Coordinated attacks on electric power systems in a cyber-physical environment

Abstract With increasing terrorism and sabotage activities, the power grid is becoming more vulnerable to various kinds of cyber and physical attacks. Coordination between the attacks could bring higher impacts on the power system, as evidenced by the 2015 Ukrainian power system cyberattack. There is limited study in existing literature about possible coordinated attack scenarios and the detailed mathematical modeling of them. To prevent future coordinated attacks against power systems, in this paper the cyber-physical security of the power system is analyzed and probable coordinated attack scenarios are proposed. Two typical attack coordination examples are studied in detail: the coordination between load redistribution (LR) attack and attacking generators; and the coordination between LR attack and attacking lines. They are formulated as bilevel optimization problems, where the attacker at the upper level aims to maximize the load curtailment while the defender at the lower level makes an effort to reduce the load curtailment. The case studies conducted based on a modified IEEE 14-bus system demonstrate the potential damaging effects of the coordinated attacks. And it is shown that coordinated attacks could cause higher load curtailment than the standalone attacks. This study can provide meaningful insights on how to prevent and mitigate such high-impact, low-frequency (HILF) coordinated attacks.

[1]  Qun Li,et al.  Defending against Unidentifiable Attacks in Electric Power Grids , 2013, IEEE Transactions on Parallel and Distributed Systems.

[2]  Zhao Yang Dong,et al.  The 2015 Ukraine Blackout: Implications for False Data Injection Attacks , 2017, IEEE Transactions on Power Systems.

[3]  Ninghui Li,et al.  Introduction to special section SACMAT'08 , 2011, TSEC.

[4]  Arif I. Sarwat,et al.  Smart Grid reliability assessment utilizing Boolean Driven Markov Process and variable weather conditions , 2015, 2015 North American Power Symposium (NAPS).

[5]  Le Xie,et al.  Ramp-Induced Data Attacks on Look-Ahead Dispatch in Real-Time Power Markets , 2013, IEEE Transactions on Smart Grid.

[6]  J. Arroyo,et al.  On the solution of the bilevel programming formulation of the terrorist threat problem , 2005, IEEE Transactions on Power Systems.

[7]  J. Salmeron,et al.  Analysis of electric grid security under terrorist threat , 2004, IEEE Transactions on Power Systems.

[8]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[9]  Husheng Li,et al.  Time Synchronization Attack in Smart Grid: Impact and Analysis , 2013, IEEE Transactions on Smart Grid.

[10]  Zuyi Li,et al.  Optimal Protection Strategy Against False Data Injection Attacks in Power Systems , 2017, IEEE Transactions on Smart Grid.

[11]  David G. Luenberger,et al.  Linear and nonlinear programming , 1984 .

[12]  Zuyi Li,et al.  Cyber Attacks Against the Economic Operation of Power Systems: A Fast Solution , 2017, IEEE Transactions on Smart Grid.

[13]  Adnan Anwar,et al.  Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements , 2017, J. Comput. Syst. Sci..

[14]  Athanasios V. Vasilakos,et al.  False Data Injection on State Estimation in Power Systems—Attacks, Impacts, and Defense: A Survey , 2017, IEEE Transactions on Industrial Informatics.

[15]  Haibo He,et al.  Resilience Analysis of Power Grids Under the Sequential Attack , 2014, IEEE Transactions on Information Forensics and Security.

[16]  Zhao Yang Dong,et al.  A Review of False Data Injection Attacks Against Modern Power Systems , 2017, IEEE Transactions on Smart Grid.

[17]  Marimuthu Palaniswami,et al.  Security Games for Risk Minimization in Automatic Generation Control , 2015, IEEE Transactions on Power Systems.

[18]  Siddharth Sridhar,et al.  Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.

[19]  Haibo He,et al.  Joint Substation-Transmission Line Vulnerability Assessment Against the Smart Grid , 2015, IEEE Transactions on Information Forensics and Security.

[20]  Isao Ono,et al.  On detection of cyber attacks against voltage control in distribution power grids , 2014, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[21]  William H. Sanders,et al.  SOCCA: A Security-Oriented Cyber-Physical Contingency Analysis in Power Infrastructures , 2014, IEEE Transactions on Smart Grid.

[22]  Zuyi Li,et al.  Modeling Load Redistribution Attacks in Power Systems , 2011, IEEE Transactions on Smart Grid.

[23]  Zuyi Li,et al.  Quantitative Analysis of Load Redistribution Attacks in Power Systems , 2012, IEEE Transactions on Parallel and Distributed Systems.

[24]  Jianhua Zhang,et al.  Asset Analysis of Risk Assessment for IEC 61850-Based Power Control Systems—Part II: Application in Substation , 2011, IEEE Transactions on Power Delivery.

[25]  George Atia,et al.  Sparsity-based error detection in DC power flow state estimation , 2016, 2016 IEEE International Conference on Electro Information Technology (EIT).

[26]  Zuyi Li,et al.  Transmission Line Rating Attack in Two-Settlement Electricity Markets , 2016, IEEE Transactions on Smart Grid.

[27]  Deepa Kundur,et al.  A Coordinated Multi-Switch Attack for Cascading Failures in Smart Grid , 2014, IEEE Transactions on Smart Grid.

[28]  David K. Y. Yau,et al.  Markov Game Analysis for Attack-Defense of Power Networks Under Possible Misinformation , 2013, IEEE Transactions on Power Systems.

[29]  Gang Wang,et al.  A Study of Self-Organized Criticality of Power System Under Cascading Failures Based on AC-OPF With Voltage Stability Margin , 2008, IEEE Transactions on Power Systems.

[30]  Wei-Jen Lee,et al.  An AMI System for the Deregulated Electricity Markets , 2009 .

[31]  S. Sitharama Iyengar,et al.  Smart Grids: Security and Privacy Issues , 2016 .

[32]  David K. Y. Yau,et al.  Modeling and Mitigating Impact of False Data Injection Attacks on Automatic Generation Control , 2017, IEEE Transactions on Information Forensics and Security.

[33]  Beibei Li,et al.  Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system , 2017, J. Parallel Distributed Comput..