Graphical Evolutionary Game Model of Virus-Based Intrusion to Power System for Long-Term Cyber-Security Risk Evaluation

被引:9
作者
Li, Boda [1 ]
Chen, Ying [1 ]
Huang, Shaowei [1 ]
Yao, Rui [2 ]
Xia, Yue [3 ]
Mei, Shengwei [1 ]
机构
[1] Tsinghua Univ, Dept Elect Engn, State Key Lab Power Syst, Beijing 100084, Peoples R China
[2] Argonne Natl Lab, Lemont, IL 60439 USA
[3] China Agr Univ, Dept Elect Engn, Beijing 100094, Peoples R China
基金
中国国家自然科学基金;
关键词
Cyber security; graphical evolutionary game; virus spread; substation risk assessment; OPTIMIZATION; NETWORKS; ATTACKS;
D O I
10.1109/ACCESS.2019.2958856
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Through virus-based reconnaissances, the attacker may compromise critical power substations and induce power outages. Meanwhile, the power system operator may conduct defensive measures to prevent virus-spreading. In this paper, a graphical evolutionary game model is developed to solve the equilibrium of competitions between virus propagations and countermeasures, which helps to evaluate the cyber-security risk of power systems under long-term virus-based intrusions. In the proposed game model, the virus is supposed to propagate itself in a cyber network connecting cyber nodes belonging to power substations. Each cyber node may play as an attacker or a defender according to its state. A death-birth rule is adopted to model probabilistic strategies and state transfers, which reflects the bounded rationality of the viruses. Then, an evolution dynamic equation is derived to obtain the portion of the infected substations when the equilibrium is reached, and simulation algorithm is also given to estimate the infection probability of each substation under the persistent virus-based intrusion. Assuming a virus may trip all breakers in the infected substation, the cyber-security risk is evaluated to identify system-level vulnerabilities. The IEEE 118-bus system with a layered cyber network is used for case studies. Test results validate the proposed model and provide further insights into the virus-based intrusion.
引用
收藏
页码:178605 / 178617
页数:13
相关论文
共 26 条
[11]  
Lee RM, 2016, Analysis of the Cyber Attack on the Ukrainian Power Grid
[12]   Total transfer capability computation for multi-area power systems [J].
Min, Liang ;
Abur, Ali .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2006, 21 (03) :1141-1147
[13]  
Nelson N., 2016, THESIS
[14]   Evolutionary dynamics of biological games [J].
Nowak, MA ;
Sigmund, K .
SCIENCE, 2004, 303 (5659) :793-799
[15]   Breaking the symmetry between interaction and replacement in evolutionary dynamics on graphs [J].
Ohtsuki, Hisashi ;
Nowak, Martin A. ;
Pacheco, Jorge M. .
PHYSICAL REVIEW LETTERS, 2007, 98 (10)
[16]   The replicator equation on graphs [J].
Ohtsuki, Hisashi ;
Nowak, Martin A. .
JOURNAL OF THEORETICAL BIOLOGY, 2006, 243 (01) :86-97
[17]   A simple rule for the evolution of cooperation on graphs and social networks [J].
Ohtsuki, Hisashi ;
Hauert, Christoph ;
Lieberman, Erez ;
Nowak, Martin A. .
NATURE, 2006, 441 (7092) :502-505
[18]   Epidemic spreading in scale-free networks [J].
Pastor-Satorras, R ;
Vespignani, A .
PHYSICAL REVIEW LETTERS, 2001, 86 (14) :3200-3203
[19]  
Vamvoudakis KG, 2012, IEEE DECIS CONTR P, P7133, DOI 10.1109/CDC.2012.6426383
[20]   Determination of Nash Equilibrium Based on Plausible Attack-Defense Dynamics [J].
Wang, Chong ;
Hou, Yunhe ;
Ten, Chee-Wooi .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2017, 32 (05) :3670-3680