{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T07:09:07Z","timestamp":1766732947800,"version":"build-2065373602"},"reference-count":24,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2019,7,29]],"date-time":"2019-07-29T00:00:00Z","timestamp":1564358400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"State Grid Technology Project","award":["PD71-17-006"],"award-info":[{"award-number":["PD71-17-006"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>This study focuses on the problem of attack quantification in distribution automation systems (DASs) and proposes a quantitative model of attacks based on the common vulnerability scoring system (CVSS) and attack trees (ATs) to conduct a quantitative and systematic evaluation of attacks on a DAS. In the DAS security architecture, AT nodes are traversed and used to represent the attack path. The CVSS is used to quantify the attack sequence, which is the leaf node in an AT. This paper proposes a method to calculate each attack path probability and find the maximum attack path probability in DASs based on attacker behavior. The AT model is suitable for DAS hierarchical features in architecture. The experimental results show that the proposed model can reduce the influence of subjective factors on attack quantification, improve the probability of predicting attacks on the DASs, generate attack paths, better identify attack characteristics, and determine the attack path and quantification probability. The quantitative results of the model\u2019s evaluation can find the most vulnerable component of a DAS and provide an important reference for developing targeted defensive measures in DASs.<\/jats:p>","DOI":"10.3390\/info10080251","type":"journal-article","created":{"date-parts":[[2019,7,29]],"date-time":"2019-07-29T11:20:18Z","timestamp":1564399218000},"page":"251","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Quantitative Model of Attacks on Distribution Automation Systems Based on CVSS and Attack Trees"],"prefix":"10.3390","volume":"10","author":[{"given":"Erxia","family":"Li","sequence":"first","affiliation":[{"name":"China Electric Power Research Institute, Haidian District, Beijing 100192, China"}]},{"given":"Chaoqun","family":"Kang","sequence":"additional","affiliation":[{"name":"China Electric Power Research Institute, Haidian District, Beijing 100192, China"}]},{"given":"Deyu","family":"Huang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Trustworthy Distributed Computing and Service (Beijing University of Posts and Telecommunications), Ministry of Education, Haidian District, Beijing 100876, China"}]},{"given":"Modi","family":"Hu","sequence":"additional","affiliation":[{"name":"Key Laboratory of Trustworthy Distributed Computing and Service (Beijing University of Posts and Telecommunications), Ministry of Education, Haidian District, Beijing 100876, China"}]},{"given":"Fangyuan","family":"Chang","sequence":"additional","affiliation":[{"name":"China Electric Power Research Institute, Haidian District, Beijing 100192, China"}]},{"given":"Lianjie","family":"He","sequence":"additional","affiliation":[{"name":"China Electric Power Research Institute, Haidian District, Beijing 100192, China"}]},{"given":"Xiaoyong","family":"Li","sequence":"additional","affiliation":[{"name":"Key Laboratory of Trustworthy Distributed Computing and Service (Beijing University of Posts and Telecommunications), Ministry of Education, Haidian District, Beijing 100876, China"}]}],"member":"1968","published-online":{"date-parts":[[2019,7,29]]},"reference":[{"key":"ref_1","first-page":"13","article-title":"Venezuela: Guaido stripped of immunity, protests erupt over blackouts","volume":"1216","author":"Dobson","year":"2019","journal-title":"Green Left Weekly"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Zhou, L., Ouyang, X., Ying, H., Han, L., Cheng, Y., and Zhang, T. (2018, January 22\u201324). Cyber-Attack Classification in Smart Grid via Deep Neural Network. Proceedings of the 2nd International Conference on Computer Science and Application Engineering, Hohhot, China.","DOI":"10.1145\/3207677.3278054"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/j.ijepes.2017.12.020","article-title":"Cyber security of a power grid: State-of-the-art","volume":"99","author":"Sun","year":"2018","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Bai, M., Liang, Y., Ma, J., and Deng, P. (2018, January 17\u201319). Fault Modeling and Simulation Based on Cyber Physical System in Complex Distribution Network. Proceedings of the 2018 China International Conference on Electricity Distribution (CICED), Tianjin, China.","DOI":"10.1109\/CICED.2018.8592385"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Ciapessoni, E., Cirio, D., Massucco, S., Morini, A., Pitto, A., and Silvestro, F. (2017). Risk-based dynamic security assessment for power system operation and operational planning. Energies, 10.","DOI":"10.3390\/en10040475"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Huang, K., Zhou, C., Qin, Y., and Tu, W. (2019). A Game-Theoretic Approach to Cross-Layer Security Decision-Making in Industrial Cyber-Physical Systems. IEEE Trans. Ind. Electron.","DOI":"10.1109\/TIE.2019.2907451"},{"key":"ref_7","first-page":"74","article-title":"Security situation awareness based on power-supply ability model of active distribution system","volume":"37","author":"Huang","year":"2017","journal-title":"Electr. Power Autom. Equip."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"847","DOI":"10.1109\/TSG.2012.2226919","article-title":"Cyber-physical security testbeds: Architecture, application, and evaluation for smart grid","volume":"4","author":"Hahn","year":"2013","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"477","DOI":"10.1049\/iet-gtd.2015.0857","article-title":"Framework for vulnerability assessment of communication systems for electric power grids","volume":"10","author":"Wang","year":"2016","journal-title":"IET Gener. Transm. Distrib."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/TSG.2016.2542859","article-title":"Optimal tree construction model for cyber-attacks to wide area measurement systems","volume":"9","author":"Kateb","year":"2018","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_11","first-page":"106","article-title":"Computer Network Vulnerability Assessment Based on Bayesian Attribute Network","volume":"38","author":"Wang","year":"2015","journal-title":"J. Beijing Univ. Posts Telecommun."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/j.automatica.2018.03.012","article-title":"A hybrid stochastic game for secure control of cyber-physical systems","volume":"93","author":"Miao","year":"2018","journal-title":"Automatica"},{"key":"ref_13","first-page":"115","article-title":"Research on establishing network intrusion modeling based on MLL-AT","volume":"32","author":"Yan","year":"2011","journal-title":"J. Commun."},{"key":"ref_14","first-page":"2192","article-title":"Research on Power Distribution Automation Construction Effects Evaluation System Based on SMART Criteria","volume":"40","author":"Zhang","year":"2016","journal-title":"Power Syst. Technol."},{"key":"ref_15","first-page":"10","article-title":"Influence of Distribution Automation Data Transmission Errors on Power Supply Reliability of Distribution System","volume":"42","author":"Luo","year":"2018","journal-title":"Autom. Electr. Power Syst."},{"key":"ref_16","first-page":"21","article-title":"Attack trees","volume":"24","author":"Schneier","year":"1999","journal-title":"Dr. Dobb\u2019s J."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1110","DOI":"10.1109\/TIFS.2017.2771238","article-title":"An empirical evaluation of the effectiveness of attack graphs and fault trees in cyber-attack perception","volume":"13","author":"Lallie","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1007\/s12652-016-0442-8","article-title":"Security risk assessment framework for smart car using the attack tree analysis","volume":"9","author":"Kong","year":"2018","journal-title":"J. Ambient Intell. Hum. Comput."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Doynikova, E., and Kotenko, I. (2017, January 6\u20138). CVSS-based probabilistic risk assessment for cyber situational awareness and countermeasure selection. Proceedings of the 2017 25th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), St. Petersburg, Russia.","DOI":"10.1109\/PDP.2017.44"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Venkataramanan, V., Srivastava, A., Hahn, A., and Zonouz, S. (2018, January 23\u201327). Enhancing Microgrid Resiliency Against Cyber Vulnerabilities. Proceedings of the 2018 IEEE Industry Applications Society Annual Meeting (IAS), Portland, OR, USA.","DOI":"10.1109\/IAS.2018.8544667"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Aksu, M.U., Dilek, M.H., Tatl\u0131, E.\u0130., Bicakci, K., Dirik, H.\u0130., Demirezen, M.U., and Ayk\u0131r, T. (2017, January 23\u201326). A quantitative CVSS-based cyber security risk assessment methodology for IT systems. Proceedings of the 2017 International Carnahan Conference on Security Technology (ICCST), Madrid, Spain.","DOI":"10.1109\/CCST.2017.8167819"},{"key":"ref_22","unstructured":"(2019, June 19). Common Vulnerability Scoring System v3.0: User Guide. Available online: https:\/\/www.first.org\/cvss\/v3.0\/user-guide."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"3954","DOI":"10.1109\/TSG.2016.2644618","article-title":"A detection and mitigation model for PTP delay attack in an IEC 61850 substation","volume":"9","author":"Moussa","year":"2018","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1419","DOI":"10.1109\/TPDS.2014.2321750","article-title":"Service operator-aware trust scheme for resource matchmaking across multiple clouds","volume":"26","author":"Li","year":"2015","journal-title":"IEEE Trans. Parallel Distrib. Syst."}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/10\/8\/251\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:10:51Z","timestamp":1760188251000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/10\/8\/251"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,29]]},"references-count":24,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2019,8]]}},"alternative-id":["info10080251"],"URL":"https:\/\/doi.org\/10.3390\/info10080251","relation":{},"ISSN":["2078-2489"],"issn-type":[{"type":"electronic","value":"2078-2489"}],"subject":[],"published":{"date-parts":[[2019,7,29]]}}}