Blockchain Based Decentralized Cyber Attack Detection for Large Scale Power Systems

Large scale power systems are comprised of regional utilities with IIoT enabled assets that stream sensor readings in real time. In order to detect cyberattacks, the globally acquired, real time sensor data needs to be analyzed in a centralized fashion. However, owing to operational constraints, such a centralized sharing mechanism turns out to be a major obstacle. In this paper, we propose a blockchain based decentralized framework for detecting coordinated replay attacks with full privacy of sensor data. We develop a Bayesian inference mechanism employing locally reported attack probabilities that is tailor made for a blockchain framework. We compare our framework to a traditional decentralized algorithm based on the broadcast gossip framework both theoretically as well as empirically. With the help of experiments on a private Ethereum blockchain, we show that our approach achieves good detection quality and significantly outperforms gossip driven approaches in terms of accuracy, timeliness and scalability.

[1]  Jiafu Wan,et al.  A Blockchain-Based Solution for Enhancing Security and Privacy in Smart Factory , 2019, IEEE Transactions on Industrial Informatics.

[2]  Y. Benjamini,et al.  THE CONTROL OF THE FALSE DISCOVERY RATE IN MULTIPLE TESTING UNDER DEPENDENCY , 2001 .

[3]  Zhao Yang Dong,et al.  Distributed Blockchain-Based Data Protection Framework for Modern Power Systems Against Cyber Attacks , 2019, IEEE Transactions on Smart Grid.

[4]  M. A. Athans,et al.  The role and use of the stochastic linear-quadratic-Gaussian problem in control system design , 1971 .

[5]  Paritosh Ramanan,et al.  BAFFLE : Blockchain Based Aggregator Free Federated Learning , 2020, 2020 IEEE International Conference on Blockchain (Blockchain).

[6]  Joe Weiss Aurora generator test , 2016 .

[7]  Paritosh Ramanan,et al.  Deep Learning Based Covert Attack Identification for Industrial Control Systems , 2020, 2020 19th IEEE International Conference on Machine Learning and Applications (ICMLA).

[8]  Dong-Ho Kang,et al.  Cyber threats and defence approaches in SCADA systems , 2014, 16th International Conference on Advanced Communication Technology.

[9]  Henrik Sandberg,et al.  Limiting the Impact of Stealthy Attacks on Industrial Control Systems , 2016, CCS.

[10]  Roy S. Smith,et al.  A Decoupled Feedback Structure for Covertly Appropriating Networked Control Systems , 2011 .

[11]  D. Kushner,et al.  The real story of stuxnet , 2013, IEEE Spectrum.

[12]  Michael Mylrea,et al.  Blockchain: A path to grid modernization and cyber resiliency , 2017, 2017 North American Power Symposium (NAPS).

[13]  Bruno Sinopoli,et al.  Detecting Integrity Attacks on SCADA Systems , 2014, IEEE Transactions on Control Systems Technology.

[14]  Frank Kargl,et al.  Specification Mining for Intrusion Detection in Networked Control Systems , 2016, USENIX Security Symposium.

[15]  Petros G. Voulgaris,et al.  On optimal ℓ∞ to ℓ∞ filtering , 1995, Autom..

[16]  Nagi Gebraeel,et al.  Detection and Differentiation of Replay Attack and Equipment Faults in SCADA Systems , 2021, IEEE Transactions on Automation Science and Engineering.

[17]  John S. Heidemann,et al.  Privacy Principles for Sharing Cyber Security Data , 2015, 2015 IEEE Security and Privacy Workshops.

[18]  Hongtao Sun,et al.  A Survey on Security Communication and Control for Smart Grids Under Malicious Cyber Attacks , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[19]  Max Mühlhäuser,et al.  Towards Blockchain-Based Collaborative Intrusion Detection Systems , 2017, CRITIS.

[20]  Md. Apel Mahmud,et al.  Multi-Agent Approach for Enhancing Security of Protection Schemes in Cyber-Physical Energy Systems , 2017, IEEE Transactions on Industrial Informatics.

[21]  Anand D. Sarwate,et al.  Broadcast Gossip Algorithms for Consensus , 2009, IEEE Transactions on Signal Processing.

[22]  Gaetano Zizzo,et al.  A Technical Approach to the Energy Blockchain in Microgrids , 2018, IEEE Transactions on Industrial Informatics.

[23]  Stephen P. Boyd,et al.  Randomized gossip algorithms , 2006, IEEE Transactions on Information Theory.

[24]  Ricard V. Solé,et al.  Topological Vulnerability of the European Power Grid under Errors and Attacks , 2007, Int. J. Bifurc. Chaos.

[25]  Bharadwaj Satchidanandan,et al.  An Online Detection Framework for Cyber Attacks on Automatic Generation Control , 2017, IEEE Transactions on Power Systems.

[26]  Vito Latora,et al.  Modeling cascading failures in the North American power grid , 2005 .

[27]  Mianxiong Dong,et al.  Secure and Efficient Vehicle-to-Grid Energy Trading in Cyber Physical Systems: Integration of Blockchain and Edge Computing , 2020, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[28]  Shuai Wang,et al.  Blockchain-Enabled Smart Contracts: Architecture, Applications, and Future Trends , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[29]  Roberto Baldoni,et al.  PBFT vs Proof-of-Authority: Applying the CAP Theorem to Permissioned Blockchain , 2018, ITASEC.

[30]  Lang Tong,et al.  Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.

[31]  Robert Radvanovsky,et al.  Handbook of SCADA/control systems security , 2013 .

[32]  Sandip C. Patel,et al.  Securing SCADA systems , 2008, Inf. Manag. Comput. Secur..

[33]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.