing what to protect: Strategic defensive allocation against an unknown attacker,” Journal of Public Economic Theory, vol. 9, pp. 563-587, July 2007.
G. Dondossola, F. Garrone, and J. Szanto, “Cyber risk assessment of power control systems, A metrics weighed by attack experiments,” in Power and Energy Society General Meeting, 2011 IEEE, Detroit, MI, USA, pp. 1-9, 24-29 July 2011.
Y. Zhang, L. Wang, Y. Xiang, and C.-W. Ten, “Inclusion of SCADA cyber vulnerability in power system reliability assessment considering optimal resources allocation,” IEEE Transactions on Power Systems, vol. 31, pp. 4379-4394, Jan. 2016.
T. S. Popik, “Testimony of the Foundation for Resilient Societies,” in Reliability Technical Conference, Federal Energy Regulatory Commission, Docket No. AD16-15-000, pp. 1-15, June 2016.
K. Stouffer, J. Falco, and K. Kent, “Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security, Recommendations of the National Institute of Standards and Technology,” NIST Standard Special Publication 800-82, Sep. 2006.
D. U. Case, “Analysis of the cyber attack on the Ukrainian power grid,” Electricity Information Sharing and Analysis Center (E-ISAC), 2016.
L. L. Wei, A. Sarwat, W. Saad, and S. Biswas, “Stochastic games for power grid protection against coordinated cyber-physical attacks,” IEEE Transactions on Smart Grid, vol. 9, pp. 684 – 694, May 2016.
Z. Li, M. Shahidehpour, A. Alabdulwahab, and A. Abusorrah, “Bilevel model for analyzing coordinated cyber-physical attacks on power systems,” IEEE Transactions on Smart Grid, vol. 7, pp. 2260-2272, Aug. 2015.
J. Yue and K. Zhang, “Vulnerability Threat Assessment Based on AHP and Fuzzy Comprehensive Evaluation,” in Computational Intelligence and Design (ISCID), 2014 Seventh International Symposium on, Hangzhou, China, pp. 513-516, 13-14 Dec. 2014.
S. K. Khaitan, J. D. McCalley, and C. C. Liu, “Cyber physical systems approach to smart electric power grid,” Springer, 2015.
W. Al Mannai and T. Lewis, “A general defender-attacker risk model for networks,” The Journal of Risk Finance, vol. 9, pp. 244-261, 2008.
Y. Zhang, L. Wang, and Y. Xiang, “Power system reliability analysis with intrusion tolerance in SCADA systems,” IEEE Transactions on Smart Grid, vol. 7, pp. 669-683, June 2015.
“Cyber Security for Substation Automation Systems by ABB,” Dec. 2010.
C.-W. Ten, C.-C. Liu, and G. Manimaran, “Vulnerability assessment of cybersecurity for SCADA systems,” IEEE Transactions on Power Systems, vol. 23, pp. 1836-1846, Oct. 2008.
A. Creery and E. Byres, “Industrial cybersecurity for power system and SCADA networks, ” in Petroleum and Chemical Industry Conference, Industry Applications Society 52nd Annual, Denver, CO, USA, pp. 303-309, 12-14 Sept. 2005.
H. Heydari, F. Faghihi, and V. Abbasi, “Optimization of Conductor routs within Metal Enclosure of the Electrical Equipments based on EMC Approach Using Multi criteria Decision Making Case Study: Metal Enclosure of Current Injection System,” Modares Technical And Engineering, no. 38, pp. 1–16, 2010. (In Persian)
F. Faghihi, H. Heydari and V. Abbasi, “Optimization of Conductor routs within Metal Enclosure of the Electrical Equipments based on EMC Approach Using Multi criteria Decision Making Case Study: Metal Enclosure of Current Injection System,” Journal of Algorithms and Computation, vol. 43, pp. 681–692, 2009. (In Persian)
V. Abbasi, H. Heydari, and F. Faghihi, “Heuristic mathematical formulations and comprehensive algorithm for optimal decision making for power system cabling,” Scientia Iranica, vol. 19, pp. 707-720, June 2012.
“High-Impact, Low-Frequency Event Risk (HILF) to the North American Bulk Power System,” Jointly-Commissioned Summary Report of the North American Electric Reliability Corporation and the U.S. Department of Energy, Nov. 2009.
A. B. Mirghadri, R. Shirbanian, and A. Mirghadri, “A New Lightweight Authentication Scheme for Wireless Sensor Networks,” Journal of Electronical & Cyber Defence, vol. 4, no. 3, pp.1–10, 2016. (In Persian)
B. Yang, R. Karri, and D. A. McGrew, “A high-speed hardware architecture for universal message authentication code,” IEEE journal on selected areas in communications, vol. 24, pp. 1831-1839, Oct. 2006.
S. Benedetto, E. Biglieri, and V. Castellani, “Digital Transmission Theory,” Englewood Cliffs, NJ: Prentice Hall, 1988.
“Get Smart about Electrical Grid Cyber Security,” Hirschmann, A Belden Brand, 2011.
D.-Y. Chang, “Applications of the extent analysis method on fuzzy AHP,” European journal of operational research, vol. 95, pp. 649-655, Dec. 1996.
Y.-M. Wang and K.-S. Chin, “Fuzzy analytic hierarchy process: A logarithmic fuzzy preference programming methodology,” International Journal of Approximate Reasoning, vol. 52, pp. 541-553, June 2011.