Power System Reliability Analysis With Intrusion Tolerance in SCADA Systems

By intruding on the substations and control center of the supervisory control and data acquisition system, trip commands can be sent to intelligent electronic devices that control the power system breakers. Reliability of the power system can be impacted through the cyberattacks. In this paper, a modified semi-Markov process (SMP) model is used to describe the procedures of normal and penetration attacks against the intrusion tolerant system. By modeling the transition probabilities between the SMP states and sojourn time of each SMP state, the mean times to compromise the normal and penetration attacks are calculated. With increased probabilities of breaker trips resulted from the cyberattacks, the loss of load probabilities are evaluated based on IEEE reliability test system 79. When the level of attack increases or the level of defense in the system decreases, the simulation results demonstrate that the power system becomes less reliable.

[1]  G. Manimaran,et al.  Vulnerability Assessment of Cybersecurity for SCADA Systems , 2008, IEEE Transactions on Power Systems.

[2]  Wenbing Zhao,et al.  Byzantine Fault Tolerance for Electric Power Grid Monitoring and Control , 2008, 2008 International Conference on Embedded Software and Systems.

[3]  Miles A. McQueen,et al.  Time-to-Compromise Model for Cyber Risk Reduction Estimation , 2006, Quality of Protection.

[4]  N.I. Voropai,et al.  Blackouts in North America and Europe: Analysis and generalization , 2005, 2005 IEEE Russia Power Tech.

[5]  Wenyuan Li,et al.  Reliability Assessment of Electric Power Systems Using Monte Carlo Methods , 1994 .

[6]  Briam Johnson,et al.  National SCADA Test Bed Substation Automation Evaluation Report , 2009 .

[7]  Chen-Ching Liu,et al.  Intruders in the Grid , 2012, IEEE Power and Energy Magazine.

[8]  M. Amin,et al.  Security challenges for the electricity infrastructure , 2002 .

[9]  Nikolaos Limnios Dependability analysis of semi-Markov systems , 1997 .

[10]  Frank Chan,et al.  A fully integrated substation LAN network for protection, control and data acquisition , 2009, 2009 IEEE Power & Energy Society General Meeting.

[11]  F. Bouffard,et al.  Keeping the lights on and the information flowing , 2009, IEEE Power and Energy Magazine.

[12]  William Nzoukou,et al.  A Unified Framework for Measuring a Network's Mean Time-to-Compromise , 2013, 2013 IEEE 32nd International Symposium on Reliable Distributed Systems.

[13]  G. Dondossola,et al.  Cyber risk assessment of power control systems — A metrics weighed by attack experiments , 2011, 2011 IEEE Power and Energy Society General Meeting.

[14]  Bharat B. Madan,et al.  A method for modeling and quantifying the security attributes of intrusion tolerant systems , 2004, Perform. Evaluation.

[15]  Daniel S. Kirschen,et al.  Assessing the effect of failures in the information and communication infrastructure on power system reliability , 2011, 2011 IEEE/PES Power Systems Conference and Exposition.

[16]  William H. Sanders,et al.  Probabilistic validation of an intrusion-tolerant replication system , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..

[17]  Ian Dobson,et al.  Cascading dynamics and mitigation assessment in power system disturbances via a hidden failure model , 2005 .

[18]  David John Leversage,et al.  Estimating a System's Mean Time-to-Compromise , 2008, IEEE Security & Privacy.

[19]  R. Pyke Markov renewal processes: Definitions and preliminary properties , 1961 .

[20]  Farrokh Aminifar,et al.  Impact of WAMS Malfunction on Power System Reliability Assessment , 2012, IEEE Transactions on Smart Grid.

[21]  Probability Subcommittee,et al.  IEEE Reliability Test System , 1979, IEEE Transactions on Power Apparatus and Systems.

[22]  Edgar Toshiro Yano,et al.  Towards a Framework to Detect Multi-stage Advanced Persistent Threats Attacks , 2014, 2014 IEEE 8th International Symposium on Service Oriented System Engineering.

[23]  S. Dharmaraja,et al.  Semi-Markov modeling of dependability of VoIP network in the presence of resource degradation and security attacks , 2011, Reliab. Eng. Syst. Saf..

[24]  Miles A. McQueen,et al.  Quantitative Cyber Risk Reduction Estimation Methodology for a Small SCADA Control System , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).

[25]  Dong Wei,et al.  Survivable SCADA Via Intrusion-Tolerant Replication , 2014, IEEE Transactions on Smart Grid.

[26]  Fazirulhisyam Hashim,et al.  An intrusion tolerant system for improving availability in smart grid control centers , 2012, 2012 18th IEEE International Conference on Networks (ICON).

[27]  T. G. Lewis,et al.  A general defender-attacker risk model for networks , 2008 .

[28]  Bingyang Li,et al.  Adaptive Hierarchical Intrusion Tolerant Model Based on Autonomic Computing , 2008, 2008 International Conference on Security Technology.

[29]  Siddharth Sridhar,et al.  Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.

[30]  William H. Sanders,et al.  Model-based validation of an intrusion-tolerant information system , 2004, Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems, 2004..

[31]  M. Fotuhi-Firuzabad,et al.  Optimal PMU Placement Based on Probabilistic Cost/Benefit Analysis , 2013, IEEE Transactions on Power Systems.