Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2667190.2667195acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Adaptive Defending Strategy for Smart Grid Attacks

Published: 07 November 2014 Publication History

Abstract

One active area of research in smart grid security focuses on applying game-theoretic frameworks to analyze interactions between a system and an attacker and formulate effective defense strategies. In previous work, a Nash equilibrium (NE) solution is chosen as the optimal defense strategy, which [7, 9] implies that the attacker has complete knowledge of the system and would also employ the corresponding NE strategy. In practice, however, the attacker may have limited knowledge and resources, and thus employ an attack which is less than optimal, allowing the defender to devise more efficient strategies.
We propose a novel approach called an adaptive Markov Strategy (AMS) for defending a system against attackers with unknown, dynamic behaviors. The algorithm for computing an AMS is theoretically guaranteed to converge to a best response strategy against any stationary attacker, and also converge to a Nash equilibrium if the attacker is sufficiently intelligent to employ the AMS to launch the attack. To evaluate the effectiveness of an AMS in smart grid systems, we study a class of data integrity attacks that involve injecting false voltage information into a substation, with the goal of causing load shedding (and potentially a blackout). Our preliminary results show that the amount of load shedding costs can be significantly reduced by employing an AMS over a NE strategy.

References

[1]
SimPowerSystems documentation: D-STATCOM (Average Model), 2014. http://www.mathworks.com/help/physmod/sps/examples_v2/d-statcom-average-model.html.
[2]
Michael Bowling and Manuela Veloso. Convergence of gradient dynamics with a variable learning rate. In ICML, pages 27--34, 2001.
[3]
Gerald Brown, Matthew Carlyle, Javier Salmerón, and Kevin Wood. Defending critical infrastructure. Interfaces, 36(6):530--544, 2006.
[4]
Vincent Conitzer and Tuomas Sandholm. Awesome: A general multiagent learning algorithm that converges in self-play and learns a best response against stationary opponents. Machine Learning, 67(1--2):23--43, 2007.
[5]
Stanley C Eisenstat, Howard C Elman, and Martin H Schultz. Variational iterative methods for nonsymmetric systems of linear equations. SIAM Journal on Numerical Analysis, 20(2):345--357, 1983.
[6]
James P Farwell and Rafal Rohozinski. Stuxnet and the future of cyber war. Survival, 53(1):23--40, 2011.
[7]
Yee Wei Law, Tansu Alpcan, and Marimuthu Palaniswami. Security games for voltage control in smart grid. In Communication, Control, and Computing (Allerton), 2012 50th Annual Allerton Conference on, pages 212--219, 2012.
[8]
M. Littman. Markov games as a framework for multi-agent reinforcement learning. In Proceedings of ICML'94, pages 322--328, 1994.
[9]
Chris YT Ma, David KY Yau, Xin Lou, and Nageswara SV Rao. Markov game analysis for attack-defense of power networks under possible misinformation. Power Systems, IEEE Transactions on, 28(2):1676--1686, 2013.
[10]
Ali Pinar, Juan Meza, Vaibhav Donde, and Bernard Lesieutre. Optimization strategies for the vulnerability analysis of the electric power grid. SIAM Journal on Optimization, 20(4):1786--1810, 2010.
[11]
Walid Saad, Zhu Han, H Vincent Poor, and Tamer Basar. Game-theoretic methods for the smart grid: An overview of microgrid systems, demand-side management, and smart grid communications. Signal Processing Magazine, IEEE, 29(5):86--105, 2012.
[12]
Javier Salmeron, Kevin Wood, and Ross Baldick. Analysis of electric grid security under terrorist threat. 2004.
[13]
Olivier Sigaud and Olivier Buffet. Markov decision processes in artificial intelligence. John Wiley & Sons, 2013.

Cited By

View all
  • (2019)Adaptive Cybersecurity Framework for Healthcare Internet of Things2019 13th International Symposium on Medical Information and Communication Technology (ISMICT)10.1109/ISMICT.2019.8743905(1-6)Online publication date: May-2019
  • (2019)An unsupervised strategy for defending against multifarious reputation attacksApplied Intelligence10.1007/s10489-019-01490-949:12(4189-4210)Online publication date: 25-May-2019
  • (2018)A stochastic game approach to cyber-physical security with applications to smart gridIEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)10.1109/INFCOMW.2018.8406833(33-38)Online publication date: Apr-2018
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SEGS '14: Proceedings of the 2nd Workshop on Smart Energy Grid Security
November 2014
60 pages
ISBN:9781450331548
DOI:10.1145/2667190
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 November 2014

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. adaptive learning
  2. data injection
  3. markov games
  4. smart grid security

Qualifiers

  • Research-article

Conference

CCS'14
Sponsor:

Acceptance Rates

SEGS '14 Paper Acceptance Rate 7 of 11 submissions, 64%;
Overall Acceptance Rate 19 of 38 submissions, 50%

Upcoming Conference

CCS '24
ACM SIGSAC Conference on Computer and Communications Security
October 14 - 18, 2024
Salt Lake City , UT , USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)9
  • Downloads (Last 6 weeks)1
Reflects downloads up to 30 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2019)Adaptive Cybersecurity Framework for Healthcare Internet of Things2019 13th International Symposium on Medical Information and Communication Technology (ISMICT)10.1109/ISMICT.2019.8743905(1-6)Online publication date: May-2019
  • (2019)An unsupervised strategy for defending against multifarious reputation attacksApplied Intelligence10.1007/s10489-019-01490-949:12(4189-4210)Online publication date: 25-May-2019
  • (2018)A stochastic game approach to cyber-physical security with applications to smart gridIEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)10.1109/INFCOMW.2018.8406833(33-38)Online publication date: Apr-2018
  • (2017)Fuel and energy system control at large-scale damages. 1. Network model and software implementationJournal of Computer and Systems Sciences International10.1134/S106423071706009056:6(945-968)Online publication date: 1-Nov-2017

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media