Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon openaccess Developing correlation indices to identify coordinated cyber-attacks on power grids

Increasing reliance on Information and Communication Technology exposes the power grid to cyber-attacks. In particular, Coordinated Cyber-Attacks (CCAs) are considered highly threatening and difficult to defend against, because they (i) possess higher disruptiveness by integrating greater resources from multiple attack entities, and (ii) present heterogeneous traits in cyber-space and the physical grid by hitting multiple targets to achieve the attack goal. Thus, and as opposed to independent attacks, whose severity is limited by the power grid's redundancy, CCAs could inflict disastrous consequences, such as blackouts. In this study, the authors propose a method to develop Correlation Indices to defend against CCAs on static control applications. These proposed indices relate the targets of CCAs with attack goals on the power grid. Compared to related works, the proposed indices present the benefits of deployment simplicity and are capable of detecting more sophisticated attacks, such as measurement attacks. The method is demonstrated using measurement attacks against Security Constrained Economic Dispatch.

References

    1. 1)
      • 26. Luo, Z.Q., Pang, J.S., Ralph, D.: ‘Mathematical programs with equilibrium constraints’ (Cambridge University Press, Cambridge, UK, 1996).
    2. 2)
      • 33. Zimmerman, R.D., Murillo Sánchez, C.E., Thomas, R.J.: ‘Matpower: steady-state operations, planning, and analysis tools for power systems research and education’, IEEE Trans. Power Syst., 2011, 26, (1), pp. 1219.
    3. 3)
      • 22. Dorfler, F., Bullo, F.: ‘Novel insights into lossless ac and dc power flow’. Power and Energy Society General Meeting (PES), Vancouver, BC, Canada, 2013, pp. 15.
    4. 4)
      • 31. Dempe, S.: ‘Foundations of bilevel programming’ (Springer Science & Business Media, Dordrecht, Netherlands, 2002).
    5. 5)
      • 17. Liang, G., Zhao, J., Luo, F., et al: ‘A review of false data injection attacks against modern power systems’, IEEE Trans. Smart Grid, 2016, PP, (99), p. 1.
    6. 6)
      • 9. Liu, N., Zhang, J., Zhang, H., et al: ‘Security assessment for communication networks of power control systems using attack graph and mcdm’, IEEE Trans. Power Deliv., 2010, 25, (3), pp. 14921500.
    7. 7)
      • 20. Liu, X., Li, Z.: ‘False data attacks against ac state estimation with incomplete network information’, IEEE Trans. Smart Grid, 2017, 8, (5), pp. 22392248.
    8. 8)
      • 16. Wang, J.: ‘Resilient electric grid for smart cities’. in ‘Smart cities: foundations, principles, and applications’ (John Wiley & Sons, Hoboken, NJ, USA, 2017), pp. 541578.
    9. 9)
      • 24. ‘The New England independent system operator’. Available at https://www.iso-ne.com/markets-operations.
    10. 10)
      • 10. Chen, T.M., Sanchez Aarnoutse, J.C., Buford, J.: ‘Petri net modeling of cyberphysical attacks on smart grid’, IEEE Trans. Smart Grid, 2011, 2, (4), pp. 741749.
    11. 11)
      • 29. Arroyo, J.M., Galiana, F.D.: ‘On the solution of the bilevel programming formulation of the terrorist threat problem’, IEEE Trans. Power Syst., 2005, 20, (2), pp. 789797.
    12. 12)
      • 18. Tajer, A.: ‘False data injection attacks in electricity markets by limited adversaries: stochastic robustness’, IEEE Trans. Smart Grid, 2017, early access: DOI: 10.1109/TSG.2017.2733346.
    13. 13)
      • 27. Yuan, Y., Li, Z., Ren, K.: ‘Modeling load redistribution attacks in power systems’, IEEE Trans. Smart Grid, 2011, 2, (2), pp. 382390.
    14. 14)
      • 19. Rahman, M.A., Mohsenian Rad, H.: ‘False data injection attacks with incomplete information against smart power grids’. Global Communications Conf. (GLOBECOM), Anaheim, CA, USA, 2012, pp. 31533158.
    15. 15)
      • 30. Boyd, S., Vandenberghe, L.: ‘Convex optimization’ (Cambridge University Press, NY, USA, 2004).
    16. 16)
      • 21. Tajer, A., Kar, S., Poor, H.V., et al: ‘Distributed joint cyber attack detection and state recovery in smart grids’. 2011 IEEE Int. Conf. on Smart Grid Communications (SmartGridComm), Brussels, Belgium, 2011, pp. 202207.
    17. 17)
      • 13. Choi, D.H., Xie, L.: ‘Ramp-induced data attacks on look-ahead dispatch in real-time power markets’, IEEE Trans. Smart Grid, 2013, 4, (3), pp. 12351243.
    18. 18)
      • 15. Ye, H., Ge, Y., Liu, X., et al: ‘Transmission line rating attack in two-settlement electricity markets’, IEEE Trans. Smart Grid, 2016, 7, (3), pp. 13461355.
    19. 19)
      • 5. Dragos, Inc.: ‘Crashoverride: Analysis of the threat to electric grid operations’, 2017.
    20. 20)
      • 32. Zhu, B., Ghorbani, A.A.: ‘Alert correlation for extracting attack strategies’ , Int. J. Netw. Secur., 2006, 3, (3), pp. 244258.
    21. 21)
      • 3. Lee, R.M., Assante, M.J., Conway, T.: ‘Analysis of the cyber attack on the Ukrainian power grid’, SANS Ind. Control Syst., 2016.
    22. 22)
      • 28. Liang, J., Sankar, L., Kosut, O.: ‘Vulnerability analysis and consequences of false data injection attack on power system state estimation’, IEEE Trans. Power Syst., 2016, 31, (5), pp. 38643872.
    23. 23)
      • 1. Zhu, B., Joseph, A., Sastry, S.: ‘A taxonomy of cyber attacks on SCADA systems’. Internet of Things (iThings/CPSCom), 2011 Int. Conf. on and 4th Int. Conf. on Cyber, Physical and Social Computing, Dalian, China, 2011, pp. 380388.
    24. 24)
      • 7. Wang, P., Ashok, A., Govindarasu, M.: ‘Cyber-physical risk assessment for smart grid system protection scheme’. 2015 IEEE Power & Energy Society General Meeting, Denver, CO, USA, 2015, pp. 15.
    25. 25)
      • 6. Ten, C.W., Hong, J., Liu, C.C.: ‘Anomaly detection for cybersecurity of the substations’, IEEE Trans. Smart Grid, 2011, 2, (4), pp. 865873.
    26. 26)
      • 34. Grant, M., Boyd, S..: ‘CVX: Matlab software for disciplined convex programming, version 2.1’. 2014. Available at http://cvxr.com/cvx.
    27. 27)
      • 25. ‘California ISO, business practice manual for market instruments, chapter 2.1 the market power mitigation and reliability requirements, 2017’. Available at https://bpmcm.caiso.com/Pages/BPMDetails.aspx?BPM=Market%20Instruments.
    28. 28)
      • 11. Jie, Y., Govindarasu, M., Chen Ching, L., et al: ‘Risk assessment framework for power control systems with pmu-based intrusion response system’, J. Modern Power Syst. Clean Energy, 2015, 3, (3), pp. 321331.
    29. 29)
      • 12. Ten, C.W., Ginter, A., Bulbul, R.: ‘Cyber-based contingency analysis’, IEEE Trans. Power Syst., 2016, 31, (4), pp. 30403050.
    30. 30)
      • 8. Ten, C.W., Liu, C.C., Govindarasu, M.: ‘Vulnerability assessment of cybersecurity for SCADA systems using attack trees’. Power Engineering Society General Meeting, Tampa, FL, USA, 2007, pp. 18.
    31. 31)
      • 23. ‘The pjm independent system operator’. Available at http://www.pjm.com/markets-and-operations.aspx.
    32. 32)
      • 14. Xie, L., Mo, Y., Sinopoli, B.: ‘Integrity data attacks in power market operations’, IEEE Trans. Smart Grid, 2011, 2, (4), pp. 659666.
    33. 33)
      • 2. Liu, C.C., Stefanov, A., Hong, J., et al: ‘Intruders in the grid’, IEEE Power Energy Mag., 2012, 10, (1), pp. 5866.
    34. 34)
      • 4. Sun, C.C., Hong, J., Liu, C.C.: ‘A coordinated cyber attack detection system (CCADS) for multiple substations’. Power Systems Computation Conf. (PSCC), Genoa, Italy, 2016, pp. 17.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-cps.2018.5002
Loading

Related content

content/journals/10.1049/iet-cps.2018.5002
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address