Vulnerability analysis of power systems based on cyber-attack and defense models

Reliable operation of power systems is a primary challenge for the system operators. With the advancement in technology and grid automation, power systems are becoming more vulnerable to cyber-attacks. The main goal of adversaries is to take advantage of these vulnerabilities and destabilize the system. This paper describes a game-theoretic approach to attacker / defender modeling in power systems. In our models, the attacker can strategically identify the subset of substations that maximize damage when compromised. However, the defender can identify the critical subset of substations to protect in order to minimize the damage when an attacker launches a cyber-attack. The algorithms for these models are applied to the standard IEEE-14, 39, and 57 bus examples to identify the critical set of substations given an attacker and a defender budget.

[1]  Gabor Karsai,et al.  Heuristics-based approach for identifying critical N — k contingencies in power systems , 2017, 2017 Resilience Week (RWS).

[2]  Danda B. Rawat,et al.  Cyber security for smart grid systems: Status, challenges and perspectives , 2015, SoutheastCon 2015.

[3]  Jinping Hao,et al.  Sparse Malicious False Data Injection Attacks and Defense Mechanisms in Smart Grids , 2015, IEEE Transactions on Industrial Informatics.

[4]  Deepa Kundur,et al.  Impact of cyber attacks on transient stability of smart grids with voltage support devices , 2013, 2013 IEEE Power & Energy Society General Meeting.

[5]  Gabor Karsai,et al.  A simulation testbed for cascade analysis , 2017, 2017 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT).

[6]  Zuyi Li,et al.  Quantitative Analysis of Load Redistribution Attacks in Power Systems , 2012, IEEE Transactions on Parallel and Distributed Systems.

[7]  Ravishankar K. Iyer,et al.  Safety-critical cyber-physical attacks: analysis, detection, and mitigation , 2016, HotSoS.

[8]  Deepa Kundur,et al.  A Framework for Modeling Cyber-Physical Switching Attacks in Smart Grid , 2013, IEEE Transactions on Emerging Topics in Computing.

[9]  T. Pultarova,et al.  News Briefing: Cyber security - Ukraine grid hack is wake-up call for network operators , 2016 .

[10]  Jeffrey B. Roberts,et al.  Attack and Defend Tools for Remotely Accessible Control and Protection Equipment in Electric Power Systems , 2002 .

[11]  Volker Turau,et al.  Cascading failures caused by node overloading in complex networks , 2016, 2016 Joint Workshop on Cyber- Physical Security and Resilience in Smart Grids (CPSR-SG).

[12]  Eul Gyu Im,et al.  Man-in-the-Middle Attack Test-bed Investigating Cyber-security Vulnerabilities in Smart Grid SCADA Systems , 2012 .

[13]  Zhuo Lu,et al.  Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.

[14]  G. Manimaran,et al.  Data integrity attack and its impacts on voltage control loop in power grid , 2011, 2011 IEEE Power and Energy Society General Meeting.

[15]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.