Node Importance Evaluation of Cyber-Physical System under Cyber-Attacks Spreading

Complexity 2021:1-15 (2021)
  Copy   BIBTEX

Abstract

The study of cyber-attacks, and in particular the spread of attack on the power cyber-physical system, has recently attracted considerable attention. Identifying and evaluating the important nodes under the cyber-attack propagation scenario are of great significance for improving the reliability and survivability of the power system. In this paper, we improve the closeness centrality algorithm and propose a compound centrality algorithm based on adaptive coefficient to evaluate the importance of single-layer network nodes. Moreover, we quantitatively calculated the decouple degree of cascading failures caused by exposed nodes formed by attack propagation. At last, experiments based on the IEEE 57 test system show that the proposed compound centrality algorithm can match the cyber-attack propagation scenario well, and we give the importance values of the nodes in a specific attack scenario.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 92,574

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Cyber Terrorism And Cyber Law - Duties Of Service Providers.Pavan Duggal - 2016 - International Review of Information Ethics 25.
Violence, Just Cyber War and Information.Massimo Durante - 2015 - Philosophy and Technology 28 (3):369-385.
Ethiek voor Cyberkrijg en Cyberkrijgers.Peter Olsthoorn - 2019 - Algemeen Nederlands Tijdschrift voor Wijsbegeerte 111 (1):95-109.
Cyber Attacks and Terrorism: A Twenty-First Century Conundrum.Marwan Albahar - 2019 - Science and Engineering Ethics 25 (4):993-1006.
Confronting Cyber Warfare: Rethinking the Ethics of Cyber War.Bassam Romaya & Lisa Portmess - 2013 - Journal for Peace and Justice Studies 23 (1):44-60.
Just War, Cyber War, and the Concept of Violence.Christopher J. Finlay - 2018 - Philosophy and Technology 31 (3):357-377.
Examination of cyber aggression by adult consumers: ethical framework and drivers.Mei Han & Arturo Z. Vasquez - 2019 - Journal of Information, Communication and Ethics in Society 18 (2):305-319.
Cyber terrorism: A case study of islamic state.Zaheema Iqbal & Khurram Iqbal - 2017 - Journal of Social Sciences and Humanities 56 (2):67-79.
Just War, Cyber War, and the Concept of Violence.Christopher J. Finlay - 2018 - Philosophy and Technology 31 (3):357-377.

Analytics

Added to PP
2021-01-17

Downloads
9 (#1,261,065)

6 months
5 (#649,144)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references