Highly Available Smart Grid Control Centers through Intrusion Tolerance

Societies' norms of operation relies on the proper and secure functioning of several critical infrastructures, particularly modern power grid which is also known as smart grid. Smart grid is interwoven with the information and communication technology infrastructure, and thus it is exposed to cyber security threats. Intrusion tolerance proves a promising security approach against malicious attacks and contributes to enhance the resilience and security of the key components of smart grid, mainly SCADA and control centers. Hence, an intrusion tolerant system architecture for smart grid control centers is proposed in this paper. The proposed architecture consists of several modules namely, replication & diversity, compromised/faulty replica detector, reconfiuration, auditing and proxy. Some of distinctive features of the proposed ITS are diversity as well as the combined and fine-grained rejuvenation approach. The security of the proposed architecture is evaluated with regard to availability and mean time to security failure as performance measures. The analysis is conducted using a Discrete Time Semi Markov Model and the acquired results show improvements compared to two established intrusion tolerant architectures. The viability of SLA as another performance metric is also investigated.

[1]  Stamatis Karnouskos,et al.  Stuxnet worm impact on industrial cyber-physical system security , 2011, IECON 2011 - 37th Annual Conference of the IEEE Industrial Electronics Society.

[2]  Bharat B. Madan,et al.  A method for modeling and quantifying the security attributes of intrusion tolerant systems , 2004, Perform. Evaluation.

[3]  Feiyi Wang,et al.  Analysis of techniques for building intrusion tolerant server systems , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..

[4]  Peter Y. A. Ryan,et al.  A qualitative analysis of the intrusion-tolerance capabilities of the MAFTIA architecture , 2004, International Conference on Dependable Systems and Networks, 2004.

[5]  Dong Wei,et al.  Protecting Smart Grid Automation Systems Against Cyberattacks , 2011, IEEE Transactions on Smart Grid.

[6]  Arun K. Sood,et al.  Quantitative Approach to Tuning of a Time-Based Intrusion-Tolerant System Architecture , 2009 .

[7]  Vincent Nicomette,et al.  The Design of a Generic Intrusion-Tolerant Architecture for Web Servers , 2009, IEEE Transactions on Dependable and Secure Computing.

[8]  Miguel Correia,et al.  Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery , 2010, IEEE Transactions on Parallel and Distributed Systems.

[9]  Premkumar T. Devanbu,et al.  Willow system demonstration , 2003, Proceedings DARPA Information Survivability Conference and Exposition.

[10]  Joonsang Baek,et al.  Study on Secret Sharing Schemes (SSS) and their applications , 2011, 2011 International Conference for Internet Technology and Secured Transactions.

[11]  David Hutchison,et al.  Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines , 2010, Comput. Networks.

[12]  Kwang-Cheng Chen,et al.  Smart attacks in smart grid communication networks , 2012, IEEE Communications Magazine.

[13]  Magnus Almgren,et al.  Dependable Intrusion Tolerance: technology demo , 2003, Proceedings DARPA Information Survivability Conference and Exposition.

[14]  Kishor S. Trivedi,et al.  Investigating dynamic reliability and availability through state-space models , 2012, Comput. Math. Appl..

[15]  Yi Xu,et al.  A survey on the communication architectures in smart grid , 2011, Comput. Networks.

[16]  Bjarne E. Helvik,et al.  Integrated Dependability and Security Evaluation Using Game Theory and , 2007 .

[17]  Tadashi Dohi,et al.  Availability Analysis of an Intrusion Tolerant Distributed Server System With Preventive Maintenance , 2010, IEEE Transactions on Reliability.

[18]  William H. Sanders,et al.  Proactive Resilience Revisited: The Delicate Balance Between Resisting Intrusions and Remaining Available , 2006, 2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06).

[19]  Anno Accademico,et al.  Smart Grid Communications: Overview of research challenges, solutions and standardization activities , 2013 .

[20]  Siddharth Sridhar,et al.  Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.

[21]  David Powell,et al.  A fault- and intrusion- tolerant file system , 1985 .

[22]  Alysson Neves Bessani From Byzantine fault tolerance to intrusion tolerance (a position paper) , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W).

[23]  Arun K. Sood,et al.  Securing Web Servers Using Self Cleansing Intrusion Tolerance (SCIT) , 2009, 2009 Second International Conference on Dependability.

[24]  Cheolwon Lee,et al.  The Green Defenders , 2011, IEEE Power and Energy Magazine.

[25]  Fred B. Schneider,et al.  COCA: a secure distributed online certification authority , 2002 .

[26]  Defining Steady-State Service Level Agreeability using Semi-Markov Process , 2006 .

[27]  Bjarne E. Helvik CHAPTER 8 – Integrated Dependability and Security Evaluation Using Game Theory and Markov Models , 2008 .

[28]  Arun K. Sood,et al.  A Comparison of Intrusion-Tolerant System Architectures , 2011, IEEE Security & Privacy.

[29]  Mohsen A. Jafari,et al.  Protecting Smart Grid Automation Systems Against C , 2011 .

[30]  Göran N Ericsson,et al.  Cyber Security and Power System Communication—Essential Parts of a Smart Grid Infrastructure , 2010, IEEE Transactions on Power Delivery.

[31]  Kishor S. Trivedi,et al.  State space approach to security quantification , 2005, 29th Annual International Computer Software and Applications Conference (COMPSAC'05).

[32]  Heejo Lee,et al.  This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .

[33]  Rong Wang,et al.  Design and implementation of Acceptance Monitor for building intrusion tolerant systems , 2003, Softw. Pract. Exp..

[34]  Siddharth Sridhar,et al.  Cyber-Physical System Security for the Electric Power Grid Controlinpowersystemsthatmaybevulnerabletosecurityattacksisdiscussedinthis paper as are control loop vulnerabilities, potential impact of disturbances, and several mitigations. , 2012 .

[35]  Helge Janicke,et al.  SCADA security in the light of Cyber-Warfare , 2012, Comput. Secur..

[36]  Xiaohui Liang,et al.  Securing smart grid: cyber attacks, countermeasures, and challenges , 2012, IEEE Communications Magazine.

[37]  Mahesh Sooriyabandara,et al.  Smart Grid Communications: Overview of Research Challenges, Solutions, and Standardization Activities , 2011, IEEE Communications Surveys & Tutorials.

[38]  I. Pearson Smart grid cyber security for Europe , 2011 .

[39]  Paulo Veríssimo,et al.  Intrusion-tolerant middleware: the road to automatic security , 2006, IEEE Security & Privacy.

[40]  Alysson Neves Bessani,et al.  OS diversity for intrusion tolerance: Myth or reality? , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN).

[41]  Arun K. Sood,et al.  SCIT and IDS architectures for reduced data ex-filtration , 2010, 2010 International Conference on Dependable Systems and Networks Workshops (DSN-W).

[42]  Massoud Amin Energy Infrastructure Defense Systems , 2005, Proceedings of the IEEE.

[43]  Miguel Correia,et al.  Intrusion-Tolerant Architectures: Concepts and Design , 2002, WADS.

[44]  Hamid Sharif,et al.  A Survey on Cyber Security for Smart Grid Communications , 2012, IEEE Communications Surveys & Tutorials.

[45]  Xuemin Shen,et al.  Dependability Analysis of Control Center Networks in Smart Grid Using Stochastic Petri Nets , 2012, IEEE Transactions on Parallel and Distributed Systems.

[46]  Alysson Neves Bessani,et al.  The FOREVER service for fault/intrusion removal , 2008, WRAITS '08.

[47]  Chen-Ching Liu,et al.  Intruders in the Grid , 2012, IEEE Power and Energy Magazine.

[48]  Yves Deswarte,et al.  Internet Security: An Intrusion-Tolerance Approach , 2006, Proceedings of the IEEE.

[49]  Miguel Correia,et al.  How Practical Are Intrusion-Tolerant Distributed Systems? , 2006 .

[50]  Greeshma Varghese,et al.  Analysis of intrusion-tolerant architectures for Web Servers , 2011, 2011 International Conference on Emerging Trends in Electrical and Computer Technology.

[51]  Yang Xiao,et al.  Cyber Security and Privacy Issues in Smart Grids , 2012, IEEE Communications Surveys & Tutorials.

[52]  Jian-Hua Huang,et al.  The Strategy of Proactive-Reactive Intrusion Tolerance Recovery Based on Hierarchical Model , 2011, WISM.

[53]  Thomas M. Overman,et al.  High-Assurance Smart Grid: A Three-Part Model for Smart Grid Control Systems , 2011, Proceedings of the IEEE.

[54]  Miguel Correia,et al.  The Crutial Way of Critical Infrastructure Protection , 2008, IEEE Security & Privacy Magazine.

[55]  Feiyi Wang,et al.  SITAR: a scalable intrusion-tolerant architecture for distributed services , 2003, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].