Optimal Adaptive Coordinated Cyber-Attacks on Power Grids using ∊-Greedy Method

The future power grid is supported by Information and Communication Technology, which also exposes it to cyber-attacks. In particular, Coordinated Cyber-Attacks (CCAs) are highly threatening and difficult to defend against. In this paper, we propose a stochastic game model to capture the interaction between attackers and the grid operator. In particular, we consider the most vicious CCAs, which intend to cause cascading power blackouts, through a non-cooperative zero-sum game. The CCA attack vector is derived with the Multi-Armed Bandit E-Greedy method. Distinct from few existing studies on CCAs, the attack model is more realistic in twofold: (i) it does not assume attackers with prior knowledge of the power grid, and (ii) attackers could adapt their strategies in response to defense actions. The result of this paper provides important implications in defense resource allocation and cybersecurity infrastructure reinforcement in the power grid. The proposed model and the attack vector is validated using the New England 39 bus power system model.

[1]  Lalitha Sankar,et al.  Physical System Consequences of Unobservable State-and-Topology Cyber-Physical Attacks , 2016, IEEE Transactions on Smart Grid.

[2]  Mehryar Mohri,et al.  Multi-armed Bandit Algorithms and Empirical Evaluation , 2005, ECML.

[3]  Walid Saad,et al.  Stochastic Games for Power Grid Protection Against Coordinated Cyber-Physical Attacks , 2018, IEEE Transactions on Smart Grid.

[4]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[5]  Nicolò Cesa-Bianchi,et al.  Gambling in a rigged casino: The adversarial multi-armed bandit problem , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.

[6]  Gabor Karsai,et al.  Vulnerability analysis of power systems based on cyber-attack and defense models , 2018, 2018 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT).

[7]  Zuyi Li,et al.  Quantitative Analysis of Load Redistribution Attacks in Power Systems , 2012, IEEE Transactions on Parallel and Distributed Systems.

[8]  Lingfeng Wang,et al.  A robust optimaiztion-based strategy for optimal power system protection considering uncertainties , 2017, 2017 IEEE Power & Energy Society General Meeting.

[9]  Sabina Jeschke,et al.  Smart Cities: Foundations, Principles, and Applications , 2017 .

[10]  Qian Chen,et al.  Challenge and evolution of cyber attacks in Cyber Physical Power System , 2016, 2016 IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC).

[11]  Keyu Chen,et al.  Game Theory Based Power System Security Analysis , 2011, 2011 International Conference on Control, Automation and Systems Engineering (CASE).

[12]  Dorian Mazauric,et al.  Cascading failures in power grids: analysis and algorithms , 2014, e-Energy.