{"id":5690,"date":"2022-10-04T16:42:00","date_gmt":"2022-10-04T16:42:00","guid":{"rendered":"https:\/\/new.www.purdue.edu\/newsroom\/?p=5690"},"modified":"2024-07-16T16:45:34","modified_gmt":"2024-07-16T16:45:34","slug":"as-ransomware-attacks-increase-new-algorithm-may-help-prevent-power-blackouts","status":"publish","type":"post","link":"https:\/\/www.purdue.edu\/newsroom\/2022\/Q4\/as-ransomware-attacks-increase-new-algorithm-may-help-prevent-power-blackouts","title":{"rendered":"As ransomware attacks increase, new algorithm may help prevent power blackouts"},"content":{"rendered":"<div class=\"purdue-initial-words-wrap\"><p class=\"purdue-initial-words\">WEST LAFAYETTE, Ind. &mdash;<\/p> \n<p><a href=\"https:\/\/www.bloomberg.com\/news\/features\/2022-01-26\/what-happens-when-russian-hackers-cyberattack-the-u-s-electric-power-grid\" target=\"_blank\" rel=\"noreferrer noopener\">Millions of people<\/a>\u00a0could suddenly lose electricity if a ransomware attack just slightly tweaked energy flow onto the U.S. power grid.\u00a0<\/p>\n<\/div>\n\n\n<p>No single power utility company has enough resources to protect the entire grid, but maybe all&nbsp;<a href=\"https:\/\/www.cfr.org\/backgrounder\/how-does-us-power-grid-work\" rel=\"noreferrer noopener\" target=\"_blank\">3,000 of the grid\u2019s utilities<\/a>&nbsp;could fill in the most crucial security gaps if there were a map showing where to prioritize their security investments.&nbsp;<\/p>\n\n\n\n<p>Purdue University researchers have developed an algorithm to create that map. Using this tool, regulatory authorities or cyber insurance companies could establish a framework that guides the security investments of power utility companies to parts of the grid at greatest risk of causing a blackout if hacked.<\/p>\n\n\n\n<p>Power grids are a type of&nbsp;<a href=\"https:\/\/www.cisa.gov\/critical-infrastructure-sectors\" rel=\"noreferrer noopener\" target=\"_blank\">critical infrastructure<\/a>, which is any network \u2013 whether physical like water systems or virtual like health care record keeping \u2013 considered essential to a country\u2019s function and safety. The&nbsp;<a href=\"https:\/\/www.cnet.com\/personal-finance\/crypto\/a-timeline-of-the-biggest-ransomware-attacks\/\" rel=\"noreferrer noopener\" target=\"_blank\">biggest ransomware attacks in history<\/a>&nbsp;have happened in the past year, affecting&nbsp;<a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-040a\" rel=\"noreferrer noopener\" target=\"_blank\">most sectors of critical infrastructure<\/a>&nbsp;in the U.S. such as&nbsp;<a href=\"https:\/\/www.nbcnews.com\/news\/us-news\/ransomware-hackers-find-vulnerable-target-us-grain-supply-rcna2702\" rel=\"noreferrer noopener\" target=\"_blank\">grain distribution systems<\/a>&nbsp;in the food and agriculture sector and the&nbsp;<a href=\"https:\/\/www.cnet.com\/news\/privacy\/fbi-says-darkside-hacking-group-responsible-for-pipeline-cyberattack\/\" rel=\"noreferrer noopener\" target=\"_blank\">Colonial Pipeline<\/a>, which carries fuel throughout the East Coast.<\/p>\n\n\n\n<p>With this trend in mind, Purdue researchers evaluated the algorithm in the context of various types of critical infrastructure in addition to the power sector. The goal is that the algorithm would help secure any large and complex infrastructure system against cyberattacks.&nbsp;<\/p>\n\n\n\n<p>\u201cMultiple companies own different parts of infrastructure. When ransomware hits, it affects lots of different pieces of technology owned by different providers, so that\u2019s what makes ransomware a problem at the state, national and even global level,\u201d said&nbsp;<a href=\"https:\/\/engineering.purdue.edu\/ECE\/People\/ptProfile?resource_id=3261\" rel=\"noreferrer noopener\" target=\"_blank\">Saurabh Bagchi<\/a>, a professor in the&nbsp;<a href=\"https:\/\/engineering.purdue.edu\/ECE\" rel=\"noreferrer noopener\" target=\"_blank\">Elmore Family School of Electrical and Computer Engineering<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/www.cerias.purdue.edu\/\" rel=\"noreferrer noopener\" target=\"_blank\">Center for Education and Research in Information Assurance and Security<\/a>&nbsp;at Purdue. \u201cWhen you are investing security money on large-scale infrastructures, bad investment decisions can mean your power grid goes out, or your telecommunications network goes out for a few days.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Protecting infrastructure from hacks by improving security investment decisions<\/strong><\/h2>\n\n\n\n<p>The researchers tested the algorithm in simulations of previously reported hacks to four infrastructure systems: a smart grid, industrial control system, e-commerce platform and web-based telecommunications network. They found that use of this algorithm results in the most optimal allocation of security investments for reducing the impact of a cyberattack.<\/p>\n\n\n\n<p>The team\u2019s findings appear in a paper presented at this year\u2019s&nbsp;<a href=\"https:\/\/www.computer.org\/csdl\/proceedings-article\/sp\/2022\/131600b535\/1CIO7F5lHxe\" rel=\"noreferrer noopener\" target=\"_blank\">IEEE Symposium on Security and Privacy<\/a>, the premier conference in the area of computer security. The team comprises Purdue professors Shreyas Sundaram and Timothy Cason and former PhD students Mustafa Abdallah and Daniel Woods.<\/p>\n\n\n\n<p>\u201cNo one has an infinite security budget. You must decide how much to invest in each of your assets so that you gain a bump in the security of the overall system,\u201d Bagchi said.<\/p>\n\n\n\n<p>The power grid, for example, is so interconnected that the security decisions of one power utility company can greatly impact the operations of other electrical plants. If the computers controlling one area\u2019s generators don\u2019t have adequate security protection, then a hack to those computers would disrupt energy flow to another area\u2019s generators, forcing them to shut down.<\/p>\n\n\n\n<p>Since not all of the grid\u2019s utilities have the same security budget, it can be hard to ensure that critical points of entry to the grid\u2019s controls get the most investment in security protection.<\/p>\n\n\n\n<p>The algorithm that Purdue researchers developed would incentivize each security decision maker to allocate security investments in a way that limits the cumulative damage a ransomware attack could cause. An attack on a single generator, for instance, would have less impact than an attack on the controls for a network of generators. Power utility companies would be incentivized to invest more in security measures for the controls over a network of generators rather than for the protection of a single generator.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Building an algorithm that considers the effects of human behavior<\/strong><\/h2>\n\n\n\n<p>Bagchi\u2019s research shows how to increase cybersecurity in ways that address the interconnected nature of critical infrastructure but don\u2019t require an overhaul of the entire infrastructure system to be implemented.<\/p>\n\n\n\n<p>As director of Purdue\u2019s&nbsp;<a href=\"https:\/\/engineering.purdue.edu\/CRISP\" rel=\"noreferrer noopener\" target=\"_blank\">Center for Resilient Infrastructures, Systems, and Processes<\/a>, Bagchi has worked with the U.S. Department of Defense, Northrop Grumman Corp., Intel Corp., Adobe Inc., Google LLC and IBM Corp. on adopting solutions from his research. Bagchi\u2019s work has revealed the advantages of establishing an automatic response to attacks and has led to key innovations against ransomware threats, such as more effective ways to&nbsp;<a href=\"https:\/\/dl.acm.org\/doi\/10.1016\/j.cose.2017.12.012\" rel=\"noreferrer noopener\" target=\"_blank\">make decisions about backing up data<\/a>.<\/p>\n\n\n\n<p>There\u2019s a compelling reason why incentivizing good security decisions would work, Bagchi said. He and his team designed the algorithm based on findings from the field of behavioral economics, which studies how people make decisions with money.<\/p>\n\n\n\n<p>\u201cBefore our work, not much computer security research had been done on how behaviors and biases affect the best defense mechanisms in a system. That\u2019s partly because humans are terrible at evaluating risk and an algorithm doesn\u2019t have any human biases,\u201d Bagchi said. \u201cBut for any system of reasonable complexity, decisions about security investments are almost always made with humans in the loop. For our algorithm, we explicitly consider the fact that different participants in an infrastructure system have different biases.\u201d<\/p>\n\n\n\n<p>To develop the algorithm, Bagchi\u2019s team started by playing a game. They ran a series of experiments analyzing how groups of students chose to protect fake assets with fake investments. As in past studies in behavioral economics, they found that most study participants guessed poorly which assets were the most valuable and should be protected from security attacks. Most study participants also tended to spread out their investments instead of allocating them to one asset even when they were told which asset is the most vulnerable to an attack.<\/p>\n\n\n\n<p>Using these findings, the researchers designed an algorithm that could work two ways: Either security decision makers pay a tax or fine when they make decisions that are less than optimal for the overall security of the system, or security decision makers receive a payment for investing in the most optimal manner.<\/p>\n\n\n\n<p>\u201cRight now, fines are levied as a reactive measure if there is a security incident. Fines or taxes don\u2019t have any relationship to the security investments or data of the different operators in critical infrastructure,\u201d Bagchi said.<\/p>\n\n\n\n<p>In the researchers\u2019 simulations of real-world infrastructure systems, the algorithm successfully minimized the likelihood of losing assets to an attack that would decrease the overall security of the infrastructure system.<\/p>\n\n\n\n<p>Bagchi\u2019s research group is working to make the algorithm more scalable and able to adapt to an attacker who may make multiple attempts to hack into a system. The researchers\u2019 work on the algorithm is funded by the National Science Foundation, the Wabash Heartland Innovation Network and the Army Research Lab.&nbsp;<\/p>\n\n\n\n<p>Cybersecurity is an area of focus through Purdue\u2019s&nbsp;<a href=\"https:\/\/www.purdue.edu\/newsroom\/releases\/2021\/Q2\/purdue-launches-next-moves-initiatives.html\" rel=\"noreferrer noopener\" target=\"_blank\">Next Moves<\/a>, a set of initiatives that works to address some of the greatest technology challenges facing the U.S. Purdue\u2019s cybersecurity experts&nbsp;<a href=\"https:\/\/www.purdue.edu\/newsroom\/releases\/2022\/Q2\/purdue-cybersecurity-experts-coached-guardians-of-ukrainian-critical-infrastructure.html\" rel=\"noreferrer noopener\" target=\"_blank\">offer insights and assistance<\/a>&nbsp;to improve the protection of power plants, electrical grids and other critical infrastructure.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>About Purdue University<\/strong><\/h2>\n\n\n\n<p>Purdue University is a top public research institution developing practical solutions to today\u2019s toughest challenges. Ranked in each of the last five years as one of the 10 Most Innovative universities in the United States by U.S. News &amp; World Report, Purdue delivers world-changing research and out-of-this-world discovery. Committed to hands-on and online, real-world learning, Purdue offers a transformative education to all. Committed to affordability and accessibility, Purdue has frozen tuition and most fees at 2012-13 levels, enabling more students than ever to graduate debt-free. See how Purdue never stops in the persistent pursuit of the next giant leap at&nbsp;<a href=\"https:\/\/stories.purdue.edu\/\" rel=\"noreferrer noopener\" target=\"_blank\">https:\/\/stories.purdue.edu<\/a>.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p>TASHAROK: Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems<\/p>\n\n\n\n<p>DOI:&nbsp;<a href=\"https:\/\/www.computer.org\/csdl\/proceedings-article\/sp\/2022\/131600b535\/1FlQIzjpUgU\" rel=\"noreferrer noopener\" target=\"_blank\">10.1109\/SP46214.2022.00106<\/a><\/p>\n\n\n\n<p>The abstract and author list are available online.\u00a0<\/p>\n\n\n<div id=\"note\" class=\"post-content__attribution \">\n    <div class=\"columns\"> \n                    <div class=\"column\"> \n                <p class=\"post-content__source\">\n                    <strong>Writer, media contact:<\/strong>\u00a0Kayla Wiles, 765-494-2432,\u00a0<a href=\"mailto:wiles5@purdue.edu\">wiles5@purdue.edu<\/a><br><strong>Source:<\/strong>\u00a0Saurabh Bagchi,\u00a0<a href=\"mailto:sbagchi@purdue.edu\">sbagchi@purdue.edu<\/a>                <\/p>\n            <\/div>\n                            <div class=\"column is-narrow\">                 \n                <div class=\"post-content__editor-note\">\n                    <p class=\"post-content__editor-note--header\">Note to journalists:<\/p>\n                    <p>    \n                        A high-resolution\u00a0<a href=\"https:\/\/drive.google.com\/file\/d\/1sFQtyUx-80Rqy7JCrzm4kNzStQvmO4vN\/view?usp=sharing\" target=\"_blank\" rel=\"noreferrer noopener\">photo of Saurabh Bagchi<\/a>\u00a0and\u00a0<a href=\"https:\/\/drive.google.com\/drive\/folders\/1ei7vIyN2yZEWYqrfCQCU7VHcz2vAwy2J\" target=\"_blank\" rel=\"noreferrer noopener\">b-roll of Purdue University\u2019s campus<\/a>\u00a0are available via Google Drive.                    <\/p>\n                <\/div>\n            <\/div>\n            <\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>WEST LAFAYETTE, Ind. &mdash; Millions of people\u00a0could suddenly lose electricity if a ransomware attack just slightly tweaked energy flow onto the U.S. power grid.\u00a0 No single power utility company has enough resources to protect the entire grid, but maybe all&nbsp;3,000<\/p>\n","protected":false},"author":2,"featured_media":5691,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[54,7],"tags":[],"department":[31,58],"source":[29],"purdue_today_topic":[66],"coauthors":[64],"class_list":["post-5690","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-featured","category-research-excellence","department-engineering","department-purdue-moves","source-purdue-news","purdue_today_topic-research"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.purdue.edu\/newsroom\/wp-json\/wp\/v2\/posts\/5690","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.purdue.edu\/newsroom\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.purdue.edu\/newsroom\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.purdue.edu\/newsroom\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.purdue.edu\/newsroom\/wp-json\/wp\/v2\/comments?post=5690"}],"version-history":[{"count":1,"href":"https:\/\/www.purdue.edu\/newsroom\/wp-json\/wp\/v2\/posts\/5690\/revisions"}],"predecessor-version":[{"id":5692,"href":"https:\/\/www.purdue.edu\/newsroom\/wp-json\/wp\/v2\/posts\/5690\/revisions\/5692"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.purdue.edu\/newsroom\/wp-json\/wp\/v2\/media\/5691"}],"wp:attachment":[{"href":"https:\/\/www.purdue.edu\/newsroom\/wp-json\/wp\/v2\/media?parent=5690"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.purdue.edu\/newsroom\/wp-json\/wp\/v2\/categories?post=5690"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.purdue.edu\/newsroom\/wp-json\/wp\/v2\/tags?post=5690"},{"taxonomy":"department","embeddable":true,"href":"https:\/\/www.purdue.edu\/newsroom\/wp-json\/wp\/v2\/department?post=5690"},{"taxonomy":"source","embeddable":true,"href":"https:\/\/www.purdue.edu\/newsroom\/wp-json\/wp\/v2\/source?post=5690"},{"taxonomy":"purdue_today_topic","embeddable":true,"href":"https:\/\/www.purdue.edu\/newsroom\/wp-json\/wp\/v2\/purdue_today_topic?post=5690"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.purdue.edu\/newsroom\/wp-json\/wp\/v2\/coauthors?post=5690"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}