Cyber–physical risk modeling with imperfect cyber-attackers
نویسندگان
چکیده
We model the risk posed by a malicious cyber-attacker seeking to induce grid insecurity means of load redistribution attack, while explicitly acknowledging that such an actor would plausibly base its decision strategy on imperfect information. More specifically, we introduce novel formulation for cyber-attacker’s decision-making problem and analyze distribution decisions taken with randomly inaccurate data branch admittances or capacities, their respective impact. Our findings indicate admittance values most often lead suboptimal cyber-attacks still compromise security, capacity result in notably less effective attacks. also find common attacked cyber-assets affected physical-assets between all (random) cyber-attacks, which could be exploited preventive and/or corrective sense cyber–physical management.
منابع مشابه
Profiling cyber attackers using Case-based Reasoning
Computer security would arguably benefit from more information on the characteristics of the particular human attacker behind a security incident. Nevertheless, technical security mechanisms have always focused on the attack's characteristics rather than the attacker's. The latter is a challenging problem, as relevant data cannot easily be found. We argue that the cyber traces left by a human a...
متن کاملTesting a low-interaction honeypot against live cyber attackers
Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including s...
متن کاملUnderstanding Bifurcation of Slow Versus Fast Cyber-Attackers
Anecdotally, the distinction between fast “Smash-and-Grab” cyber-attacks on the one hand and slow attacks or “Advanced Persistent Threats” on the other hand is well known. In this article, we provide an explanation for this phenomenon as the outcome of an optimization from the perspective of the attacker. To this end, we model attacks as an interaction between an attacker and a defender and inf...
متن کاملCyber Risk Exposure and Prospects for Cyber Insurance
This study draws attention to the ubiquitous and borderless nature of cybercrime. It examines the prospect of introducing customized cyber insurance policy in the Nigerian market. As secondary data was not available, the study conducted a survey by administering three sets of questionnaire to purposively selected top executives in four Trade Groups that rely heavily on Internet transactions for...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electric Power Systems Research
سال: 2022
ISSN: ['1873-2046', '0378-7796']
DOI: https://doi.org/10.1016/j.epsr.2022.108437