Cyber-Physical Resilience of Electrical Power Systems Against Malicious Attacks: a Review

Purpose of ReviewIn this paper, we study the literature on cyber-physical security of electrical power systems. The paper is intended to address the security strengths and weaknesses of the electrical power systems against malicious attacks.Recent FindingsThe concept of holistic resilience cycle (HRC) is introduced to improve cyber-physical security of electrical power systems. HRC is a systematic view to the security of the power systems, characterized by its four stages as closely interconnected and explicable only by reference to the whole. HRC includes four stages of prevention and planning, detection, mitigation and response, and system recovery.SummaryPower systems are evolving from traditional settings towards more autonomous and smart grids. Cyber-physical security is critical for the safe and secure operations of the power systems. To achieve a higher security level for power systems, the research community should follow a systematic approach and consider all stages of the holistic resilience cycle in addressing security problems of the power systems.

[1]  Randy H. Katz,et al.  Above the Clouds: A Berkeley View of Cloud Computing , 2009 .

[2]  Hamed Mohsenian Rad,et al.  Detecting dynamic load altering attacks: A data-driven time-frequency analysis , 2015, 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[3]  Naeem Iqbal,et al.  Load frequency resilient control of power system against delayed input cyber attack , 2015, 2015 Symposium on Recent Advances in Electrical Engineering (RAEE).

[4]  Chao Yang,et al.  Event-based distributed state estimation under deception attack , 2017, Neurocomputing.

[5]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[6]  Xiaodong Wang,et al.  Detecting the Sybil Attack Cooperatively in Wireless Sensor Networks , 2008, 2008 International Conference on Computational Intelligence and Security.

[7]  H. Vincent Poor,et al.  Enabling Self-Healing Smart Grid Through Jamming Resilient Local Controller Switching , 2015, IEEE Transactions on Dependable and Secure Computing.

[8]  Maria Paola Scaparra,et al.  Optimal Allocation of Protective Resources in Shortest-Path Networks , 2011, Transp. Sci..

[9]  Ping Zhang,et al.  Detection of replay attacks in cyber-physical systems , 2016, 2016 American Control Conference (ACC).

[10]  Lingfeng Wang,et al.  A game-theoretic approach to optimal defense strategy against load redistribution attack , 2015, 2015 IEEE Power & Energy Society General Meeting.

[11]  Xiaodong Wang,et al.  Quickest Detection of False Data Injection Attack in Wide-Area Smart Grids , 2015, IEEE Transactions on Smart Grid.

[12]  Martine Chlela,et al.  Fallback Control for Isochronous Energy Storage Systems in Autonomous Microgrids Under Denial-of-Service Cyber-Attacks , 2018, IEEE Transactions on Smart Grid.

[13]  Brian Neil Levine,et al.  Detecting the Sybil Attack in Mobile Ad hoc Networks , 2006, 2006 Securecomm and Workshops.

[14]  Pan Li,et al.  Privacy-Preserving Energy Theft Detection in Smart Grids: A P2P Computing Approach , 2013 .

[15]  Bum-Joo Lee,et al.  Extended smart meters-based remote detection method for illegal electricity usage , 2013 .

[16]  Jianhui Wang,et al.  A Probabilistic Risk Mitigation Model for Cyber-Attacks to PMU Networks , 2015, IEEE Transactions on Power Systems.

[17]  P. Varalakshmi,et al.  Thwarting DDoS attacks in grid using information divergence , 2013, Future Gener. Comput. Syst..

[18]  Lingfeng Wang,et al.  A hybrid neural network model and encoding technique for enhanced classification of energy consumption data , 2011, 2011 IEEE Power and Energy Society General Meeting.

[19]  Deepa Kundur,et al.  Denial of service attacks and mitigation for stability in cyber-enabled power grid , 2015, 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT).

[20]  Javier Del Ser,et al.  Detection of non-technical losses in smart meter data based on load curve profiling and time series analysis , 2017 .

[21]  Mohamed F. Younis,et al.  Cross-layer scheme for detecting large-scale colluding Sybil attack in VANETs , 2015, 2015 IEEE International Conference on Communications (ICC).

[22]  Zuyi Li,et al.  Local Load Redistribution Attacks in Power Systems With Incomplete Network Information , 2014, IEEE Transactions on Smart Grid.

[23]  Adnan Anwar,et al.  Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements , 2017, J. Comput. Syst. Sci..

[24]  Lingfeng Wang,et al.  Support vector machine based data classification for detection of electricity theft , 2011, 2011 IEEE/PES Power Systems Conference and Exposition.

[25]  Leandros A. Maglaras,et al.  Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems , 2015, J. Inf. Secur. Appl..

[26]  Ali Reza Seifi,et al.  A statistical unsupervised method against false data injection attacks: A visualization-based approach , 2017, Expert Syst. Appl..

[27]  J. Salmeron,et al.  Worst-Case Interdiction Analysis of Large-Scale Electric Power Grids , 2009, IEEE Transactions on Power Systems.

[28]  Ali Pinar,et al.  Computing Criticality of Lines in Power Systems , 2007, 2007 IEEE International Symposium on Circuits and Systems.

[29]  Åke J. Holmgren,et al.  Evaluating Strategies for Defending Electric Power Networks Against Antagonistic Attacks , 2007, IEEE Transactions on Power Systems.

[30]  Ramin Moslemi,et al.  A Fast, Decentralized Covariance Selection-Based Approach to Detect Cyber Attacks in Smart Grids , 2018, IEEE Transactions on Smart Grid.

[31]  Melike Erol-Kantarci,et al.  A risk optimization model for enhanced power grid resilience against physical attacks , 2017 .

[32]  Witold Kinsner,et al.  Anomaly detection in a smart grid using wavelet transform, variance fractal dimension and an artificial neural network , 2016, 2016 IEEE Electrical Power and Energy Conference (EPEC).

[33]  Toru Namerikawa,et al.  Detection of replay attack on smart grid with code signal and bargaining game , 2017, 2017 American Control Conference (ACC).

[34]  Chao Yang,et al.  Identification of severe multiple contingencies in electric power networks , 2005, Proceedings of the 37th Annual North American Power Symposium, 2005..

[35]  R. C. Diovu,et al.  A cloud-based openflow firewall for mitigation against DDoS attacks in smart grid AMI networks , 2017, 2017 IEEE PES PowerAfrica.

[36]  Beibei Li,et al.  Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system , 2017, J. Parallel Distributed Comput..

[37]  Haris M. Khalid,et al.  Immunity Toward Data-Injection Attacks Using Multisensor Track Fusion-Based Model Prediction , 2017, IEEE Transactions on Smart Grid.

[38]  Sushil Kumar Saroj,et al.  Sybil attack prevention and detection in vehicular ad hoc network , 2016, 2016 International Conference on Computing, Communication and Automation (ICCCA).

[39]  Ravishankar K. Iyer,et al.  Self-Healing Attack-Resilient PMU Network for Power System Operation , 2018, IEEE Transactions on Smart Grid.

[40]  Jose M. Yusta,et al.  Grid vulnerability analysis based on scale-free graphs versus power flow models , 2013 .

[41]  Lei Wu,et al.  An optimal joint placement of PMUs and flow measurements for ensuring power system observability under N-2 transmission contingencies , 2018 .

[42]  Yanfei Sun,et al.  Strategic Honeypot Game Model for Distributed Denial of Service Attacks in the Smart Grid , 2017, IEEE Transactions on Smart Grid.

[43]  Jorge Valenzuela,et al.  Real-time data reassurance in electrical power systems based on artificial neural networks , 2013 .

[44]  Lingfeng Wang,et al.  Power System Reliability Evaluation Considering Load Redistribution Attacks , 2017, IEEE Transactions on Smart Grid.

[45]  Jin Wei,et al.  Real-Time Detection of False Data Injection Attacks in Smart Grid: A Deep Learning-Based Intelligent Mechanism , 2017, IEEE Transactions on Smart Grid.

[46]  Arman Sargolzaei,et al.  Preventing Time-Delay Switch Attack on Load Frequency Control in Distributed Power Systems , 2016, IEEE Transactions on Smart Grid.

[47]  Kang Yen,et al.  Delayed inputs attack on load frequency control in smart grid , 2014, ISGT 2014.

[48]  Shunzheng Yu,et al.  One-way queuing delay measurement and its application on detecting DDoS attack , 2009, J. Netw. Comput. Appl..

[49]  Jorge Valenzuela,et al.  A two-phase investment model for optimal allocation of phasor measurement units considering transmission switching , 2015 .

[50]  Rida Khatoun,et al.  Vehicle Driving Pattern Based Sybil Attack Detection , 2016, 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS).

[51]  Jun Luo,et al.  Energy-theft detection issues for advanced metering infrastructure in smart grid , 2014, Tsinghua Science and Technology.

[52]  S. Mirzakuchaki,et al.  A Solution to Remote Detecting of Illegal Electricity Usage Based on Smart Metering , 2007, 2007 2nd International Workshop on Soft Computing Applications.

[53]  Yang Liu,et al.  Abnormal traffic-indexed state estimation: A cyber-physical fusion approach for Smart Grid attack detection , 2015, Future Gener. Comput. Syst..

[54]  Yuancheng Li,et al.  State summation for detecting false data attack on smart grid , 2014 .

[55]  Zuyi Li,et al.  Modeling Load Redistribution Attacks in Power Systems , 2011, IEEE Transactions on Smart Grid.

[56]  Zuyi Li,et al.  Quantitative Analysis of Load Redistribution Attacks in Power Systems , 2012, IEEE Transactions on Parallel and Distributed Systems.

[57]  Saman A. Zonouz,et al.  AMIDS: A multi-sensor energy theft detection framework for advanced metering infrastructures , 2012, 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm).

[58]  David K. Y. Yau,et al.  Markov Game Analysis for Attack-Defense of Power Networks Under Possible Misinformation , 2013, IEEE Transactions on Power Systems.

[59]  Lalitha Sankar,et al.  Physical System Consequences of Unobservable State-and-Topology Cyber-Physical Attacks , 2016, IEEE Transactions on Smart Grid.

[60]  Zhao Yang Dong,et al.  Exploring Reliable Strategies for Defending Power Systems Against Targeted Attacks , 2011, IEEE Transactions on Power Systems.

[61]  R. Alvarez,et al.  Trilevel Optimization in Power Network Defense , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[62]  J. Salmeron,et al.  Analysis of electric grid security under terrorist threat , 2004, IEEE Transactions on Power Systems.

[63]  Hamed Mohsenian Rad,et al.  Distributed Internet-Based Load Altering Attacks Against Smart Power Grids , 2011, IEEE Transactions on Smart Grid.

[64]  Mohammad Javad Feizollahi,et al.  An investment decision model for the optimal placement of phasor measurement units , 2015, Expert Syst. Appl..

[65]  Siddharth Garg,et al.  IoT-enabled distributed cyber-attacks on transmission and distribution grids , 2017, 2017 North American Power Symposium (NAPS).

[66]  Faruk Kazi,et al.  Data driven approach to attack detection in a cyber-physical smart grid system , 2017, 2017 Indian Control Conference (ICC).

[67]  Syed Khaleel Ahmed,et al.  Detection of abnormalities and electricity theft using genetic Support Vector Machines , 2008, TENCON 2008 - 2008 IEEE Region 10 Conference.

[68]  Hamed Mohsenian Rad,et al.  Dynamic load altering attacks in smart grid , 2015, 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT).

[69]  Chao Yang,et al.  Severe Multiple Contingency Screening in Electric Power Systems , 2008, IEEE Transactions on Power Systems.

[70]  Neeraj Kumar,et al.  Decision Tree and SVM-Based Data Analytics for Theft Detection in Smart Grid , 2016, IEEE Transactions on Industrial Informatics.

[71]  Walter S. Baer,et al.  Electricity Requirements for a Digital Society , 2003 .

[72]  Satyajayant Misra,et al.  SybilExposer: An effective scheme to detect Sybil communities in online social networks , 2016, 2016 IEEE International Conference on Communications (ICC).

[73]  Natalia Alguacil,et al.  A trilevel programming approach for electric grid defense planning , 2014, Comput. Oper. Res..

[74]  Hao Liang,et al.  CCPA: Coordinated Cyber-Physical Attacks and Countermeasures in Smart Grid , 2017, IEEE Transactions on Smart Grid.

[75]  Jiafu Wan,et al.  Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[76]  Victor C. M. Leung,et al.  Electricity Theft Detection in AMI Using Customers’ Consumption Patterns , 2016, IEEE Transactions on Smart Grid.

[77]  Melike Erol-Kantarci,et al.  Cyber Attack Protection for a Resilient Electric Vehicle Infrastructure , 2015, 2015 IEEE Globecom Workshops (GC Wkshps).

[78]  Aditya Ashok,et al.  Online Detection of Stealthy False Data Injection Attacks in Power System State Estimation , 2018, IEEE Transactions on Smart Grid.

[79]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[80]  Radu State,et al.  Large-scale detection of non-technical losses in imbalanced data sets , 2016, 2016 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT).

[81]  Gerald G. Brown,et al.  Defending Critical Infrastructure , 2006, Interfaces.

[82]  Arman Sargolzaei,et al.  Resilient Design of Networked Control Systems Under Time Delay Switch Attacks, Application in Smart Grid , 2017, IEEE Access.

[83]  Hamed Mohsenian-Rad,et al.  Dynamic Load Altering Attacks Against Power System Stability: Attack Models and Protection Schemes , 2017, IEEE Transactions on Smart Grid.

[84]  Gexiang Zhang,et al.  Robust Detection of Cyber Attacks on State Estimators Using Phasor Measurements , 2017, IEEE Transactions on Power Systems.

[85]  Pankaj Kumar Bhowmik,et al.  Remote detection of illegal electricity usage employing smart energy meter - A current based technique , 2011, ISGT2011-India.

[86]  Anastasios A. Economides,et al.  Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information , 2015, Expert Syst. Appl..