A Noninvasive Threat Analyzer for Advanced Metering Infrastructure in Smart Grid

Advanced Metering Infrastructure (AMI) is the core component in a smart grid that exhibits a highly complex network configuration. AMI comprises heterogeneous cyber-physical components, which are interconnected through different communication media, protocols, and security measures. They are operated using different data delivery modes and security policies. The inherent complexity and heterogeneity in AMI significantly increases the potential of security threats due to misconfiguration or absence of defense, which may cause devastating damage to AMI. Therefore, there is a need for creating a formal model that can represent the global behavior of AMI configuration in order to verify the potential threats. In this paper, we present SmartAnalyzer, a security analysis tool, which offers manifold contributions: (i) formal modeling of AMI configuration that includes device configurations, topology, communication properties, interactions among the devices, data flows, and security properties; (ii) formal modeling of AMI invariants and user-driven constraints based on the interdependencies among AMI device configurations, security properties, and security control guidelines; (iii) verifying the AMI configuration's compliance with security constraints using a Satisfiability Modulo Theory (SMT) solver; (iv) reporting of potential security threats based on constraint violations, (v) analyzing the impact of potential threats on the system; and (vi) systematic diagnosing of SMT unsatisfiable traces and providing necessary remediation plans. The accuracy and scalability of the tool are evaluated on an AMI testbed and various synthetic test networks.

[1]  Matthew Harvey,et al.  Visualizing NISTIR 7628, Guidelines for Smart Grid Cyber Security , 2014, 2014 Power and Energy Conference at Illinois (PECI).

[2]  Yong Wang,et al.  Computational Intelligence Algorithms Analysis for Smart Grid Cyber Security , 2010, ICSI.

[3]  Ehab Al-Shaer,et al.  Discovery of policy anomalies in distributed firewalls , 2004, IEEE INFOCOM 2004.

[4]  Andrew W. Appel,et al.  MulVAL: A Logic-based Network Security Analyzer , 2005, USENIX Security Symposium.

[5]  Sushil Jajodia,et al.  Attack Graphs for Sensor Placement , Alert Prioritization , and Attack Response , 2008 .

[6]  G. W. Hart,et al.  Nonintrusive appliance load monitoring , 1992, Proc. IEEE.

[7]  Indrajit Ray,et al.  Optimal security hardening using multi-objective optimization on attack tree models of networks , 2007, CCS '07.

[8]  Pallab Dasgupta,et al.  Policy Based Security Analysis in Enterprise Networks: A Formal Approach , 2010, IEEE Transactions on Network and Service Management.

[9]  Ye Wang,et al.  Shadow configuration as a network management primitive , 2008, SIGCOMM '08.

[10]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[11]  Dmitry Podkuiko,et al.  Energy Theft in the Advanced Metering Infrastructure , 2009, CRITIS.

[12]  Coniferous softwood GENERAL TERMS , 2003 .

[13]  Zahid Anwar,et al.  Automatic security assessment of critical cyber-infrastructures , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).

[14]  Patrick D. McDaniel,et al.  Security and Privacy Challenges in the Smart Grid , 2009, IEEE Security & Privacy.

[15]  L. D. Moura,et al.  The YICES SMT Solver , 2006 .

[16]  Dmitry Podkuiko,et al.  Multi-vendor penetration testing in the advanced metering infrastructure , 2010, ACSAC '10.

[17]  Nikolaj Bjørner,et al.  Z3: An Efficient SMT Solver , 2008, TACAS.

[18]  Albert Oliveras,et al.  On SAT Modulo Theories and Optimization Problems , 2006, SAT.

[19]  Ehab Al-Shaer,et al.  Network configuration in a box: towards end-to-end verification of network reachability and security , 2009, 2009 17th IEEE International Conference on Network Protocols.

[20]  Igor V. Kotenko,et al.  Attack Graph Based Evaluation of Network Security , 2006, Communications and Multimedia Security.

[21]  Ehab Al-Shaer,et al.  SmartAnalyzer: A noninvasive security threat analyzer for AMI smart grid , 2012, 2012 Proceedings IEEE INFOCOM.