Cascading Failure of Cyber-Coupled Power Systems Considering Interactions Between Attack and Defense

In this paper, we develop a network-based model with consideration of the physical power flow process to study the cascading failure in cyber-coupled power systems. We take the coupling between power and cyber networks as being resulted from the interdependence of power nodes and cyber nodes. Interaction between two processes, one aiming to attack (cause damage) and the other aiming to defend (protect) the components in the power network, is considered in the model. This interaction offers a novel perspective to interpreting the interdependence of power and cyber networks. To study how an attacker or defender deploys resources to attack or protect a power component, four strategies in distributing the attack and defense strengths are considered, namely, even distribution, degree-based distribution, capacity-based distribution, and random distribution. To probe into the actual propagation process of a blackout, we define four critical time points, namely, start time, attack time, isolation time and end time, and use these time points to analyze and evaluate the effectiveness of different attack and defense strategies. The tit-for-tat defense strategy, in which defender adopts the same strategy as the attacker, is found to be the preferred defense strategy under most conditions. Moreover, allocating defense strength in terms of capacity-based distribution can most effectively suppress cascading failure. This finding was not obtainable without due consideration of the physical power flow process in network-based models.

[1]  Chi K. Tse,et al.  Modeling the Dynamics of Cascading Failures in Power Systems , 2017, IEEE Journal on Emerging and Selected Topics in Circuits and Systems.

[2]  Vasileios Karyotis,et al.  Malware Diffusion Models for Modern Complex Networks: Theory and Applications , 2016 .

[3]  C. K. Michael Tse,et al.  Assessment of Robustness of Power Systems From a Network Perspective , 2015, IEEE Journal on Emerging and Selected Topics in Circuits and Systems.

[4]  Yijia Cao,et al.  Cascading Failure Analysis Considering Interaction Between Power Grids and Communication Networks , 2016, IEEE Transactions on Smart Grid.

[5]  Xinghuo Yu,et al.  A Maximum-Flow-Based Complex Network Approach for Power System Vulnerability Analysis , 2013, IEEE Transactions on Industrial Informatics.

[6]  Chia-Chi Chu,et al.  Complex Networks Theory For Modern Smart Grid Applications: A Survey , 2017, IEEE Journal on Emerging and Selected Topics in Circuits and Systems.

[7]  Harry Eugene Stanley,et al.  Catastrophic cascade of failures in interdependent networks , 2009, Nature.

[8]  C. K. Michael Tse,et al.  Analysis of Communication Network Performance From a Complex Network Perspective , 2013, IEEE Transactions on Circuits and Systems I: Regular Papers.

[9]  Siddharth Sridhar,et al.  Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.

[10]  S. Sastry,et al.  SCADA-specific Intrusion Detection / Prevention Systems : A Survey and Taxonomy , 2010 .

[11]  Jiajing Wu,et al.  Robustness of Interdependent Power Grids and Communication Networks: A Complex Network Perspective , 2018, IEEE Transactions on Circuits and Systems II: Express Briefs.

[12]  Thomas H. Morris,et al.  Modeling Cyber-Physical Vulnerability of the Smart Grid With Incomplete Information , 2013, IEEE Transactions on Smart Grid.

[13]  Hans D. Schotten,et al.  Two decades of SCADA exploitation: A brief history , 2017, 2017 IEEE Conference on Application, Information and Network Security (AINS).

[14]  Xinghuo Yu,et al.  Smart Grids: A Cyber–Physical Systems Perspective , 2016, Proceedings of the IEEE.

[15]  Leandros A. Maglaras,et al.  Intrusion detection in SCADA systems using machine learning techniques , 2014, 2014 Science and Information Conference.

[16]  Hamid Reza Karimi,et al.  An Adaptive Event-Triggered Synchronization Approach for Chaotic Lur’e Systems Subject to Aperiodic Sampled Data , 2019, IEEE Transactions on Circuits and Systems II: Express Briefs.

[17]  Shenxing Shi,et al.  SKM: Scalable Key Management for Advanced Metering Infrastructure in Smart Grids , 2014, IEEE Transactions on Industrial Electronics.

[18]  Bin Liu,et al.  Recognition and Vulnerability Analysis of Key Nodes in Power Grid Based on Complex Network Centrality , 2018, IEEE Transactions on Circuits and Systems II: Express Briefs.

[19]  José M. F. Moura,et al.  Modeling of Future Cyber–Physical Energy Systems for Distributed Sensing and Control , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[20]  Chi K. Tse,et al.  Effects of Cyber Coupling on Cascading Failures in Power Systems , 2017, IEEE Journal on Emerging and Selected Topics in Circuits and Systems.

[21]  Ing-Ray Chen,et al.  A survey of intrusion detection techniques for cyber-physical systems , 2014, ACM Comput. Surv..

[22]  Guanrong Chen,et al.  Complex networks: small-world, scale-free and beyond , 2003 .

[23]  Haibo He,et al.  Cyber-physical attacks and defences in the smart grid: a survey , 2016, IET Cyper-Phys. Syst.: Theory & Appl..

[24]  Jure Leskovec,et al.  {SNAP Datasets}: {Stanford} Large Network Dataset Collection , 2014 .

[25]  Wenyuan Xu,et al.  On modeling of electrical cyber-physical systems considering cyber security , 2016, Frontiers of Information Technology & Electronic Engineering.

[26]  S. Havlin,et al.  Interdependent networks: reducing the coupling strength leads to a change from a first to second order percolation transition. , 2010, Physical review letters.

[27]  Haibo He,et al.  Resilience Analysis of Power Grids Under the Sequential Attack , 2014, IEEE Transactions on Information Forensics and Security.

[28]  P. Kundur,et al.  Definition and classification of power system stability IEEE/CIGRE joint task force on stability terms and definitions , 2004, IEEE Transactions on Power Systems.

[29]  Xiangpeng Xie,et al.  State estimation for cyber-physical systems with limited communication resources, sensor saturation and denial-of-service attacks. , 2020, ISA transactions.

[30]  Daizhan Cheng,et al.  Characterizing the synchronizability of small-world dynamical networks , 2004, IEEE Transactions on Circuits and Systems I: Regular Papers.

[31]  David K. Y. Yau,et al.  Markov Game Analysis for Attack-Defense of Power Networks Under Possible Misinformation , 2013, IEEE Transactions on Power Systems.

[32]  Insup Lee,et al.  Cyber-physical systems: The next computing revolution , 2010, Design Automation Conference.