A Diversity-based Substation Cyber Defense Strategy utilizing Coloring Games

by   Md Touhiduzzaman, et al.

Growing cybersecurity risks in the power grid require that utilities implement a variety of security mechanism (SM) composed mostly of VPNs, firewalls, or other custom security components. While they provide some protection, they might contain software vulnerabilities which can lead to a cyber-attack. In this paper, the severity of a cyber-attack has been decreased by employing a diverse set of SM that reduce repetition of a single vulnerability. This paper focuses on the allocation of diverse SM and tries to increase the security of the cyber assets located within the electronic security perimeter(ESP) of a substation. We have used a graph-based coloring game in a distributed manner to allocate diverse SM for protecting the cyber assets. The vulnerability assessment for power grid network is also analyzed using this game theoretic method. An improved, diversified SMs for worst-case scenario has been demonstrated by reaching the Nash equilibrium of graph coloring game. As a case study, we analyze the IEEE-14 and IEEE-118 bus system, observe the different distributed coloring algorithm for allocating diverse SM and calculating the overall network criticality.


page 2

page 6

page 7


Implementing Man-in-the-Middle Attack to Investigate Network Vulnerabilities in Smart Grid Test-bed

The smart-grid introduces several new data-gathering, communication, and...

Attack-Defense Quantification Based On Game-Theory

With the developing of the attack and defense technology, the cyber envi...

Moving-Target Defense Against Cyber-Physical Attacks in Power Grids via Game Theory

This work proposes a moving target defense (MTD) strategy to detect coor...

A Bi-Level Stochastic Game Model for PMU Placement in Power Grid with Cybersecurity Risks

Phasor measurement units (PMUs) provide accurate and high-fidelity measu...

A Stackelberg Security Investment Game for Voltage Stability of Power Systems

We formulate a Stackelberg game between an attacker and a defender of a ...

Boundary Defense against Cyber Threat for Power System Operation

The operation of power grids is becoming increasingly data-centric. Whil...

Please sign up or login with your details

Forgot password? Click here to reset