{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T16:09:56Z","timestamp":1775146196527,"version":"3.50.1"},"reference-count":30,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2022,12,27]],"date-time":"2022-12-27T00:00:00Z","timestamp":1672099200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Science Foundation of China","award":["51907097"],"award-info":[{"award-number":["51907097"]}]},{"name":"National Science Foundation of China","award":["2021YFB4000500"],"award-info":[{"award-number":["2021YFB4000500"]}]},{"name":"National Key R&amp;D Program of China","award":["51907097"],"award-info":[{"award-number":["51907097"]}]},{"name":"National Key R&amp;D Program of China","award":["2021YFB4000500"],"award-info":[{"award-number":["2021YFB4000500"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>With the increasing digitalization and informatization of distribution network systems, distribution networks have gradually developed into distribution network cyber physical systems (CPS) which are deeply integrated with traditional power systems and cyber systems. However, at the same time, the network risk problems that the cyber systems face have also increased. Considering the possible cyber attack vulnerabilities in the distribution network CPS, a dynamic Bayesian network approach is proposed in this paper to quantitatively assess the security risk of the distribution network CPS. First, the Bayesian network model is constructed based on the structure of the distribution network and common vulnerability scoring system (CVSS). Second, a combination of the fuzzy analytic hierarchy process (FAHP) and entropy weight method is used to correct the selectivity of the attacker to strike the target when cyber attack vulnerabilities occur, and then after considering the defense resources of the system, the risk probability of the target nodes is obtained. Finally, the node loads and node risk rates are used to quantitatively assess the risk values that are applied to determine the risk level of the distribution network CPS, so that defense strategies can be given in advance to counter the adverse effects of cyber attack vulnerabilities.<\/jats:p>","DOI":"10.3390\/e25010047","type":"journal-article","created":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T05:42:48Z","timestamp":1672206168000},"page":"47","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["Security Risk Assessment Approach for Distribution Network Cyber Physical Systems Considering Cyber Attack Vulnerabilities"],"prefix":"10.3390","volume":"25","author":[{"given":"Buxiang","family":"Zhou","sequence":"first","affiliation":[{"name":"College of Electrical Engineering, Sichuan University, Chengdu 610065, China"},{"name":"Intelligent Electric Power Grid Key Laboratory of Sichuan Province, Sichuan University, Chengdu 610065, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Binjie","family":"Sun","sequence":"additional","affiliation":[{"name":"College of Electrical Engineering, Sichuan University, Chengdu 610065, China"},{"name":"Intelligent Electric Power Grid Key Laboratory of Sichuan Province, Sichuan University, Chengdu 610065, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5995-3442","authenticated-orcid":false,"given":"Tianlei","family":"Zang","sequence":"additional","affiliation":[{"name":"College of Electrical Engineering, Sichuan University, Chengdu 610065, China"},{"name":"Intelligent Electric Power Grid Key Laboratory of Sichuan Province, Sichuan University, Chengdu 610065, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yating","family":"Cai","sequence":"additional","affiliation":[{"name":"College of Electrical Engineering, Sichuan University, Chengdu 610065, China"},{"name":"Intelligent Electric Power Grid Key Laboratory of Sichuan Province, Sichuan University, Chengdu 610065, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jiale","family":"Wu","sequence":"additional","affiliation":[{"name":"College of Electrical Engineering, Sichuan University, Chengdu 610065, China"},{"name":"Intelligent Electric Power Grid Key Laboratory of Sichuan Province, Sichuan University, Chengdu 610065, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Huan","family":"Luo","sequence":"additional","affiliation":[{"name":"College of Electrical Engineering, Sichuan University, Chengdu 610065, China"},{"name":"Intelligent Electric Power Grid Key Laboratory of Sichuan Province, Sichuan University, Chengdu 610065, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1968","published-online":{"date-parts":[[2022,12,27]]},"reference":[{"key":"ref_1","first-page":"3522","article-title":"Key Technologies and Their Progress in Cyber Physics System of Power Grid","volume":"35","author":"Liu","year":"2015","journal-title":"Proc. CSEE"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"4167","DOI":"10.1109\/TPWRS.2020.2995180","article-title":"Analytical Reliability Evaluation of Active Distribution Systems Considering Information Link Failures","volume":"35","author":"Liu","year":"2020","journal-title":"IEEE Trans. Power Syst."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"2510","DOI":"10.1109\/TSG.2015.2404334","article-title":"Goal-Based Holonic Multiagent System for Operation of Power Distribution Systems","volume":"6","author":"Pahwa","year":"2015","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"2566","DOI":"10.1109\/TSG.2020.3042926","article-title":"False Data Injection Attacks Against State-of-Charge Estimation of Battery Energy Storage Systems in Smart Distribution Networks","volume":"12","author":"Zhuang","year":"2021","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Liu, F., Zhang, S., Ma, W., and Qu, J. (2022). Research on Attack Detection of Cyber Physical Systems Based on Improved Support Vector Machine. Mathematics, 10.","DOI":"10.3390\/math10152713"},{"key":"ref_6","first-page":"145","article-title":"Integrated Security Assessment of Information Energy Systems from the Ukraine Power Outage","volume":"40","author":"Guo","year":"2016","journal-title":"Autom. Electr. Power Syst."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1109\/JPROC.2011.2165269","article-title":"Cyber\u2013Physical System Security for the Electric Power Grid","volume":"100","author":"Sridhar","year":"2012","journal-title":"Proc. IEEE"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.jnca.2018.11.001","article-title":"A Packet-Reordering Covert Channel over VoLTE Voice and Video Traffics","volume":"126","author":"Zhang","year":"2019","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1223","DOI":"10.1109\/TWC.2009.060598","article-title":"Transactions Papers a Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks","volume":"8","author":"Du","year":"2009","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"3230","DOI":"10.1109\/TPWRS.2019.2899983","article-title":"Risk Assessment for Cyberattack in Active Distribution Systems Considering the Role of Feeder Automation","volume":"34","author":"Dai","year":"2019","journal-title":"IEEE Trans. Power Syst."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"44140","DOI":"10.1109\/ACCESS.2020.2978113","article-title":"Analysis of the Impact of Combined Information-Physical-Failure on Distribution Network CPS","volume":"8","author":"Zhou","year":"2020","journal-title":"IEEE Access"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1429","DOI":"10.1109\/TSMC.2015.2503399","article-title":"Multimodel-Based Incident Prediction and Risk Assessment in Dynamic Cybersecurity Protection for Industrial Control Systems","volume":"46","author":"Zhang","year":"2016","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1016\/j.ress.2005.03.011","article-title":"Application of Bayesian Network to the Probabilistic Risk Assessment of Nuclear Waste Disposal","volume":"91","author":"Lee","year":"2006","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"108650","DOI":"10.1016\/j.ijepes.2022.108650","article-title":"Risk Assessment in Distribution Networks Considering Cyber Coupling","volume":"145","author":"Qin","year":"2023","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"ref_15","first-page":"389","article-title":"Chapter Eleven\u2014Uncertainty Modeling in Risk Assessment of Digitalized Process Systems","volume":"6","author":"Yazdi","year":"2022","journal-title":"Methods Assess Manag. Process Saf. Digit. Process Syst."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"6916","DOI":"10.1109\/TII.2020.3029766","article-title":"Smart Collaborative Balancing for Dependable Network Components in Cyber-Physical Systems","volume":"17","author":"Song","year":"2021","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"3849","DOI":"10.1109\/TII.2019.2939346","article-title":"Operational Risk Evaluation of Active Distribution Networks Considering Cyber Contingencies","volume":"16","author":"Cao","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"684","DOI":"10.1109\/TSG.2016.2561266","article-title":"Stochastic Games for Power Grid Protection Against Coordinated Cyber-Physical Attacks","volume":"9","author":"Wei","year":"2018","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"5751","DOI":"10.1109\/TII.2020.3030799","article-title":"A Fast Prekeying-Based Integrity Protection for Smart Grid Communications","volume":"17","author":"Pal","year":"2021","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1707","DOI":"10.1109\/TSG.2015.2396994","article-title":"Power System Reliability Evaluation With SCADA Cybersecurity Considerations","volume":"6","author":"Zhang","year":"2015","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1109\/MSP.2006.145","article-title":"Common Vulnerability Scoring System","volume":"4","author":"Mell","year":"2006","journal-title":"IEEE Secur. Priv."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1002","DOI":"10.1109\/TDSC.2016.2644614","article-title":"Can the Common Vulnerability Scoring System Be Trusted? A Bayesian Analysis","volume":"15","author":"Johnson","year":"2018","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_23","first-page":"1939","article-title":"Quantitative Assessment Model for Dynamic Performance Analysis of Security Risks in Industrial Cyber Physical Systems","volume":"36","author":"Sun","year":"2021","journal-title":"Control Decis."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/TDSC.2011.34","article-title":"Dynamic Security Risk Management Using Bayesian Attack Graphs","volume":"9","author":"Poolsappasit","year":"2012","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1109\/TDSC.2016.2627033","article-title":"Exact Inference Techniques for the Analysis of Bayesian Attack Graphs","volume":"16","author":"Sgandurra","year":"2019","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1943","DOI":"10.1109\/TSMC.2018.2792058","article-title":"On Theoretical Principle and Practical Applicability of Ranked Nodes Method for Constructing Conditional Probability Tables of Bayesian Networks","volume":"50","author":"Laitila","year":"2020","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"3270","DOI":"10.1109\/TFUZZ.2020.3018110","article-title":"A Comparative Study Between Analytic Hierarchy Process and Its Fuzzy Variants: A Perspective Based on Two Linguistic Models","volume":"29","author":"Zhang","year":"2021","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Zhang, D., Wei, K., Yao, Y., Yang, J., Zheng, G., and Li, Q. (2022). Capture and Prediction of Rainfall-Induced Landslide Warning Signals Using an Attention-Based Temporal Convolutional Neural Network and Entropy Weight Methods. Sensors, 22.","DOI":"10.3390\/s22166240"},{"key":"ref_29","first-page":"103","article-title":"Distribution Network Reliability Assessment with Multiple Types of Information Disturbances","volume":"43","author":"Chen","year":"2019","journal-title":"Autom. Electr. Power Syst."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/j.psep.2019.09.003","article-title":"Uncertainty Handling in Fault Tree Based Risk Assessment: State of the Art and Future Perspectives","volume":"131","author":"Yazdi","year":"2019","journal-title":"Process. Saf. Environ. Prot."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/25\/1\/47\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T01:52:40Z","timestamp":1760147560000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/25\/1\/47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,27]]},"references-count":30,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,1]]}},"alternative-id":["e25010047"],"URL":"https:\/\/doi.org\/10.3390\/e25010047","relation":{},"ISSN":["1099-4300"],"issn-type":[{"value":"1099-4300","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,27]]}}}