From Balance to Breach: Cyber Threats to Battery Energy Storage Systems
- URL: http://arxiv.org/abs/2501.05923v1
- Date: Fri, 10 Jan 2025 12:33:42 GMT
- Title: From Balance to Breach: Cyber Threats to Battery Energy Storage Systems
- Authors: Frans Öhrström, Joakim Oscarsson, Zeeshan Afzal, János Dani, Mikael Asplund,
- Abstract summary: Battery energy storage systems are an important part of modern power systems as a solution to maintain grid balance.
This paper takes a step towards advancing understanding of these systems and investigates the effects of cyberattacks targeting them.
- Score: 0.0
- License:
- Abstract: Battery energy storage systems are an important part of modern power systems as a solution to maintain grid balance. However, such systems are often remotely managed using cloud-based control systems. This exposes them to cyberattacks that could result in catastrophic consequences for the electrical grid and the connected infrastructure. This paper takes a step towards advancing understanding of these systems and investigates the effects of cyberattacks targeting them. We propose a reference model for an electrical grid cloud-controlled load-balancing system connected to remote battery energy storage systems. The reference model is evaluated from a cybersecurity perspective by implementing and simulating various cyberattacks. The results reveal the system's attack surface and demonstrate the impact of cyberattacks that can criticaly threaten the security and stability of the electrical grid.
Related papers
- Countering Autonomous Cyber Threats [40.00865970939829]
Foundation Models present dual-use concerns broadly and within the cyber domain specifically.
Recent research has shown the potential for these advanced models to inform or independently execute offensive cyberspace operations.
This work evaluates several state-of-the-art FMs on their ability to compromise machines in an isolated network and investigates defensive mechanisms to defeat such AI-powered attacks.
arXiv Detail & Related papers (2024-10-23T22:46:44Z) - Smart Grid Security: A Verified Deep Reinforcement Learning Framework to Counter Cyber-Physical Attacks [2.159496955301211]
Smart grids are vulnerable to strategically crafted cyber-physical attacks.
Malicious attacks can manipulate power demands using high-wattage Internet of Things (IoT) botnet devices.
Grid operators overlook potential scenarios of cyber-physical attacks during their design phase.
We propose a safe Deep Reinforcement Learning (DRL)-based framework for mitigating attacks on smart grids.
arXiv Detail & Related papers (2024-09-24T05:26:20Z) - Threat analysis and adversarial model for Smart Grids [1.7482569079741024]
The cyber domain of this smart power grid opens a new plethora of threats.
Different stakeholders including regulation bodies, industry and academy are making efforts to provide security mechanisms to mitigate and reduce cyber-risks.
Recent work shows a lack of agreement among grid practitioners and academic experts on the feasibility and consequences of academic-proposed threats.
This is in part due to inadequate simulation models which do not evaluate threats based on attackers full capabilities and goals.
arXiv Detail & Related papers (2024-06-17T16:33:46Z) - GAN-GRID: A Novel Generative Attack on Smart Grid Stability Prediction [53.2306792009435]
We propose GAN-GRID a novel adversarial attack targeting the stability prediction system of a smart grid tailored to real-world constraints.
Our findings reveal that an adversary armed solely with the stability model's output, devoid of data or model knowledge, can craft data classified as stable with an Attack Success Rate (ASR) of 0.99.
arXiv Detail & Related papers (2024-05-20T14:43:46Z) - FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids [53.2306792009435]
FaultGuard is the first framework for fault type and zone classification resilient to adversarial attacks.
We propose a low-complexity fault prediction model and an online adversarial training technique to enhance robustness.
Our model outclasses the state-of-the-art for resilient fault prediction benchmarking, with an accuracy of up to 0.958.
arXiv Detail & Related papers (2024-03-26T08:51:23Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Cybersecurity Challenges of Power Transformers [3.509488301177195]
The dependency of new power grid technology on information, data analytic and communication systems make the entire electricity network vulnerable to cyber threats.
Power transformers play a critical role within the power grid and are now commonly enhanced through factory add-ons or intelligent monitoring systems.
This paper explores the vulnerabilities and the attack vectors of power transformers within electricity networks, the possible attack scenarios and the risks associated with these attacks.
arXiv Detail & Related papers (2023-02-25T21:08:59Z) - Hyperloop: A Cybersecurity Perspective [56.82349944873289]
We provide the first analysis of the cybersecurity challenges of the interconnections between the different components of the Hyperloop ecosystem.
We investigate possible infrastructure management approaches and their security concerns.
We discuss countermeasures and future directions for the security of the Hyperloop design.
arXiv Detail & Related papers (2022-09-07T12:10:36Z) - Internet of Predictable Things (IoPT) Framework to Increase
Cyber-Physical System Resiliency [0.0]
This paper proposes the concept of the Internet of Predictable Things (IoPT)
It incorporates advanced data analytics and machine learning methods to increase the resiliency of cyber-physical systems against cybersecurity risks.
arXiv Detail & Related papers (2021-01-19T19:01:56Z) - A System for Efficiently Hunting for Cyber Threats in Computer Systems
Using Threat Intelligence [78.23170229258162]
We build ThreatRaptor, a system that facilitates cyber threat hunting in computer systems using OSCTI.
ThreatRaptor provides (1) an unsupervised, light-weight, and accurate NLP pipeline that extracts structured threat behaviors from unstructured OSCTI text, (2) a concise and expressive domain-specific query language, TBQL, to hunt for malicious system activities, and (3) a query synthesis mechanism that automatically synthesizes a TBQL query from the extracted threat behaviors.
arXiv Detail & Related papers (2021-01-17T19:44:09Z) - Machine Learning in Generation, Detection, and Mitigation of
Cyberattacks in Smart Grid: A Survey [1.3299946892361474]
Smart grid (SG) is a complex cyber-physical system that utilizes modern cyber and physical equipment to run at an optimal operating point.
Cyberattacks are the principal threats confronting the usage and advancement of the state-of-the-art systems.
Machine learning (ML) is being used to exploit and defend the cyberattacks in SG by the attackers and system operators.
arXiv Detail & Related papers (2020-09-01T05:16:51Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.