Deep Reinforcement Learning for Cybersecurity Assessment of Wind Integrated Power Systems

The integration of renewable energy sources (RES) is rapidly increasing in electric power systems (EPS). While the inclusion of intermittent RES coupled with the wide-scale deployment of communication and sensing devices is important towards a fully smart grid, it has also expanded the cyber-threat landscape, effectively making power systems vulnerable to cyberattacks. This article proposes a cybersecurity assessment approach designed to assess the cyberphysical security of EPS. The work takes into consideration the intermittent generation of RES, vulnerabilities introduced by microprocessor-based electronic information and operational technology (IT/OT) devices, and contingency analysis results. The proposed approach utilizes deep reinforcement learning (DRL) and an adapted Common Vulnerability Scoring System (CVSS) score tailored to assess vulnerabilities in EPS in order to identify the optimal attack transition policy based on <inline-formula> <tex-math notation="LaTeX">$N-2$ </tex-math></inline-formula> contingency results, i.e., the simultaneous failure of two system elements. The effectiveness of the work is validated via numerical and real-time simulation experiments performed on literature-based power grid test cases. The results demonstrate how the proposed method based on deep <inline-formula> <tex-math notation="LaTeX">$Q$ </tex-math></inline-formula>-network (<inline-formula> <tex-math notation="LaTeX">$\text{D}Q\text{N}$ </tex-math></inline-formula>) performs closely to a graph-search approach in terms of the number of transitions needed to find the optimal attack policy, without the need for full observation of the system. In addition, the experiments present the method’s scalability by showcasing the number of transitions needed to find the optimal attack transition policy in a large system such as the Polish 2383 bus test system. The results exhibit how the proposed approach requires one order of magnitude fewer transitions when compared to a <italic>random</italic> transition policy.

[1]  Shane Legg,et al.  Human-level control through deep reinforcement learning , 2015, Nature.

[2]  Le-Ren Chang-Chien,et al.  Dynamic Reserve Allocation for System Contingency by DFIG Wind Farms , 2008, IEEE Transactions on Power Systems.

[3]  Karen A. Scarfone,et al.  A Complete Guide to the Common Vulnerability Scoring System Version 2.0 | NIST , 2007 .

[4]  Charalambos Konstantinou,et al.  Defensive Cost-Benefit Analysis of Smart Grid Digital Functionalities , 2020, ArXiv.

[5]  Deepak Joshi,et al.  Contingency analysis of power system by using voltage and active power performance index , 2016, 2016 IEEE 1st International Conference on Power Electronics, Intelligent Control and Energy Systems (ICPEICES).

[6]  Yiting Zhao,et al.  Graph-based Preconditioning Conjugate Gradient Algorithm for "N-1" Contingency Analysis , 2018, 2018 IEEE Power & Energy Society General Meeting (PESGM).

[7]  Saman A. Zonouz,et al.  CPIndex: Cyber-Physical Vulnerability Assessment for Power-Grid Infrastructures , 2015, IEEE Transactions on Smart Grid.

[8]  Karen A. Scarfone,et al.  The Common Misuse Scoring System (CMSS): Metrics for Software Feature Misuse Vulnerabilities , 2012 .

[9]  Tao Jiang,et al.  Robust Scheduling for Wind Integrated Energy Systems Considering Gas Pipeline and Power Transmission N–1 Contingencies , 2017, IEEE Transactions on Power Systems.

[10]  Reza Ghazi,et al.  Power system security assessment with high wind penetration using the farms models based on their correlation , 2017 .

[11]  Daniel K. Molzahn,et al.  Optimization and Control of Electric Power Systems , 2014 .

[12]  Michail Maniatakos,et al.  Open Source Intelligence for Energy Sector Cyberattacks , 2019, Advanced Sciences and Technologies for Security Applications.

[13]  Katherine R. Davis,et al.  A Cyber-Physical Modeling and Assessment Framework for Power Grid Infrastructures , 2015, IEEE Transactions on Smart Grid.

[14]  Michail Maniatakos,et al.  The Cybersecurity Landscape in Industrial Control Systems , 2016, Proceedings of the IEEE.

[15]  Juan Ospina,et al.  DEMO: Trustworthy Cyberphysical Energy Systems: Time-Delay Attacks in a Real-Time Co-Simulation Environment , 2020 .

[16]  Lei Yang,et al.  DeepGrid: Robust Deep Reinforcement Learning-based Contingency Management , 2020, 2020 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT).

[17]  Vijay Janapa Reddi,et al.  Deep Reinforcement Learning for Cyber Security , 2019, IEEE Transactions on Neural Networks and Learning Systems.

[18]  Michail Maniatakos,et al.  Security analysis of smart grid , 2017 .

[19]  Renke Huang,et al.  Adaptive Power System Emergency Control Using Deep Reinforcement Learning , 2019, IEEE Transactions on Smart Grid.

[20]  Osama A. Mohammed,et al.  On the adaptive protection of microgrids: A review on how to mitigate cyber attacks and communication failures , 2017, 2017 IEEE Industry Applications Society Annual Meeting.

[21]  Michail Maniatakos,et al.  Assessment of Low-Budget Targeted Cyberattacks Against Power Systems , 2018, VLSI-SoC.

[22]  Antonio J. Conejo,et al.  Probabilistic power flow with correlated wind sources , 2010 .

[23]  Ross Baldick,et al.  Not Everything is Dark and Gloomy: Power Grid Protections Against IoT Demand Attacks , 2019, USENIX Security Symposium.

[24]  Michail Maniatakos,et al.  Hardware-Layer Intelligence Collection for Smart Grid Embedded Systems , 2019, Journal of Hardware and Systems Security.

[25]  Michail Maniatakos,et al.  Attacking the smart grid using public information , 2016, 2016 17th Latin-American Test Symposium (LATS).

[26]  Alex Graves,et al.  Playing Atari with Deep Reinforcement Learning , 2013, ArXiv.

[27]  Gabor Karsai,et al.  Heuristics-based approach for identifying critical N — k contingencies in power systems , 2017, 2017 Resilience Week (RWS).

[28]  Christian Rehtanz,et al.  Cyber-Physical Energy and Power Systems: Modeling, Analysis and Application , 2020 .

[29]  Xiaorui Liu,et al.  Reinforcement Learning for Cyber-Physical Security Assessment of Power Systems , 2019, 2019 IEEE Milan PowerTech.

[30]  Lingfeng Wang,et al.  Power System Reliability Evaluation With SCADA Cybersecurity Considerations , 2015, IEEE Transactions on Smart Grid.

[31]  Russell Bent,et al.  Unit commitment with N-1 Security and wind uncertainty , 2016, 2016 Power Systems Computation Conference (PSCC).

[32]  Michail Maniatakos,et al.  Low-budget Energy Sector Cyberattacks via Open Source Exploitation , 2018, 2018 IFIP/IEEE International Conference on Very Large Scale Integration (VLSI-SoC).

[33]  Karen A. Scarfone,et al.  The Common Configuration Scoring System (CCSS): Metrics for Software Security Configuration Vulnerabilities , 2010 .

[34]  H. Bevrani,et al.  Intelligent Power System Frequency Regulations Concerning the Integration of Wind Power Units , 2010 .

[35]  Adam Hahn,et al.  CyPhyR: a cyber-physical analysis tool for measuring and enabling resiliency in microgrids , 2019, IET Cyper-Phys. Syst.: Theory & Appl..

[36]  D. Gritzalis,et al.  Critical Infrastructure Security and Resilience , 2019, Advanced Sciences and Technologies for Security Applications.

[37]  John Lygeros,et al.  A Probabilistic Framework for Reserve Scheduling and ${\rm N}-1$ Security Assessment of Systems With High Wind Power Penetration , 2013, IEEE Transactions on Power Systems.

[38]  Konstantin S. Turitsyn,et al.  Fast Algorithm for N-2 Contingency Problem , 2013, 2013 46th Hawaii International Conference on System Sciences.

[39]  Anastasis Keliris,et al.  GE Multilin SR Protective Relays Passcode Vulnerability , 2017 .

[40]  G. C. Ejebe,et al.  Fast contingency screening and evaluation for voltage security analysis , 1988 .

[41]  Jiqiang Liu,et al.  Adversarial attack and defense in reinforcement learning-from AI security view , 2019, Cybersecur..

[42]  Haibo He,et al.  Coordinated Topology Attacks in Smart Grid Using Deep Reinforcement Learning , 2021, IEEE Transactions on Industrial Informatics.

[43]  Anjan Bose,et al.  On-line power system security analysis , 1992, Proc. IEEE.

[44]  Hamed Mohsenian-Rad,et al.  Dynamic Load Altering Attacks Against Power System Stability: Attack Models and Protection Schemes , 2017, IEEE Transactions on Smart Grid.