Deep Reinforcement Learning for Cybersecurity Assessment of Wind Integrated Power Systems

The integration of renewable energy sources (RES) is rapidly increasing in electric power systems (EPS). While the inclusion of intermittent RES coupled with the wide-scale deployment of communication and sensing devices is important towards a fully smart grid, it has also expanded the cyber-threat landscape, effectively making power systems vulnerable to cyberattacks. This article proposes a cybersecurity assessment approach designed to assess the cyberphysical security of EPS. The work takes into consideration the intermittent generation of RES, vulnerabilities introduced by microprocessor-based electronic information and operational technology (IT/OT) devices, and contingency analysis results. The proposed approach utilizes deep reinforcement learning (DRL) and an adapted Common Vulnerability Scoring System (CVSS) score tailored to assess vulnerabilities in EPS in order to identify the optimal attack transition policy based on <inline-formula> <tex-math notation="LaTeX">$N-2$ </tex-math></inline-formula> contingency results, i.e., the simultaneous failure of two system elements. The effectiveness of the work is validated via numerical and real-time simulation experiments performed on literature-based power grid test cases. The results demonstrate how the proposed method based on deep <inline-formula> <tex-math notation="LaTeX">$Q$ </tex-math></inline-formula>-network (<inline-formula> <tex-math notation="LaTeX">$\text{D}Q\text{N}$ </tex-math></inline-formula>) performs closely to a graph-search approach in terms of the number of transitions needed to find the optimal attack policy, without the need for full observation of the system. In addition, the experiments present the method’s scalability by showcasing the number of transitions needed to find the optimal attack transition policy in a large system such as the Polish 2383 bus test system. The results exhibit how the proposed approach requires one order of magnitude fewer transitions when compared to a <italic>random</italic> transition policy.

[1]  Adam Hahn,et al.  CyPhyR: a cyber-physical analysis tool for measuring and enabling resiliency in microgrids , 2019, IET Cyper-Phys. Syst.: Theory & Appl..

[2]  Renke Huang,et al.  Adaptive Power System Emergency Control Using Deep Reinforcement Learning , 2019, IEEE Transactions on Smart Grid.

[3]  Vijay Janapa Reddi,et al.  Deep Reinforcement Learning for Cyber Security , 2019, IEEE Transactions on Neural Networks and Learning Systems.

[4]  Michail Maniatakos,et al.  Assessment of Low-Budget Targeted Cyberattacks Against Power Systems , 2018, VLSI-SoC.

[5]  Anastasis Keliris,et al.  GE Multilin SR Protective Relays Passcode Vulnerability , 2017 .

[6]  Antonio J. Conejo,et al.  Probabilistic power flow with correlated wind sources , 2010 .

[7]  Charalambos Konstantinou,et al.  Defensive Cost-Benefit Analysis of Smart Grid Digital Functionalities , 2021, International Journal of Critical Infrastructure Protection.

[8]  Alex Graves,et al.  Playing Atari with Deep Reinforcement Learning , 2013, ArXiv.

[9]  Jiqiang Liu,et al.  Adversarial attack and defense in reinforcement learning-from AI security view , 2019, Cybersecur..

[10]  Michail Maniatakos,et al.  Hardware-Layer Intelligence Collection for Smart Grid Embedded Systems , 2019, Journal of Hardware and Systems Security.

[11]  Lingfeng Wang,et al.  Power System Reliability Evaluation With SCADA Cybersecurity Considerations , 2015, IEEE Transactions on Smart Grid.

[12]  Yiting Zhao,et al.  Graph-based Preconditioning Conjugate Gradient Algorithm for "N-1" Contingency Analysis , 2018, 2018 IEEE Power & Energy Society General Meeting (PESGM).

[13]  Karen A. Scarfone,et al.  The Common Misuse Scoring System (CMSS): Metrics for Software Feature Misuse Vulnerabilities , 2012 .

[14]  Hamed Mohsenian-Rad,et al.  Dynamic Load Altering Attacks Against Power System Stability: Attack Models and Protection Schemes , 2017, IEEE Transactions on Smart Grid.

[15]  Michail Maniatakos,et al.  Open Source Intelligence for Energy Sector Cyberattacks , 2019, Advanced Sciences and Technologies for Security Applications.

[16]  Russell Bent,et al.  Unit commitment with N-1 Security and wind uncertainty , 2016, 2016 Power Systems Computation Conference (PSCC).

[17]  Shane Legg,et al.  Human-level control through deep reinforcement learning , 2015, Nature.

[18]  Haibo He,et al.  Coordinated Topology Attacks in Smart Grid Using Deep Reinforcement Learning , 2021, IEEE Transactions on Industrial Informatics.

[19]  Michail Maniatakos,et al.  Attacking the smart grid using public information , 2016, 2016 17th Latin-American Test Symposium (LATS).

[20]  H. Bevrani,et al.  Intelligent Power System Frequency Regulations Concerning the Integration of Wind Power Units , 2010 .

[21]  Karen A. Scarfone,et al.  The Common Configuration Scoring System (CCSS): Metrics for Software Security Configuration Vulnerabilities , 2010 .

[22]  Reza Ghazi,et al.  Power system security assessment with high wind penetration using the farms models based on their correlation , 2017 .

[23]  John Lygeros,et al.  A Probabilistic Framework for Reserve Scheduling and ${\rm N}-1$ Security Assessment of Systems With High Wind Power Penetration , 2013, IEEE Transactions on Power Systems.

[24]  Michail Maniatakos,et al.  The Cybersecurity Landscape in Industrial Control Systems , 2016, Proceedings of the IEEE.

[25]  Deepak Joshi,et al.  Contingency analysis of power system by using voltage and active power performance index , 2016, 2016 IEEE 1st International Conference on Power Electronics, Intelligent Control and Energy Systems (ICPEICES).

[26]  Konstantin S. Turitsyn,et al.  Fast Algorithm for N-2 Contingency Problem , 2013, 2013 46th Hawaii International Conference on System Sciences.

[27]  Karen A. Scarfone,et al.  A Complete Guide to the Common Vulnerability Scoring System Version 2.0 | NIST , 2007 .

[28]  Christian Rehtanz,et al.  Cyber-Physical Energy and Power Systems , 2020 .

[29]  Le-Ren Chang-Chien,et al.  Dynamic Reserve Allocation for System Contingency by DFIG Wind Farms , 2008, IEEE Transactions on Power Systems.

[30]  Ross Baldick,et al.  Not Everything is Dark and Gloomy: Power Grid Protections Against IoT Demand Attacks , 2019, USENIX Security Symposium.

[31]  Xiaorui Liu,et al.  Reinforcement Learning for Cyber-Physical Security Assessment of Power Systems , 2019, 2019 IEEE Milan PowerTech.

[32]  Katherine R. Davis,et al.  A Cyber-Physical Modeling and Assessment Framework for Power Grid Infrastructures , 2015, IEEE Transactions on Smart Grid.

[33]  D. Gritzalis,et al.  Critical Infrastructure Security and Resilience , 2019, Advanced Sciences and Technologies for Security Applications.

[34]  Lei Yang,et al.  DeepGrid: Robust Deep Reinforcement Learning-based Contingency Management , 2020, 2020 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT).

[35]  Gabor Karsai,et al.  Heuristics-based approach for identifying critical N — k contingencies in power systems , 2017, 2017 Resilience Week (RWS).

[36]  Daniel K. Molzahn,et al.  Optimization and Control of Electric Power Systems , 2014 .

[37]  Tao Jiang,et al.  Robust Scheduling for Wind Integrated Energy Systems Considering Gas Pipeline and Power Transmission N–1 Contingencies , 2017, IEEE Transactions on Power Systems.

[38]  Saman A. Zonouz,et al.  CPIndex: Cyber-Physical Vulnerability Assessment for Power-Grid Infrastructures , 2015, IEEE Transactions on Smart Grid.

[39]  G. C. Ejebe,et al.  Fast contingency screening and evaluation for voltage security analysis , 1988 .

[40]  Michail Maniatakos,et al.  Low-budget Energy Sector Cyberattacks via Open Source Exploitation , 2018, 2018 IFIP/IEEE International Conference on Very Large Scale Integration (VLSI-SoC).

[41]  Anjan Bose,et al.  On-line power system security analysis , 1992, Proc. IEEE.

[42]  Michail Maniatakos,et al.  Security analysis of smart grid , 2017 .

[43]  Osama A. Mohammed,et al.  On the adaptive protection of microgrids: A review on how to mitigate cyber attacks and communication failures , 2017, 2017 IEEE Industry Applications Society Annual Meeting.