Cyber-Based Contingency Analysis

Microprocessor-based relays protecting against fault current have revolutionized power automation industry. The leverage using commercially available information communication technologies has been the currency for future cyberinfrastructure deployment, which enables plausible electronic manipulation that can affect system operation. The bus differential protection has been recognized as one of the most critical protection schemes, if compromised, that would disconnect a large number of components within a substation. A hypothesized substation outage is the worst case scenario of intrusion attack events. This paper proposes an impact analysis of critical cyber assets in substations that capture historical load and topology conditions. This is to identify critical substations and other “nightmare” hypothesized combinations for security protection planning. The proposed metrics of attack scenarios incorporate electronic instrumentation in relation to the physical system for impact and dependency evaluation. Combinatorial verification of these hypothesized events based on the proposed reverse pyramid model (RPM) is validated using IEEE 30- and 118-bus systems.

[1]  Xiaofu Xiong,et al.  Incorporating fuzzy weather-related outages in transmission system reliability assessment , 2009 .

[2]  L Piètre-Cambacédès,et al.  Cybersecurity Myths on Power Control Systems: 21 Misconceptions and False Beliefs , 2011, IEEE Transactions on Power Delivery.

[3]  Anna Scaglione,et al.  Electrical centrality measures for electric power grid vulnerability analysis , 2010, 49th IEEE Conference on Decision and Control (CDC).

[4]  Anthony Lai,et al.  Evidence of Advanced Persistent Threat: A case study of malware for political espionage , 2011, 2011 6th International Conference on Malicious and Unwanted Software.

[5]  Ian Dobson,et al.  Examining criticality of blackouts in power system models with cascading events , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[6]  I. Dobson,et al.  Risk Assessment of Cascading Outages: Methodologies and Challenges , 2012, IEEE Transactions on Power Systems.

[7]  B.F. Wollenberg,et al.  Toward a smart grid: power delivery for the 21st century , 2005, IEEE Power and Energy Magazine.

[8]  F. Gubina,et al.  Determining the load profiles of consumers based on fuzzy logic and probability neural networks , 2004 .

[9]  Ivan Nunes da Silva,et al.  Load Profile Identification Interface for Consumer Online Monitoring Purposes in Smart Grids , 2013, IEEE Transactions on Industrial Informatics.

[10]  James S. Thorp,et al.  Expose hidden failures to prevent cascading outages [in power systems] , 1996 .

[11]  Andrew Ginter,et al.  Risk evaluation for hypothesized multiple busbar outages , 2014, 2014 IEEE PES General Meeting | Conference & Exposition.

[12]  Deepa Kundur,et al.  Switched system models for coordinated cyber-physical attack construction and simulation , 2011, 2011 IEEE First International Workshop on Smart Grid Modeling and Simulation (SGMS).

[13]  Saman A. Zonouz,et al.  CPIndex: Cyber-Physical Vulnerability Assessment for Power-Grid Infrastructures , 2015, IEEE Transactions on Smart Grid.

[14]  Lingfeng Wang,et al.  Prioritization of MTTC-based combinatorial evaluation for hypothesized substations outages , 2015, 2015 IEEE Power & Energy Society General Meeting.

[15]  James S. Thorp,et al.  Anatomy of power system blackouts: preventive relaying strategies , 1996 .

[16]  William H. Sanders,et al.  SOCCA: A Security-Oriented Cyber-Physical Contingency Analysis in Power Infrastructures , 2014, IEEE Transactions on Smart Grid.

[17]  D. Costello Lessons learned through commissioning and analyzing data from transformer differential installations , 2008, IEEE Transactions on Industry Applications.

[18]  Shengwei Mei,et al.  Impact quantification of hypothesized attack scenarios on bus differential relays , 2014, 2014 Power Systems Computation Conference.

[19]  A. K. Srivastava,et al.  Power system vulnerability analysis - towards validation of centrality measures , 2012, PES T&D 2012.

[20]  A.K. Sinha,et al.  Identification of Catastrophic Failures in Power System Using Pattern Recognition and Fuzzy Estimation , 2009, IEEE Transactions on Power Systems.

[21]  Chen-Ching Liu,et al.  Anomaly Detection for Cybersecurity of the Substations , 2011, IEEE Transactions on Smart Grid.

[22]  Andrew Ginter,et al.  Cyber-contingency evaluation for multiple hypothesized substation outages , 2014, ISGT 2014.