Node Importance Evaluation of Cyber-Physical System under Cyber-Attacks Spreading
The study of cyber-attacks, and in particular the spread of attack on the power cyber-physical system, has recently attracted considerable attention. Identifying and evaluating the important nodes under the cyber-attack propagation scenario are of great significance for improving the reliability and...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2021-01-01
|
Series: | Complexity |
Online Access: | http://dx.doi.org/10.1155/2021/6641030 |
id |
doaj-42f20f6fa3264422a33c12658ab06b19 |
---|---|
record_format |
Article |
spelling |
doaj-42f20f6fa3264422a33c12658ab06b192021-02-15T12:52:51ZengHindawi-WileyComplexity1076-27871099-05262021-01-01202110.1155/2021/66410306641030Node Importance Evaluation of Cyber-Physical System under Cyber-Attacks SpreadingXin-Rui Liu0Yuan Meng1Peng Chang2College of Information Science and Engineering, Northeastern University, Shenyang, Liaoning 110819, ChinaCollege of Information Science and Engineering, Northeastern University, Shenyang, Liaoning 110819, ChinaCollege of Information Science and Engineering, Northeastern University, Shenyang, Liaoning 110819, ChinaThe study of cyber-attacks, and in particular the spread of attack on the power cyber-physical system, has recently attracted considerable attention. Identifying and evaluating the important nodes under the cyber-attack propagation scenario are of great significance for improving the reliability and survivability of the power system. In this paper, we improve the closeness centrality algorithm and propose a compound centrality algorithm based on adaptive coefficient to evaluate the importance of single-layer network nodes. Moreover, we quantitatively calculated the decouple degree of cascading failures caused by exposed nodes formed by attack propagation. At last, experiments based on the IEEE 57 test system show that the proposed compound centrality algorithm can match the cyber-attack propagation scenario well, and we give the importance values of the nodes in a specific attack scenario.http://dx.doi.org/10.1155/2021/6641030 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Xin-Rui Liu Yuan Meng Peng Chang |
spellingShingle |
Xin-Rui Liu Yuan Meng Peng Chang Node Importance Evaluation of Cyber-Physical System under Cyber-Attacks Spreading Complexity |
author_facet |
Xin-Rui Liu Yuan Meng Peng Chang |
author_sort |
Xin-Rui Liu |
title |
Node Importance Evaluation of Cyber-Physical System under Cyber-Attacks Spreading |
title_short |
Node Importance Evaluation of Cyber-Physical System under Cyber-Attacks Spreading |
title_full |
Node Importance Evaluation of Cyber-Physical System under Cyber-Attacks Spreading |
title_fullStr |
Node Importance Evaluation of Cyber-Physical System under Cyber-Attacks Spreading |
title_full_unstemmed |
Node Importance Evaluation of Cyber-Physical System under Cyber-Attacks Spreading |
title_sort |
node importance evaluation of cyber-physical system under cyber-attacks spreading |
publisher |
Hindawi-Wiley |
series |
Complexity |
issn |
1076-2787 1099-0526 |
publishDate |
2021-01-01 |
description |
The study of cyber-attacks, and in particular the spread of attack on the power cyber-physical system, has recently attracted considerable attention. Identifying and evaluating the important nodes under the cyber-attack propagation scenario are of great significance for improving the reliability and survivability of the power system. In this paper, we improve the closeness centrality algorithm and propose a compound centrality algorithm based on adaptive coefficient to evaluate the importance of single-layer network nodes. Moreover, we quantitatively calculated the decouple degree of cascading failures caused by exposed nodes formed by attack propagation. At last, experiments based on the IEEE 57 test system show that the proposed compound centrality algorithm can match the cyber-attack propagation scenario well, and we give the importance values of the nodes in a specific attack scenario. |
url |
http://dx.doi.org/10.1155/2021/6641030 |
work_keys_str_mv |
AT xinruiliu nodeimportanceevaluationofcyberphysicalsystemundercyberattacksspreading AT yuanmeng nodeimportanceevaluationofcyberphysicalsystemundercyberattacksspreading AT pengchang nodeimportanceevaluationofcyberphysicalsystemundercyberattacksspreading |
_version_ |
1714866986062708736 |