Risk Assessment of Malicious Attacks Against Power Systems

The new scenarios of malicious attack prompt for their deeper consideration and mainly when critical systems are at stake. In this framework, infrastructural systems, including power systems, represent a possible target due to the huge impact they can have on society. Malicious attacks are different in their nature from other more traditional cause of threats to power system, since they embed a strategic interaction between the attacker and the defender (characteristics that cannot be found in natural events or systemic failures). This difference has not been systematically analyzed by the existent literature. In this respect, new approaches and tools are needed. This paper presents a mixed-strategy game-theory model able to capture the strategic interactions between malicious agents that may be willing to attack power systems and the system operators, with its related bodies, that are in charge of defending them. At the game equilibrium, the different strategies of the two players, in terms of attacking/protecting the critical elements of the systems, can be obtained. The information about the attack probability to various elements can be used to assess the risk associated with each of them, and the efficiency of defense resource allocation is evidenced in terms of the corresponding risk. Reference defense plans related to the online defense action and the defense action with a time delay can be obtained according to their respective various time constraints. Moreover, risk sensitivity to the defense/attack-resource variation is also analyzed. The model is applied to a standard IEEE RTS-96 test system for illustrative purpose and, on the basis of that system, some peculiar aspects of the malicious attacks are pointed out.

[1]  Arkady B. Zaslavsky,et al.  Multiple-Agent Perspectives in Reasoning About Situations for Context-Aware Pervasive Computing Systems , 2008, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[2]  Jon Cauley,et al.  Intervention Policy Analysis of Skyjackings and Other Terrorist Incidents , 1988 .

[3]  Oded Berman,et al.  Location of terror response facilities: A game between state and terrorist , 2007, Eur. J. Oper. Res..

[4]  Todd Sandler,et al.  The calculus of dissent: An analysis of terrorists' choice of targets , 1988, Synthese.

[5]  Keith W. Hipel,et al.  Policy Equilibrium and Generalized Metarationalities for Multiple Decision-Maker Conflicts , 2007, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[6]  J. Arroyo,et al.  On the solution of the bilevel programming formulation of the terrorist threat problem , 2005, IEEE Transactions on Power Systems.

[7]  S. Corsi,et al.  General Blackout in Italy , 2003 .

[8]  V. Vittal,et al.  Online Risk-Based Security Assessment , 2002, IEEE Power Engineering Review.

[9]  Ling Wang,et al.  An Effective PSO-Based Hybrid Algorithm for Multiobjective Permutation Flow Shop Scheduling , 2008, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[10]  J. Salmeron,et al.  Analysis of electric grid security under terrorist threat , 2004, IEEE Transactions on Power Systems.

[11]  V. Vittal,et al.  Risk Assessment for Transformer Loading , 2001, IEEE Power Engineering Review.

[12]  N. Hadjsaid,et al.  Ranking Contingency Resulting from Terrorism by Utilization of Bayesian Networks , 2006, MELECON 2006 - 2006 IEEE Mediterranean Electrotechnical Conference.

[13]  Mohammad Shahidehpour,et al.  The IEEE Reliability Test System-1996. A report prepared by the Reliability Test System Task Force of the Application of Probability Methods Subcommittee , 1999 .

[14]  Harvey E. Lapan,et al.  To Bargain or Not to Bargain: That is the Question , 1988 .

[15]  T. Sandler,et al.  A Theoretical Analysis of Transnational Terrorism , 1983, American Political Science Review.

[16]  Vicki M. Bier,et al.  Methodology for identifying near-optimal interdiction strategies for a power transmission system , 2007, Reliab. Eng. Syst. Saf..

[17]  James D. McCalley,et al.  Reliability of special protection systems , 1999 .

[18]  Reinhard Selten A Simple Game Model of Kidnapping , 1977 .

[19]  V. Vittal,et al.  Software Implementation of Online Risk-Based Security Assessment , 2002, IEEE Power Engineering Review.

[20]  Hui Ren,et al.  Long-Term Effect of the n-1 Criterion on Cascading Line Outages in an Evolving Power Transmission Grid , 2008, IEEE Transactions on Power Systems.

[21]  Åke J. Holmgren,et al.  Evaluating Strategies for Defending Electric Power Networks Against Antagonistic Attacks , 2007, IEEE Transactions on Power Systems.

[22]  S. Corsi,et al.  General blackout in Italy Sunday September 28, 2003, h. 03:28:00 , 2004, IEEE Power Engineering Society General Meeting, 2004..

[23]  Manoj Kumar Tiwari,et al.  Interactive Particle Swarm: A Pareto-Adaptive Metaheuristic to Multiobjective Optimization , 2008, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[24]  Todd Sandler,et al.  Counterterrorism , 2005 .

[25]  Ellen J. Bass,et al.  Human-Automated Judge Learning: A Methodology for Examining Human Interaction With Information Analysis Automation , 2008, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.