An Adversarial Model for Attack Vector Vulnerability Analysis on Power and Gas Delivery Operations

Power systems often rely on natural gas pipeline networks to supply fuel for gas-fired generation. Market inefficiencies and a lack of formal coordination between the wholesale power and gas delivery infrastructures may magnify the broader impact of a cyber-attack on a natural gas pipeline. In this study we present a model that can be used to quantify the impact of cyber-attacks on electricity and gas delivery operations. We model activation of cyber-attack vectors that attempt to gain access to pipeline gas compressor controls using a continuous-time Markov chain over a state space based on the gas operator Industrial Control System firewall zone partition. Our approach evaluates the operating states and decision-making in the networks using physically realistic and operationally representative models. We summarize these models, the sequence of analyses used to quantify the impacts of a cyber-incident, and propose a Monte Carlo simulation approach to quantify the resulting effect on the reliability of the bulk power system by the increase in operational cost. The methodology is applied to a case study of interacting power, gas, and cyber test networks.

[1]  R. H. Kerr,et al.  Unit commitment , 1966, Mathematical Programming for Power Systems Operation with Applications in Python.

[2]  Luciana Obregon,et al.  SANS Institute Information Security Reading Room Secure Architecture for Industrial Control Systems , 2019 .

[3]  Kenneth Steiglitz,et al.  Optimal Design of Offshore Natural-Gas Pipeline Systems , 1970, Oper. Res..

[4]  Henrik Sandberg,et al.  Network-Aware Mitigation of Data Integrity Attacks on Power System State Estimation , 2012, IEEE Journal on Selected Areas in Communications.

[5]  Demosthenis Teneketzis,et al.  Optimal Defense Policies for Partially Observable Spreading Processes on Bayesian Attack Graphs , 2015, MTD@CCS.

[6]  Karen A. Scarfone,et al.  Cyber Security Metrics and Measures , 2008 .

[7]  Philip M. Besuner,et al.  Impacts of Wind and Solar on Fossil-Fueled Generators: Preprint , 2012 .

[8]  Danièle Revel,et al.  On natural gas prices , 2012 .

[9]  Steve Edwardson The Next Dimension of Flow Profiles , 2016 .

[10]  Lingfeng Wang,et al.  Power System Reliability Evaluation With SCADA Cybersecurity Considerations , 2015, IEEE Transactions on Smart Grid.

[11]  Roger Z. Ríos-Mercado,et al.  Optimization problems in natural gas transportation systems. A state-of-the-art review , 2015 .

[12]  Aleksandr Rudkevich,et al.  Economic Optimization of Intra-Day Gas Pipeline Flow Schedules using Transient Flow Models , 2017 .

[13]  Miles A. McQueen,et al.  Ideal Based Cyber Security Technical Metrics for Control Systems , 2007, CRITIS.

[14]  A.I. Cohen,et al.  Optimization-based methods for operations scheduling , 1987, Proceedings of the IEEE.

[15]  A. Monticelli,et al.  Security-Constrained Optimal Power Flow with Post-Contingency Corrective Rescheduling , 1987, IEEE Transactions on Power Systems.

[16]  Michael Chertkov,et al.  Control policies for operational coordination of electric power and natural gas transmission systems , 2016, 2016 American Control Conference (ACC).

[17]  Russell Bent,et al.  Unit commitment with N-1 Security and wind uncertainty , 2016, 2016 Power Systems Computation Conference (PSCC).

[18]  E. Shashi Menon,et al.  Gas pipeline hydraulics , 2005 .

[19]  R. Larson,et al.  Optimization of natural-gas pipeline systems via dynamic programming , 1968 .

[20]  Katherine R. Davis,et al.  A Cyber-Physical Modeling and Assessment Framework for Power Grid Infrastructures , 2015, IEEE Transactions on Smart Grid.

[21]  Indrajit Ray,et al.  Dynamic Security Risk Management Using Bayesian Attack Graphs , 2012, IEEE Transactions on Dependable and Secure Computing.

[22]  A. Kolmogoroff Über die analytischen Methoden in der Wahrscheinlichkeitsrechnung , 1931 .

[23]  Michael Chertkov,et al.  Optimal control of transient flow in natural gas networks , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[24]  Michael Chertkov,et al.  Model Reduction and Optimization of Natural Gas Pipeline Dynamics , 2015 .

[25]  Allen J. Wood,et al.  Power Generation, Operation, and Control , 1984 .

[26]  Ren Renewables 2019 Global Status Report , 2012 .

[27]  Lorenz T. Biegler,et al.  On the implementation of an interior-point filter line-search algorithm for large-scale nonlinear programming , 2006, Math. Program..

[28]  J. J. Shaw,et al.  A direct method for security-constrained unit commitment , 1995 .

[29]  Michael Chertkov,et al.  Coordinated Scheduling for Interdependent Electric Power and Natural Gas Infrastructures , 2017 .

[30]  Bri-Mathias Hodge,et al.  The Value of Day-Ahead Coordination of Power and Natural Gas Network Operations , 2018 .

[31]  Andrew L. Rukhin,et al.  Continuous-Time Markov Chains and Applications: A Singular Perturbation Approach , 2001, Technometrics.

[32]  W. J. Anderson Continuous-Time Markov Chains: An Applications-Oriented Approach , 1991 .

[33]  William F. Tinney,et al.  Power Flow Solution by Newton's Method , 1967 .