Risk assessment of malicious attacks against power systems

  • Authors:
  • Ettore Bompard;Ciwei Gao;Roberto Napoli;Angela Russo;Marcelo Masera;Alberto Stefanini

  • Affiliations:
  • Politecnico di Torino, Torino, Italy and Institute for Economic Research Firms and Growth, CERIS, CNR, National Research Council, Mancalieri, TO, Italy;School of Electrical Engineering, Southeast University, Nanjing, China;Politecnico di Torino, Torino, Italy;Politecnico di Torino, Torino, Italy;Institute for the Protection and Security of the Citizen, Joint Research Centre, European Commission, Ispra, Italy;Institute for the Protection and Security of the Citizen, Joint Research Centre, European Commission, Ispra, Italy

  • Venue:
  • IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

The new scenarios of malicious attack prompt for their deeper consideration and mainly when critical systems are at stake. In this framework, infrastructural systems, including power systems, represent a possible target due to the huge impact they can have on society. Malicious attacks are different in their nature from other more traditional cause of threats to power system, since they embed a strategic interaction between the attacker and the defender (characteristics that cannot be found in natural events or systemic failures). This difference has not been systematically analyzed by the existent literature. In this respect, new approaches and tools are needed. This paper presents a mixed-strategy game-theory model able to capture the strategic interactions between malicious agents that may be willing to attack power systems and the system operators, with its related bodies, that are in charge of defending them. At the game equilibrium, the different strategies of the two players, in terms of attacking/ protecting the critical elements of the systems, can be obtained. The information about the attack probability to various elements can be used to assess the risk associated with each of them, and the efficiency of defense resource allocation is evidenced in terms of the corresponding risk. Reference defense plans related to the online defense action and the defense action with a time delay can be obtained according to their respective various time constraints. Moreover, risk sensitivity to the defense/attack-resource variation is also analyzed. The model is applied to a standard IEEE RTS-96 test system for illustrative purpose and, on the basis of that system, some peculiar aspects of the malicious attacks are pointed out.