Modelling Load-Changing Attacks in Cyber-Physical Systems

Cyber-Physical Systems (CPS) are present in many settings addressing a myriad of purposes. Examples are Internet-of-Things (IoT) or sensing software embedded in appliances or even specialised meters that measure and respond to electricity demands in smart grids. Due to their pervasive nature, they are usually chosen as recipients for larger scope cyber-security attacks. Those promote system-wide disruptions and are directed towards one key aspect such as confidentiality, integrity, availability or a combination of those characteristics. Our paper focuses on a particular and distressing attack where coordinated malware infected IoT units are maliciously employed to synchronously turn on or off high-wattage appliances, affecting the grid's primary control management. Our model could be extended to larger (smart) grids, Active Buildings as well as similar infrastructures. Our approach models Coordinated Load-Changing Attacks (CLCA) also referred as GridLock or BlackIoT, against a theoretical power grid, containing various types of power plants. It employs Continuous-Time Markov Chains where elements such as Power Plants and Botnets are modelled under normal or attack situations to evaluate the effect of CLCA in power reliant infrastructures. We showcase our modelling approach in the scenario of a power supplier (e.g. power plant) being targeted by a botnet. We demonstrate how our modelling approach can quantify the impact of a botnet attack and be abstracted for any CPS system involving power load management in a smart grid. Our results show that by prioritising the type of power-plants, the impact of the attack may change: in particular, we find the most impacting attack times and show how different strategies impact their success. We also find the best power generator to use depending on the current demand and strength of attack.

[1]  D. Vere-Jones Markov Chains , 1972, Nature.

[2]  W. Marsden I and J , 2012 .

[3]  Stefan Tenbohlen,et al.  Optimization of unit commitment and economic dispatch in microgrids based on genetic algorithm and mixed integer linear programming , 2018 .

[4]  Jane Hillston,et al.  A compositional approach to performance modelling , 1996 .

[5]  N.P. Padhy,et al.  Unit commitment-a bibliographical survey , 2004, IEEE Transactions on Power Systems.

[6]  Anthony Papavasiliou,et al.  Application of Stochastic Dual Dynamic Programming to the Real-Time Dispatch of Storage Under Renewable Supply Uncertainty , 2018, IEEE Transactions on Sustainable Energy.

[7]  H. Vincent Poor,et al.  BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid , 2018, USENIX Security Symposium.

[8]  Insup Lee,et al.  Cyber-physical systems: The next computing revolution , 2010, Design Automation Conference.

[9]  Holger Hermanns,et al.  In the quantitative automata zoo , 2015, Sci. Comput. Program..

[10]  Xin Huang,et al.  A Denial of Service Attack Method for an IoT System , 2016, 2016 8th International Conference on Information Technology in Medicine and Education (ITME).

[11]  T.O. Ting,et al.  A novel approach for unit commitment problem via an effective hybrid particle swarm optimization , 2006, IEEE Transactions on Power Systems.

[12]  Charles Morisset,et al.  Generating Synthetic Data for Real World Detection of DoS Attacks in the IoT , 2018, STAF Workshops.

[13]  U. OmKumarC.,et al.  Detecting and confronting flash attacks from IoT botnets , 2019, J. Supercomput..

[14]  Sandeep K. Shukla,et al.  Using probabilistic model checking for dynamic power management , 2005, Formal Aspects of Computing.

[15]  William J. Stewart,et al.  Probability, Markov Chains, Queues, and Simulation: The Mathematical Basis of Performance Modeling , 2009 .

[16]  Brigitte Plateau,et al.  Stochastic Automata Network For Modeling Parallel Systems , 1991, IEEE Trans. Software Eng..

[17]  Susanna Donatelli,et al.  Superposed Generalized Stochastic Petri Nets: Definition and Efficient Solution , 1994, Application and Theory of Petri Nets.

[18]  Carl E. Landwehr,et al.  Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.

[19]  Dipti Srinivasan,et al.  A genetic algorithm - differential evolution based hybrid framework: Case study on unit commitment scheduling problem , 2016, Inf. Sci..

[20]  C.D. Vournas,et al.  Unit Commitment by an Enhanced Simulated Annealing Algorithm , 2006, 2006 IEEE PES Power Systems Conference and Exposition.

[21]  Thomas A. Henzinger,et al.  Reactive Modules , 1999, Formal Methods Syst. Des..

[22]  John McHugh,et al.  Queue Management as a DoS Counter-Measure? , 2007, ISC.

[23]  William J. Stewart,et al.  Performance Modelling and Markov Chains , 2007, SFM.

[24]  Edgar R. Weippl,et al.  Botnets causing blackouts: how coordinated load attacks can destabilize the power grid , 2018, Elektrotech. Informationstechnik.

[25]  Charles Morisset,et al.  Quantitative Analysis of DoS Attacks and Client Puzzles in IoT Systems , 2017, STM.

[26]  Jiankang Wang,et al.  Developing correlation indices to identify coordinated cyber-attacks on power grids , 2019, IET Cyper-Phys. Syst.: Theory & Appl..

[27]  Aarnout Brombacher,et al.  Probability... , 2009, Qual. Reliab. Eng. Int..

[28]  Adam Hahn,et al.  IoT Threats to the Smart Grid: A Framework for Analyzing Emerging Risks , 2019, Proceedings of the Northwest Cybersecurity Symposium.

[29]  Michael K. Molloy Performance Analysis Using Stochastic Petri Nets , 1982, IEEE Transactions on Computers.

[30]  A. L. Scherr,et al.  AN ANALYSIS OF TIME-SHARED COMPUTER SYSTEMS , 1965 .

[31]  George Kesidis,et al.  Denial-of-service attack-detection techniques , 2006, IEEE Internet Computing.

[32]  Marta Z. Kwiatkowska,et al.  PRISM 4.0: Verification of Probabilistic Real-Time Systems , 2011, CAV.

[33]  Edward A. Lee Cyber Physical Systems: Design Challenges , 2008, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC).

[34]  Edgar R. Weippl,et al.  Grid Shock: Coordinated Load-Changing Attacks on Power Grids: The Non-Smart Power Grid is Vulnerable to Cyber Attacks as Well , 2017, ACSAC.

[35]  Hendrik Baumann,et al.  Markovian Modeling and Security Measure Analysis for Networks under Flooding DoS Attacks , 2012, 2012 20th Euromicro International Conference on Parallel, Distributed and Network-based Processing.

[36]  Chen-Ching Liu,et al.  A coordinated cyber attack detection system (CCADS) for multiple substations , 2016, 2016 Power Systems Computation Conference (PSCC).

[37]  Rodrigo Roman,et al.  On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.