Optimal power grid protection through a defender-attacker-defender model

被引:152
|
作者
Yuan, Wei [1 ]
Zhao, Long [1 ]
Zeng, Bo [1 ]
机构
[1] Univ S Florida, Dept Ind & Management Syst Engn, Tampa, FL 33620 USA
关键词
Power grid protection; Defender-attacker-defender model; Column-and-Constraint Generation method; IDENTIFICATION; OPTIMIZATION; METHODOLOGY; SECURITY;
D O I
10.1016/j.ress.2013.08.003
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Power grid vulnerability is a major concern of our society, and its protection problem is often formulated as a tri-level defender-attacker-defender model. However, this tri-level problem is computationally challenging. In this paper, we design and implement a Column-and-Constraint Generation algorithm to derive its optimal solutions. Numerical results on an IEEE system show that: (i) the developed algorithm identifies optimal solutions in a reasonable time, which significantly outperforms the existing exact algorithm; (ii) the attack solution obtained through solving the attacker-defender model does not lead to the optimal protection plan in general; and (iii) protection using the optimal solution from the defender-attacker-defender model always improves the grid survivability under contingencies. The proposed model and algorithm can be easily modified to accommodate for other critical infrastructure network protection problems. (C) 2013 Elsevier Ltd. All rights reserved.
引用
收藏
页码:83 / 89
页数:7
相关论文
共 50 条
  • [21] A general defender-attacker risk model for networks
    Al Mannai, W. I.
    Lewis, T. G.
    JOURNAL OF RISK FINANCE, 2008, 9 (03) : 244 - 261
  • [22] Resolving attacker-defender conflicts through intergroup negotiation
    Halevy, Nir
    BEHAVIORAL AND BRAIN SCIENCES, 2019, 42
  • [23] APT RPG: Design of a Gamified Attacker/Defender Meta Model
    Luh, Robert
    Temper, Marlies
    Tjoa, Simon
    Schrittwieser, Sebastian
    ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, : 526 - 537
  • [24] A Strategic Analysis of Attacker-Defender Repeated Game in Smart Grid Security
    Paul, Shuva
    Ni, Zhen
    2019 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT), 2019,
  • [25] Optimal Target Capture Strategies in the Target-Attacker-Defender Differential Game
    Garcia, Eloy
    Casbeer, David W.
    Pachter, Meir
    2018 ANNUAL AMERICAN CONTROL CONFERENCE (ACC), 2018, : 68 - 73
  • [26] A Bilevel “Attacker-Defender” Model to Choosing the Composition of Attack Means
    Beresnev V.L.
    Melnikov A.A.
    Journal of Applied and Industrial Mathematics, 2019, 13 (04) : 612 - 622
  • [27] An attacker-defender model for analyzing the vulnerability of initial attack in wildfire suppression
    Rashidi, Eghbal
    Medal, Hugh
    Hoskins, Aaron
    NAVAL RESEARCH LOGISTICS, 2018, 65 (02) : 120 - 134
  • [28] PenQuest: a gamified attacker/defender meta model for cyber security assessment and education
    Luh, Robert
    Temper, Marlies
    Tjoa, Simon
    Schrittwieser, Sebastian
    Janicke, Helge
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2020, 16 (01) : 19 - 61
  • [29] Cyber security based on mean field game model of the defender: Attacker strategies
    Miao, Li
    Li, Shuai
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (10): : 1 - 8
  • [30] Defender Vs Attacker Security Game Model for an Optimal Solution to Co-resident DoS Attack in Cloud
    Rethishkumar, S.
    Vijayakumar, R.
    INTELLIGENT COMMUNICATION TECHNOLOGIES AND VIRTUAL MOBILE NETWORKS, ICICV 2019, 2020, 33 : 527 - 537