Inferring adversarial behaviour in cyber-physical power systems using a Bayesian attack graph approach

被引:5
作者
Sahu, Abhijeet [1 ,2 ]
Davis, Katherine [1 ,2 ]
机构
[1] Texas A&M Univ, Elect & Comp Engn, College Stn, TX USA
[2] Texas A&M Univ, Elect & Comp Engn, 4200 Boyett St, Apt D, College Stn, TX 77843 USA
关键词
cyber-physical systems; directed graphs; power system security; uncertainty handling; SECURITY; FRAMEWORK;
D O I
10.1049/cps2.12047
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Highly connected smart power systems are subject to increasing vulnerabilities and adversarial threats. Defenders need to proactively identify and defend new high-risk access paths of cyber intruders that target grid resilience. However, cyber-physical risk analysis and defense in power systems often requires making assumptions on adversary behaviour, and these assumptions can be wrong. Thus, this work examines the problem of inferring adversary behaviour in power systems to improve risk-based defense and detection. To achieve this, a Bayesian approach for inference of the Cyber-Adversarial Power System (Bayes-CAPS) is proposed that uses Bayesian networks (BNs) to define and solve the inference problem of adversarial movement in the grid infrastructure towards targets of physical impact. Specifically, BNs are used to compute conditional probabilities to queries, such as the probability of observing an event given a set of alerts. Bayes-CAPS builds initial Bayesian attack graphs for realistic power system cyber-physical models. These models are adaptable using collected data from the system under study. Then, Bayes-CAPS computes the posterior probabilities of the occurrence of a security breach event in power systems. Experiments are conducted that evaluate algorithms based on time complexity, accuracy and impact of evidence for different scales and densities of network. The performance is evaluated and compared for five realistic cyber-physical power system models of increasing size and complexities ranging from 8 to 300 substations based on computation and accuracy impacts.
引用
收藏
页码:91 / 108
页数:18
相关论文
共 58 条
  • [1] Automated Generation of Attack Graphs Using NVD
    Aksu, M. Ugur
    Bicakci, Kemal
    Dilek, M. Hadi
    Ozbayoglu, A. Murat
    Tatli, E. Islam
    [J]. PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18), 2018, : 135 - 142
  • [2] Ankan A., PGMPY PYTHON LIB PRO
  • [3] Grid Structural Characteristics as Validation Criteria for Synthetic Networks
    Birchfield, Adam B.
    Xu, Ti
    Gegner, Kathleen M.
    Shetye, Komal S.
    Overbye, Thomas J.
    [J]. IEEE TRANSACTIONS ON POWER SYSTEMS, 2017, 32 (04) : 3258 - 3265
  • [4] Bringas Pablo Garcia, 2007, 2007 18th International Conference on Database and Expert Systems Applications, P365
  • [5] Cowell R., 2001, PROBABILISTIC NETWOR, V43
  • [6] Cyber Physical Resilient Energy Systems, TEST CAS
  • [7] Davis, 2021, INVITED POSITION PAP
  • [8] Davis K., 2016, IEEE-HKN: THE BRIDGE
  • [9] A Cyber-Physical Modeling and Assessment Framework for Power Grid Infrastructures
    Davis, Katherine R.
    Davis, Charles M.
    Zonouz, Saman A.
    Bobba, Rakesh B.
    Berthier, Robin
    Garcia, Luis
    Sauer, Peter W.
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2015, 6 (05) : 2464 - 2475
  • [10] Bucket elimination: A unifying framework for reasoning
    Dechter, R
    [J]. ARTIFICIAL INTELLIGENCE, 1999, 113 (1-2) : 41 - 85