Vulnerability analysis of power systems based on cyber-attack and defense models
Title | Vulnerability analysis of power systems based on cyber-attack and defense models |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Hasan, S., Ghafouri, A., Dubey, A., Karsai, G., Koutsoukos, X. |
Conference Name | 2018 IEEE Power Energy Society Innovative Smart Grid Technologies Conference (ISGT) |
Date Published | Feb. 2018 |
Publisher | IEEE |
ISBN Number | 978-1-5386-2453-1 |
Keywords | Adversary Models, Attacker Modeling, Blackouts, Cascading Failures, cyber-attack, defender modeling, defense models, game theory, game-theoretic approach, Human Behavior, Load modeling, Metrics, Monitoring, power engineering computing, power system faults, Power system protection, power system security, Power systems, power transmission lines, pubcrawl, resilience, Resiliency, RTUs, SCADA, Scalability, security of data, Smart grid, Substations, system operators, vulnerability analysis |
Abstract | Reliable operation of power systems is a primary challenge for the system operators. With the advancement in technology and grid automation, power systems are becoming more vulnerable to cyber-attacks. The main goal of adversaries is to take advantage of these vulnerabilities and destabilize the system. This paper describes a game-theoretic approach to attacker / defender modeling in power systems. In our models, the attacker can strategically identify the subset of substations that maximize damage when compromised. However, the defender can identify the critical subset of substations to protect in order to minimize the damage when an attacker launches a cyber-attack. The algorithms for these models are applied to the standard IEEE-14, 39, and 57 bus examples to identify the critical set of substations given an attacker and a defender budget. |
URL | https://ieeexplore.ieee.org/document/8403337 |
DOI | 10.1109/ISGT.2018.8403337 |
Citation Key | hasan_vulnerability_2018 |
- Power system protection
- Vulnerability Analysis
- system operators
- Substations
- Smart Grid
- security of data
- Scalability
- SCADA
- RTUs
- Resiliency
- resilience
- pubcrawl
- power transmission lines
- power systems
- power system security
- Adversary Models
- power system faults
- power engineering computing
- Monitoring
- Metrics
- Load modeling
- Human behavior
- game-theoretic approach
- game theory
- defense models
- defender modeling
- cyber-attack
- Cascading Failures
- blackouts
- Attacker Modeling