Title: Risk Assessment of Malicious Attacks Against Power Systems
Authors: MASERA MarceloSTEFANINI AlbertoBOMPARD EttoreNAPOLI RobertoGAO CiweiRUSSO Angela
Citation: IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS vol. 39 no. 5 p. 1074-1085
Publisher: IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
Publication Year: 2009
JRC N°: JRC56961
ISSN: 1083-4427
URI: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5164937&isnumber=5208652
http://publications.jrc.ec.europa.eu/repository/handle/JRC56961
DOI: 10.1109/TSMCA.2009.2020687
Type: Articles in Journals
Abstract: The new scenarios of malicious attack prompt for their deeper consideration and mainly when critical systems are at stake. In this framework, infrastructural systems, including power systems, represent a possible target due to the huge impact they can have on society. Malicious attacks are different in their nature from other more traditional cause of threats to power system, since they embed a strategic interaction between the attacker and the defender (characteristics that cannot be found in natural events or systemic failures). This difference has not been systematically analyzed by the existent literature. In this respect, new approaches and tools are needed. This paper presents a mixed-strategy game-theory model able to capture the strategic interactions betweenmalicious agents thatmay be willing to attack power systems and the system operators, with its related bodies, that are in charge of defending them. At the game equilibrium, the different strategies of the two players, in terms of attacking/ protecting the critical elements of the systems, can be obtained. The information about the attack probability to various elements can be used to assess the risk associated with each of them, and the efficiency of defense resource allocation is evidenced in terms of the corresponding risk. Reference defense plans related to the online defense action and the defense action with a time delay can be obtained according to their respective various time constraints. Moreover, risk sensitivity to the defense/attack-resource variation is also analyzed. The model is applied to a standard IEEE RTS-96 test system for illustrative purpose and, on the basis of that system, some peculiar aspects of the malicious attacks are pointed out.
JRC Institute:Institute for the Protection and Security of the Citizen

Files in This Item:
There are no files associated with this item.


Items in repository are protected by copyright, with all rights reserved, unless otherwise indicated.