A Markov Game Theoritic Approach for Power Grid Security
Title | A Markov Game Theoritic Approach for Power Grid Security |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Kamdem, G., Kamhoua, C., Lu, Y., Shetty, S., Njilla, L. |
Conference Name | 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW) |
Keywords | advanced persistent threat, advanced persistent threats, Analytical models, Companies, cyber-attack, game theory, Games, graph theory, Human Behavior, information and communication technology, Markov game, Markov processes, Metrics, power engineering computing, Power Grid Security, power grids, power system security, pubcrawl, resilience, Resiliency, Scalability, security of data, two-player zero-sum Markov game theoretic approach, user authentication information steal |
Abstract | The extensive use of information and communication technologies in power grid systems make them vulnerable to cyber-attacks. One class of cyber-attack is advanced persistent threats where highly skilled attackers can steal user authentication information's and then move laterally in the network, from host to host in a hidden manner, until they reach an attractive target. Once the presence of the attacker has been detected in the network, appropriate actions should be taken quickly to prevent the attacker going deeper. This paper presents a game theoretic approach to optimize the defense against an invader attempting to use a set of known vulnerabilities to reach critical nodes in the network. First, the network is modeled as a vulnerability multi-graph where the nodes represent physical hosts and edges the vulnerabilities that the attacker can exploit to move laterally from one host to another. Secondly, a two-player zero-sum Markov game is built where the states of the game represent the nodes of the vulnerability multi-graph graph and transitions correspond to the edge vulnerabilities that the attacker can exploit. The solution of the game gives the optimal strategy to disconnect vulnerable services and thus slow down the attack. |
URL | http://ieeexplore.ieee.org/document/7979807/ |
DOI | 10.1109/ICDCSW.2017.63 |
Citation Key | kamdem_markov_2017 |
- Metrics
- user authentication information steal
- two-player zero-sum Markov game theoretic approach
- security of data
- Scalability
- Resiliency
- resilience
- pubcrawl
- power system security
- power grids
- Power Grid Security
- power engineering computing
- advanced persistent threat
- Markov processes
- Markov game
- information and communication technology
- Human behavior
- graph theory
- Games
- game theory
- cyber-attack
- Companies
- Analytical models
- advanced persistent threats