Zhong, Fuli.
2022.
Resilient Control for Time-Delay Systems in Cyber-Physical Environment Using State Estimation and Switching Moving Defense. 2022 2nd International Conference on Computer Science, Electronic Information Engineering and Intelligent Control Technology (CEI). :204—212.
Cybersecurity for complex systems operating in cyber-physical environment is becoming more and more critical because of the increasing cyber threats and systems' vulnerabilities. Security by design is quite an important method to ensure the systems' normal operations and services supply. For the aim of coping with cyber-attack affections properly, this paper studies the resilient security control issue for time-varying delay systems in cyber-physical environment with state estimation and moving defense approach. Time-varying delay factor induced by communication and network transmission, or data acquisition and processing, or certain cyber-attacks, is considered. To settle the cyber-attacks from the perspective of system control, a dynamic system model considering attacks is presented, and the corresponding switched control model with time-varying delay against attacks is formulated. Then the state estimator for system states is designed to overcome the problem that certain states cannot be measured directly. Estimated states serve as the input of the resilient security controller. Sufficient conditions of the stability of the observer and control system are derived out with the Lyapunov stability analysis method jointly. A moving defense strategy based on anomaly detection and random switching is presented, in which an optimization problem for calculating the proper switching probability of each candidate actuator-controller pair is given. Simulation experimental results are shown to illustrate the effectiveness of the presented scheme.
Wang, Rongzhen, Zhang, Bing, Wen, Shixi, Zhao, Yuan.
2022.
Security Platoon Control of Connected Vehicle Systems under DoS Attacks and Dynamic Uncertainty. IECON 2022 – 48th Annual Conference of the IEEE Industrial Electronics Society. :1—5.
In this paper, the distributed security control problem of connected vehicle systems (CVSs) is investigated under denial of service (DoS) attacks and uncertain dynamics. DoS attacks usually block communication channels, resulting in the vehicle inability to receive data from the neighbors. In severe cases, it will affect the control performance of CVSs and even cause vehicle collision and life threats. In order to keep the vehicle platoon stable when the DoS attacks happen, we introduce a random characteristic to describe the impact of the packet loss behavior caused by them. Dependent on the length of the lost packets, we propose a security platoon control protocol to deal with it. Furthermore, the security platoon control problem of CVSs is transformed into a stable problem of Markov jump systems (MJSs) with uncertain parameters. Next, the Lyapunov function method and linear matrix inequations (LMI) are used to analyze the internal stability and design controller. Finally, several simulation results are presented to illustrate the effectiveness of the proposed method.
Gritti, Fabio, Pagani, Fabio, Grishchenko, Ilya, Dresel, Lukas, Redini, Nilo, Kruegel, Christopher, Vigna, Giovanni.
2022.
HEAPSTER: Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images. 2022 IEEE Symposium on Security and Privacy (SP). :1082—1099.
Dynamic memory allocators are critical components of modern systems, and developers strive to find a balance between their performance and their security. Unfortunately, vulnerable allocators are routinely abused as building blocks in complex exploitation chains. Most of the research regarding memory allocators focuses on popular and standardized heap libraries, generally used by high-end devices such as desktop systems and servers. However, dynamic memory allocators are also extensively used in embedded systems but they have not received much scrutiny from the security community.In embedded systems, a raw firmware image is often the only available piece of information, and finding heap vulnerabilities is a manual and tedious process. First of all, recognizing a memory allocator library among thousands of stripped firmware functions can quickly become a daunting task. Moreover, emulating firmware functions to test for heap vulnerabilities comes with its own set of challenges, related, but not limited, to the re-hosting problem.To fill this gap, in this paper we present HEAPSTER, a system that automatically identifies the heap library used by a monolithic firmware image, and tests its security with symbolic execution and bounded model checking. We evaluate HEAPSTER on a dataset of 20 synthetic monolithic firmware images — used as ground truth for our analyses — and also on a dataset of 799 monolithic firmware images collected in the wild and used in real-world devices. Across these datasets, our tool identified 11 different heap management library (HML) families containing a total of 48 different variations. The security testing performed by HEAPSTER found that all the identified variants are vulnerable to at least one critical heap vulnerability. The results presented in this paper show a clear pattern of poor security standards, and raise some concerns over the security of dynamic memory allocators employed by IoT devices.
Sennewald, Tom, Song, Xinya, Westermann, Dirk.
2022.
Assistance System to Consider Dynamic Phenomena for Secure System Operation. 2022 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe). :1—5.
This contribution provides the implementation of a digital twin-based assistance system to be used in future control rooms. By applying parameter estimation methods, the dynamic model in the digital twin is an accurate representation of the physical system. Therefore, a dynamic security assessment (DSA) that is highly dependent on a correctly parameterized dynamic model, can give more reliable information to a system operator in the control room. The assistance system is studied on the Cigré TB 536 benchmark system with an obscured set of machine parameters. Through the proposed parameter estimation approach the original parameters could be estimated, changing, and increasing the statement of the DSA in regard to imminent instabilities.
Tudose, Andrei, Micu, Robert, Picioroaga, Irina, Sidea, Dorian, Mandis, Alexandru, Bulac, Constantin.
2022.
Power Systems Security Assessment Based on Artificial Neural Networks. 2022 International Conference and Exposition on Electrical And Power Engineering (EPE). :535—539.
Power system security assessment is a major issue among the fundamental functions needed for the proper power systems operation. In order to perform the security evaluation, the contingency analysis is a key component. However, the dynamic evolution of power systems during the past decades led to the necessity of novel techniques to facilitate this task. In this paper, power systems security is defined based on the N-l contingency analysis. An artificial neural network approach is proposed to ensure the fast evaluation of power systems security. In this regard, the IEEE 14 bus transmission system is used to verify the performance of the proposed model, the results showing high efficiency subject to multiple evaluation metrics.
Hammar, Kim, Stadler, Rolf.
2022.
An Online Framework for Adapting Security Policies in Dynamic IT Environments. 2022 18th International Conference on Network and Service Management (CNSM). :359—363.
We present an online framework for learning and updating security policies in dynamic IT environments. It includes three components: a digital twin of the target system, which continuously collects data and evaluates learned policies; a system identification process, which periodically estimates system models based on the collected data; and a policy learning process that is based on reinforcement learning. To evaluate our framework, we apply it to an intrusion prevention use case that involves a dynamic IT infrastructure. Our results demonstrate that the framework automatically adapts security policies to changes in the IT infrastructure and that it outperforms a state-of-the-art method.
Yarlagadda, Venu, Garikapati, Annapurna Karthika, Gadupudi, Lakshminarayana, Kapoor, Rashmi, Veeresham, K..
2022.
Comparative Analysis of STATCOM and SVC on Power System Dynamic Response and Stability Margins with time and frequency responses using Modelling. 2022 International Conference on Smart Technologies and Systems for Next Generation Computing (ICSTSN). :1—8.
To ensure dynamic and transient angle and load stability in order to maintain the power system security is a major task of the power Engineer. FACTS Controllers are most effective devices to ensure system security by enhancing the stability margins with reactive power support all over the power system network. The major shunt compensation devices of FACTS are SVC and STATCOM. This article dispenses the modelling and simulation of both the shunt devices viz. Oneis the Static Synchronous Compensator (STATCOM) and the other is Static Var Compensator (SVC). The small signal models of these devices have been derived from the first principles and obtained the transfer function models of weak and strong power systems. The weak power system has the Short Circuit Ratio (SCR) is about less than 3 and that of the strong power system has the SCR of more than 5. The performance of the both weak and strong power systems has been evaluated with time and frequency responses. The dynamic response is obtained with the exact models for both weak and strong systems, subsequently the root locus plots as well as bode plots have been obtained with MATLAB Programs and evaluated the performance of these devices and comparison is made. The Stability margins of both the systems with SVC and STATCOM have been obtained from the bode plots. The dynamic behaviour of the both kinds of power systems have been assessed with time responses of SVC and STATCOM models. All of these results viz. dynamic response, root locus and bode plots proves the superiority of the STATCOM over SVC with indices, viz. peak overshoot, settling time, gain margin and phase margins. The dynamic, steady state performance indices obtained from time response and bode plots proves the superior performance of STATCOM.
Qin, Xuhao, Ni, Ming, Yu, Xinsheng, Zhu, Danjiang.
2022.
Survey on Defense Technology of Web Application Based on Interpretive Dynamic Programming Languages. 2022 7th International Conference on Computer and Communication Systems (ICCCS). :795—801.
With the development of the information age, the process of global networking continues to deepen, and the cyberspace security has become an important support for today’s social functions and social activities. Web applications which have many security risks are the most direct interactive way in the process of the Internet activities. That is why the web applications face a large number of network attacks. Interpretive dynamic programming languages are easy to lean and convenient to use, they are widely used in the development of cross-platform web systems. As well as benefit from these advantages, the web system based on those languages is hard to detect errors and maintain the complex system logic, increasing the risk of system vulnerability and cyber threats. The attack defense of systems based on interpretive dynamic programming languages is widely concerned by researchers. Since the advance of endogenous security technologies, there are breakthroughs on the research of web system security. Compared with traditional security defense technologies, these technologies protect the system with their uncertainty, randomness and dynamism. Based on several common network attacks, the traditional system security defense technology and endogenous security technology of web application based on interpretive dynamic languages are surveyed and compared in this paper. Furthermore, the possible research directions of those technologies are discussed.
Ma, Rui, Zhan, Meng.
2022.
Transient Stability Assessment and Dynamic Security Region in Power Electronics Dominated Power Systems. 2022 IEEE International Conference on Power Systems Technology (POWERCON). :1—6.
Transient stability accidents induced by converter-based resources have been emerging frequently around the world. In this paper, the transient stability of the grid-tied voltage source converter (VSC) system is studied through estimating the basin of attraction (BOA) based on the hyperplane or hypersurface method. Meanwhile, fault critical clearing times are estimated, based on the approximated BOA and numerical fault trajectory. Further, the dynamic security region (DSR), an important index in traditional power systems, is extended to power-electronics-dominated power systems in this paper. The DSR of VSC is defined in the space composed of active current references. Based on the estimated BOA, the single-VSC-infinite-bus system is taken as an example and its DSR is evaluated. Finally, all these analytical results are well verified by several numerical simulations in MATLAB/Simulink.
Sari, Indah Permata, Nahor, Kevin Marojahan Banjar, Hariyanto, Nanang.
2022.
Dynamic Security Level Assessment of Special Protection System (SPS) Using Fuzzy Techniques. 2022 International Seminar on Intelligent Technology and Its Applications (ISITIA). :377—382.
This study will be focused on efforts to increase the reliability of the Bangka Electricity System by designing the interconnection of the Bangka system with another system that is stronger and has a better energy mix, the Sumatra System. The novelty element in this research is the design of system protection using Special Protection System (SPS) as well as a different assessment method using the Fuzzy Technique This research will analyze the implementation of the SPS event-based and parameter-based as a new defense scheme by taking corrective actions to keep the system stable and reliable. These actions include tripping generators, loads, and reconfiguring the system automatically and quickly. The performance of this SPS will be tested on 10 contingency events with four different load profiles and the system response will be observed in terms of frequency stability, voltage, and rotor angle. From the research results, it can be concluded that the SPS performance on the Bangka-Sumatra Interconnection System has a better and more effective performance than the existing defense scheme, as evidenced by the results of dynamic security assessment (DSA) testing using Fuzzy Techniques.