Skip to main content

A Methodology to Apply a Game Theoretic Model of Security Risks Interdependencies Between ICT and Electric Infrastructures

  • Conference paper
  • First Online:
Decision and Game Theory for Security (GameSec 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9996))

Included in the following conference series:

Abstract

In the last decade, the power grid has increasingly relied on the communication infrastructure for the management and control of grid operations. In a previous work, we proposed an analytical model for identifying and hardening the most critical communication equipment used in the power system. Using non-cooperative game theory, we modeled the interactions between an attacker and a defender and derived the minimum defense resources required and the optimal strategy of the defender that minimizes the risk on the power system. In this paper, we aim at validating the model using data derived from real-world existing systems. In particular, we propose a methodology to assess the values of the parameters used in the analytical model to evaluate the impact of equipment failures in the power system and attacks in the communication infrastructure. Using this methodology, we then validate our model via a case study based on the polish electric power transmission system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Li, W.: Risk Assessment of Power Systems: Models, Methods, and Applications. Wiley-IEEE Press, New York (2005)

    Google Scholar 

  2. Agence Nationale de la sécurité des systèmes d’information. EBIOS Risk Management Method (2010). http://www.ssi.gouv.fr/IMG/pdf/EBIOS-1-GuideMethodologique-2010-01-25.pdf

  3. Laprie, J., Kanoun, K., Kaniche, M.: Modeling interdependencies between the electricity and information infrastructures. In: SAFECOMP, pp. 54–67 (2007)

    Google Scholar 

  4. Buldyrev, S., Parshani, R., Paul, G., Stanley, H.E., Havlin, S.: Catastrophic cascade of failures in interdependent networks. Nature 464, 1025–1028 (2010)

    Article  Google Scholar 

  5. Casalicchio, E., Galli, E., Tucci, S.: Federated agent-based modeling and simulation approach to study interdependencies in it critical infrastructures. In: IEEE 11th International Symposium on Distributed Simulation and Real-Time Applications, pp. 182–189 (2007)

    Google Scholar 

  6. Chen, T., Sanchez-Aarnoutse, J., Buford, J.: Petri net modeling of cyber-physical attacks on smart grid. IEEE Trans. Smart Grid 2(4), 741–749 (2011)

    Article  Google Scholar 

  7. Lin, H., Veda, S.S., Shukla, S.K., Mili, L., Thorp, J.S.: GECO: global event-driven co-simulation framework for interconnected power system and communication network. IEEE Trans. Smart Grid 3(3), 1444–1456 (2012)

    Article  Google Scholar 

  8. Law, Y.W., Alpcan, T., Palaniswami, M.: Security games for voltage control in smart grid. In: 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp. 212–219 (2012)

    Google Scholar 

  9. Amin, S., Schwartz, G., Hussain, A.: In quest of benchmarking security risks to cyber-physical systems. IEEE Netw. 27(1), 19–24 (2013)

    Article  Google Scholar 

  10. Ismail, Z., Leneutre, J., Bateman, D., Chen, L.: A game-theoretical model for security risk management of interdependent ict and electrical infrastructures. In: IEEE 16th International Symposium on High Assurance Systems Engineering (HASE), pp. 101–109 (2015)

    Google Scholar 

  11. Alpcan, T., Bambos, N.: Modeling dependencies in security risk management. In: Proceedings of the 4th International Conference on Risks and Security of Internet and Systems (Crisis) (2009)

    Google Scholar 

  12. Osborne, M.J., Rubinstein, A.: A Course in Game Theory. MIT Press, Cambridge (1994)

    MATH  Google Scholar 

  13. Zhu, J.: Optimization of Power System Operation. Wiley-IEEE Press, Hoboken (2009)

    Book  Google Scholar 

  14. Pfitzner, R., Turitsyn, K., Chertkov, M.: Statistical classification of cascading failures in power grids. In: 2011 IEEE Power and Energy Society General Meeting, pp. 1–8 (2011)

    Google Scholar 

  15. Zimmerman, R., Murillo-Snchez, C., Thomas, R.: Matpower: steady-state operations, planning, and analysis tools for power systems research and education. IEEE Trans. Power Syst. 26(1), 12–19 (2011)

    Article  Google Scholar 

  16. Ingols, K., Lippmann, R., Piwowarski, K.: Practical attack graph generation for network defense. In: 22nd Annual Computer Security Applications Conference (ACSAC), pp. 121–130 (2006)

    Google Scholar 

  17. Ismail, Z., Leneutre, J., Fourati, A.: An attack execution model for industrial control systems security assessment. In: Proceedings of the First Conference on Cybersecurity of Industrial Control Systems (CyberICS) (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ziad Ismail .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Ismail, Z., Leneutre, J., Bateman, D., Chen, L. (2016). A Methodology to Apply a Game Theoretic Model of Security Risks Interdependencies Between ICT and Electric Infrastructures. In: Zhu, Q., Alpcan, T., Panaousis, E., Tambe, M., Casey, W. (eds) Decision and Game Theory for Security. GameSec 2016. Lecture Notes in Computer Science(), vol 9996. Springer, Cham. https://doi.org/10.1007/978-3-319-47413-7_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-47413-7_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-47412-0

  • Online ISBN: 978-3-319-47413-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics