An Overview About Detection of Cyber-Attacks on Power SCADA Systems

The power SCADA systems have been undergoing several upgrades over the years. At first, these systems were based only on isolated processes, without the need to connect in a global network, such as the Internet. In recent years, the access to such an open network has been critical for the SCADA systems, due to the need for data exchange across large areas, between geographically remote industrial plants, or even because of the demand for remote applications. Despite the SCADA systems have advantages by being now connected to a network such as the Internet, several problems can arise due to that. For example, such a connection makes it possible for an intruder to compromise the whole system. SCADA systems are essential in the new concept of smart grids and are widely used in the monitoring and control of Distributed Energy Resources (DER) based on photovoltaics. In that context, this paper presents an overview of the main attacks found and documented in the literature, as well as possible techniques to detect such attacks.

[1]  Gabriela Hug,et al.  Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks , 2012, IEEE Transactions on Smart Grid.

[2]  Akanksha Singh,et al.  A review of possibilities and solutions of cyber attacks in smart grids , 2016, 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH).

[3]  Bruno Sinopoli,et al.  Detecting Integrity Attacks on SCADA Systems , 2014, IEEE Transactions on Control Systems Technology.

[4]  Jian Fu,et al.  A Novel Data Analytical Approach for False Data Injection Cyber-Physical Attack Mitigation in Smart Grids , 2017, IEEE Access.

[5]  Xiaojiang Du,et al.  Achieving Efficient Detection Against False Data Injection Attacks in Smart Grid , 2017, IEEE Access.

[6]  Yanfei Sun,et al.  Strategic Honeypot Game Model for Distributed Denial of Service Attacks in the Smart Grid , 2017, IEEE Transactions on Smart Grid.

[7]  Ralph Langner,et al.  Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.

[8]  Rajendra Kumar Pandey,et al.  Cyber security threats — Smart grid infrastructure , 2016, 2016 National Power Systems Conference (NPSC).

[9]  Naganand Doraswamy,et al.  Ipsec: the new security standard for the internet , 1999 .

[10]  Vasilios A. Siris,et al.  Application of anomaly detection algorithms for detecting SYN flooding attacks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[11]  Toru Namerikawa,et al.  Detection of replay attack on smart grid with code signal and bargaining game , 2017, 2017 American Control Conference (ACC).

[12]  Jin Wei,et al.  Real-Time Detection of False Data Injection Attacks in Smart Grid: A Deep Learning-Based Intelligent Mechanism , 2017, IEEE Transactions on Smart Grid.

[13]  Hamzah Hilal,et al.  Network security analysis SCADA system automation on industrial process , 2017, 2017 International Conference on Broadband Communication, Wireless Sensors and Powering (BCWSP).

[14]  K. McLaughlin,et al.  Multiattribute SCADA-Specific Intrusion Detection System for Power Networks , 2014, IEEE Transactions on Power Delivery.

[15]  Rong Zheng,et al.  Detecting Stealthy False Data Injection Using Machine Learning in Smart Grid , 2017, IEEE Systems Journal.

[16]  Jaime Zuniga-Mejia,et al.  A Linear Systems Perspective on Intrusion Detection for Routing in Reconfigurable Wireless Networks , 2019, IEEE Access.

[17]  Rajesh Kalluri,et al.  Simulation and impact analysis of denial-of-service attacks on power SCADA , 2016, 2016 National Power Systems Conference (NPSC).

[18]  Tiago Antonio Rizzetti,et al.  Cyber security and communications network on SCADA systems in the context of Smart Grids , 2015, 2015 50th International Universities Power Engineering Conference (UPEC).

[19]  Ralph Langner To Kill a Centrifuge A Technical Analysis of What Stuxnet ’ s Creators Tried to Achieve , 2013 .

[20]  G. Manimaran,et al.  Data integrity attacks and their impacts on SCADA control system , 2010, IEEE PES General Meeting.

[21]  Esraa Alomari,et al.  Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art , 2012, ArXiv.

[22]  Leandros A. Maglaras,et al.  A Cybersecurity Detection Framework for Supervisory Control and Data Acquisition Systems , 2016, IEEE Transactions on Industrial Informatics.

[23]  A. P. A. D. Silva,et al.  State forecasting in electric power systems , 1983 .

[24]  Zhao Yang Dong,et al.  A Review of False Data Injection Attacks Against Modern Power Systems , 2017, IEEE Transactions on Smart Grid.

[25]  R. C. Diovu,et al.  A cloud-based openflow firewall for mitigation against DDoS attacks in smart grid AMI networks , 2017, 2017 IEEE PES PowerAfrica.

[26]  Lingfeng Wang,et al.  Power System Reliability Evaluation With SCADA Cybersecurity Considerations , 2015, IEEE Transactions on Smart Grid.

[27]  Ahmad Lotfi,et al.  Performance, Analysis, and Comparison of MrDR Method to Detect DoS Attacks in MANET , 2015, 2015 European Intelligence and Security Informatics Conference.

[28]  Wei Yu,et al.  On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures , 2014, IEEE Transactions on Parallel and Distributed Systems.

[29]  Junbo Zhao,et al.  Short-Term State Forecasting-Aided Method for Detection of Smart Grid General False Data Injection Attacks , 2017, IEEE Transactions on Smart Grid.

[30]  Panagiotis G. Sarigiannidis,et al.  Securing the Smart Grid: A Comprehensive Compilation of Intrusion Detection and Prevention Systems , 2019, IEEE Access.

[31]  Ramesh C. Bansal,et al.  Analytical strategies for renewable distributed generation integration considering energy loss minimization , 2013 .

[32]  Tzu-Liang Tseng,et al.  Secure SCADA communication network for detecting and preventing cyber-attacks on power systems , 2016, 2016 Clemson University Power Systems Conference (PSC).

[33]  Leandros A. Maglaras,et al.  Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems , 2015, J. Inf. Secur. Appl..

[34]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[35]  P. Rodriguez,et al.  Local Reactive Power Control Methods for Overvoltage Prevention of Distributed Solar Inverters in Low-Voltage Grids , 2011, IEEE Journal of Photovoltaics.

[36]  Frederick T. Sheldon,et al.  Detecting Stealthy False Data Injection Attacks in Power Grids Using Deep Learning , 2018, 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC).

[37]  R. C. Diovu,et al.  Quantitative analysis of firewall security under DDoS attacks in smart grid AMI networks , 2017, 2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON).

[38]  Vishwa Teja Alaparthy,et al.  A Multi-Level Intrusion Detection System for Wireless Sensor Networks Based on Immune Theory , 2018, IEEE Access.

[39]  Lucie Langer,et al.  Analysing cyber-physical attacks to a Smart Grid: A voltage control use case , 2016, 2016 Power Systems Computation Conference (PSCC).

[40]  Thomas M. Chen,et al.  Lessons from Stuxnet , 2011, Computer.

[41]  Eric Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.

[42]  Bill Rose,et al.  Microgrids , 2018, Smart Grids.

[43]  Peter Maynard,et al.  Investigating cyber-physical attacks against IEC 61850 photovoltaic inverter installations , 2015, 2015 IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA).

[44]  Zahir Tari,et al.  An Efficient Data-Driven Clustering Technique to Detect Attacks in SCADA Systems , 2016, IEEE Transactions on Information Forensics and Security.

[45]  Kit Po Wong,et al.  Forecasting-Aided Imperfect False Data Injection Attacks Against Power System Nonlinear State Estimation , 2016, IEEE Transactions on Smart Grid.

[46]  Wei Gao,et al.  On SCADA control system command and response injection and intrusion detection , 2010, 2010 eCrime Researchers Summit.

[47]  Stefano Panzieri,et al.  From Detecting Cyber-Attacks to Mitigating Risk Within a Hybrid Environment , 2019, IEEE Systems Journal.

[48]  Mauro Conti,et al.  A Survey of Man In The Middle Attacks , 2016, IEEE Communications Surveys & Tutorials.

[49]  Xiaodong Wang,et al.  Quickest Detection of False Data Injection Attack in Wide-Area Smart Grids , 2015, IEEE Transactions on Smart Grid.

[50]  Peter Willett,et al.  Feature article: security of SCADA systems against cyber–physical attacks , 2017, IEEE Aerospace and Electronic Systems Magazine.

[51]  Lang Tong,et al.  On Topology Attack of a Smart Grid: Undetectable Attacks and Countermeasures , 2013, IEEE Journal on Selected Areas in Communications.

[52]  Delly Oliveira Filho,et al.  Distributed photovoltaic generation and energy storage systems: A review , 2010 .

[53]  Guoqiang Hu,et al.  Secure Fusion Estimation for Bandwidth Constrained Cyber-Physical Systems Under Replay Attacks , 2018, IEEE Transactions on Cybernetics.