Virtual Power Plants (VPPs) have emerged as critical infrastructure for grid stability, aggregating diverse Distributed Energy Resources (DERs) to provide essential ancillary services, including frequency regulation, voltage support, and emergency response capabilities. However, the technical requirements that enable VPPs to deliver these time-critical services simultaneously create unique cybersecurity vulnerabilities that distinguish them from traditional power generation and conventional smart grid systems. This paper establishes systematic connections between VPP technical requirements and cybersecurity threats through the integrated application of NIST and MITRE frameworks. The objective is to reveal critical threats specifically pertaining to ancillary services, comprehensive attack vector classification using MITRE ATT&CK techniques adapted for VPP environments, and mitigation strategies that maintain operational performance while addressing identified vulnerabilities.

Securing Virtual Power Plants: Attack Vector Analysis of Cybersecurity Vulnerabilities in Ancillary Grid Services

Mokarim A.;Gaggero G. B.;Marchese M.
2025-01-01

Abstract

Virtual Power Plants (VPPs) have emerged as critical infrastructure for grid stability, aggregating diverse Distributed Energy Resources (DERs) to provide essential ancillary services, including frequency regulation, voltage support, and emergency response capabilities. However, the technical requirements that enable VPPs to deliver these time-critical services simultaneously create unique cybersecurity vulnerabilities that distinguish them from traditional power generation and conventional smart grid systems. This paper establishes systematic connections between VPP technical requirements and cybersecurity threats through the integrated application of NIST and MITRE frameworks. The objective is to reveal critical threats specifically pertaining to ancillary services, comprehensive attack vector classification using MITRE ATT&CK techniques adapted for VPP environments, and mitigation strategies that maintain operational performance while addressing identified vulnerabilities.
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11567/1273098
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? ND
social impact