Abstract
In the last decade, the power grid has increasingly relied on the communication infrastructure for the management and control of grid operations. In a previous work, we proposed an analytical model for identifying and hardening the most critical communication equipment used in the power system. Using non-cooperative game theory, we modeled the interactions between an attacker and a defender and derived the minimum defense resources required and the optimal strategy of the defender that minimizes the risk on the power system. In this paper, we aim at validating the model using data derived from real-world existing systems. In particular, we propose a methodology to assess the values of the parameters used in the analytical model to evaluate the impact of equipment failures in the power system and attacks in the communication infrastructure. Using this methodology, we then validate our model via a case study based on the polish electric power transmission system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Li, W.: Risk Assessment of Power Systems: Models, Methods, and Applications. Wiley-IEEE Press, New York (2005)
Agence Nationale de la sécurité des systèmes d’information. EBIOS Risk Management Method (2010). http://www.ssi.gouv.fr/IMG/pdf/EBIOS-1-GuideMethodologique-2010-01-25.pdf
Laprie, J., Kanoun, K., Kaniche, M.: Modeling interdependencies between the electricity and information infrastructures. In: SAFECOMP, pp. 54–67 (2007)
Buldyrev, S., Parshani, R., Paul, G., Stanley, H.E., Havlin, S.: Catastrophic cascade of failures in interdependent networks. Nature 464, 1025–1028 (2010)
Casalicchio, E., Galli, E., Tucci, S.: Federated agent-based modeling and simulation approach to study interdependencies in it critical infrastructures. In: IEEE 11th International Symposium on Distributed Simulation and Real-Time Applications, pp. 182–189 (2007)
Chen, T., Sanchez-Aarnoutse, J., Buford, J.: Petri net modeling of cyber-physical attacks on smart grid. IEEE Trans. Smart Grid 2(4), 741–749 (2011)
Lin, H., Veda, S.S., Shukla, S.K., Mili, L., Thorp, J.S.: GECO: global event-driven co-simulation framework for interconnected power system and communication network. IEEE Trans. Smart Grid 3(3), 1444–1456 (2012)
Law, Y.W., Alpcan, T., Palaniswami, M.: Security games for voltage control in smart grid. In: 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp. 212–219 (2012)
Amin, S., Schwartz, G., Hussain, A.: In quest of benchmarking security risks to cyber-physical systems. IEEE Netw. 27(1), 19–24 (2013)
Ismail, Z., Leneutre, J., Bateman, D., Chen, L.: A game-theoretical model for security risk management of interdependent ict and electrical infrastructures. In: IEEE 16th International Symposium on High Assurance Systems Engineering (HASE), pp. 101–109 (2015)
Alpcan, T., Bambos, N.: Modeling dependencies in security risk management. In: Proceedings of the 4th International Conference on Risks and Security of Internet and Systems (Crisis) (2009)
Osborne, M.J., Rubinstein, A.: A Course in Game Theory. MIT Press, Cambridge (1994)
Zhu, J.: Optimization of Power System Operation. Wiley-IEEE Press, Hoboken (2009)
Pfitzner, R., Turitsyn, K., Chertkov, M.: Statistical classification of cascading failures in power grids. In: 2011 IEEE Power and Energy Society General Meeting, pp. 1–8 (2011)
Zimmerman, R., Murillo-Snchez, C., Thomas, R.: Matpower: steady-state operations, planning, and analysis tools for power systems research and education. IEEE Trans. Power Syst. 26(1), 12–19 (2011)
Ingols, K., Lippmann, R., Piwowarski, K.: Practical attack graph generation for network defense. In: 22nd Annual Computer Security Applications Conference (ACSAC), pp. 121–130 (2006)
Ismail, Z., Leneutre, J., Fourati, A.: An attack execution model for industrial control systems security assessment. In: Proceedings of the First Conference on Cybersecurity of Industrial Control Systems (CyberICS) (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Ismail, Z., Leneutre, J., Bateman, D., Chen, L. (2016). A Methodology to Apply a Game Theoretic Model of Security Risks Interdependencies Between ICT and Electric Infrastructures. In: Zhu, Q., Alpcan, T., Panaousis, E., Tambe, M., Casey, W. (eds) Decision and Game Theory for Security. GameSec 2016. Lecture Notes in Computer Science(), vol 9996. Springer, Cham. https://doi.org/10.1007/978-3-319-47413-7_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-47413-7_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-47412-0
Online ISBN: 978-3-319-47413-7
eBook Packages: Computer ScienceComputer Science (R0)