サイバーログと物理計測で、DER(分散型エネルギーリソース)の故障と攻撃を見分けるよ!
🌟 ギャル的キラキラポイント ● 仮想物理変数(ヴァーチャル・フィジカル・ヘン・スウ)に着目👀💡 ● PVOTA(ピー・ブイ・オー・ティー・エー)っていう独自技術がスゴい💖 ● 電力システム(電力網)のセキュリティが爆上がりする予感💘
詳細解説いくよ~!
背景 DERシステムって、太陽光発電とか蓄電池みたいなエネルギー源をまとめたもの🔌。サイバー攻撃💥とか故障で止まっちゃうと困るから、それを区別する技術が必要なの!既存の研究だと、情報が足りなかったり、ノイズ(雑音)の影響を受けやすかったりしたんだって。
続きは「らくらく論文」アプリで
In recent years, cyberattacks - along with physical faults - have become an increasing factor causing system failures, especially in DER (Distributed Energy Resources) systems. In addition, according to the literature, a number of faults have been reported to remain undetected. Consequently, unlike anomaly detection works that only identify abnormalities, differentiating undetected faults and cyberattacks is a challenging task. Although several works have studied this problem, they crucially fall short of achieving an accurate distinction due to the reliance on physical laws or physical measurements. To resolve this issue, the industry typically conducts an integrated analysis with physical measurements and cyberspace information. Nevertheless, this industry approach consumes a significant amount of time due to the manual efforts required in the analysis. In this work, we focus on addressing these crucial gaps by proposing a non-trivial approach of distinguishing undetected faults and cyberattacks in DER systems. Specifically, first, a special kind of dependency graph is constructed using a novel virtual physical variable-oriented taint analysis (PVOTA) algorithm. Then, the graph is simplified using an innovative node pruning technique, which is based on a set of context-dependent operations. Next, a set of patterns capturing domain-specific knowledge is derived to bridge the semantic gaps between the cyber and physical sides. Finally, these patterns are matched to the relevant events that occurred during failure incidents, and possible root causes are concluded based on the pattern matching results. In the end, the efficacy of our proposed automatic integrated analysis is evaluated through four case studies covering failure incidents caused by the FDI attack, undetected faults, and memory corruption attacks.