Cyber-physical risk modeling with imperfect cyber-attackers

10/01/2021
by   Efthymios Karangelos, et al.
0

We model the risk posed by a malicious cyber-attacker seeking to induce grid insecurity by means of a load redistribution attack, while explicitly acknowledging that such an actor would plausibly base its decision strategy on imperfect information. More specifically, we introduce a novel formulation for the cyber-attacker's decision-making problem and analyze the distribution of decisions taken with randomly inaccurate data on the grid branch admittances or capacities, and the distribution of their respective impact. Our findings indicate that inaccurate admittance values most often lead to suboptimal cyber-attacks that still compromise the grid security, while inaccurate capacity values result in notably less effective attacks. We also find common attacked cyber-assets and common affected physical-assets between all (random) imperfect cyber-attacks, which could be exploited in a preventive and/or corrective sense for effective cyber-physical risk management.

READ FULL TEXT
research
06/05/2019

Investigation of Cyber Attacks on a Water Distribution System

A Cyber Physical System (CPS) consists of cyber components for computati...
research
06/27/2018

Towards a formal notion of impact metric for cyber-physical attacks (full version)

Industrial facilities and critical infrastructures are transforming into...
research
09/29/2019

The Social and Psychological Impact of Cyber-Attacks

Cyber-attacks have become as commonplace as the Internet itself. Each ye...
research
08/29/2021

Risk-Aware Fine-Grained Access Control in Cyber-Physical Contexts

Access to resources by users may need to be granted only upon certain co...
research
10/10/2020

A Distributed Hierarchy Framework for Enhancing Cyber Security of Control Center Applications

Recent cyber-attacks on power grids highlight the necessity to protect t...
research
10/01/2021

Dynamics of targeted ransomware negotiations

In this paper, we consider how the development of targeted ransomware ha...
research
02/16/2023

Cyber-risk Perception and Prioritization for Decision-Making and Threat Intelligence

Cyber-risk assessment is gaining momentum due to the wide range of resea...

Please sign up or login with your details

Forgot password? Click here to reset