Cyber–physical risk modeling with imperfect cyber-attackers

نویسندگان

چکیده

We model the risk posed by a malicious cyber-attacker seeking to induce grid insecurity means of load redistribution attack, while explicitly acknowledging that such an actor would plausibly base its decision strategy on imperfect information. More specifically, we introduce novel formulation for cyber-attacker’s decision-making problem and analyze distribution decisions taken with randomly inaccurate data branch admittances or capacities, their respective impact. Our findings indicate admittance values most often lead suboptimal cyber-attacks still compromise security, capacity result in notably less effective attacks. also find common attacked cyber-assets affected physical-assets between all (random) cyber-attacks, which could be exploited preventive and/or corrective sense cyber–physical management.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Profiling cyber attackers using Case-based Reasoning

Computer security would arguably benefit from more information on the characteristics of the particular human attacker behind a security incident. Nevertheless, technical security mechanisms have always focused on the attack's characteristics rather than the attacker's. The latter is a challenging problem, as relevant data cannot easily be found. We argue that the cyber traces left by a human a...

متن کامل

Testing a low-interaction honeypot against live cyber attackers

Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including s...

متن کامل

Understanding Bifurcation of Slow Versus Fast Cyber-Attackers

Anecdotally, the distinction between fast “Smash-and-Grab” cyber-attacks on the one hand and slow attacks or “Advanced Persistent Threats” on the other hand is well known. In this article, we provide an explanation for this phenomenon as the outcome of an optimization from the perspective of the attacker. To this end, we model attacks as an interaction between an attacker and a defender and inf...

متن کامل

Cyber Risk Exposure and Prospects for Cyber Insurance

This study draws attention to the ubiquitous and borderless nature of cybercrime. It examines the prospect of introducing customized cyber insurance policy in the Nigerian market. As secondary data was not available, the study conducted a survey by administering three sets of questionnaire to purposively selected top executives in four Trade Groups that rely heavily on Internet transactions for...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Electric Power Systems Research

سال: 2022

ISSN: ['1873-2046', '0378-7796']

DOI: https://doi.org/10.1016/j.epsr.2022.108437