Top Banner
Stealthy Cyber Attacks and Impact Analysis on Wide- Area Protection on Smart Grid Vivek Kumar Singh PhD Student, PowerCyber Lab Electrical & Computer Engineering Iowa State University 5/4/2017 North America Power Symposium 2016, Sep. 18-20, 2016, Denver, USA 1
14

Stealthy Cyber Attacks and Impact Analysis on Wide- Area …powercybersec.ece.iastate.edu/powercyber/download/presentations/… · 5/4/2017 North America Power Symposium 2016, Sep.

Aug 17, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Stealthy Cyber Attacks and Impact Analysis on Wide- Area …powercybersec.ece.iastate.edu/powercyber/download/presentations/… · 5/4/2017 North America Power Symposium 2016, Sep.

Stealthy Cyber Attacks and Impact Analysis on Wide-Area Protection on Smart Grid

Vivek Kumar Singh

PhD Student, PowerCyber Lab

Electrical & Computer Engineering

Iowa State University

5/4/2017 North America Power Symposium 2016, Sep. 18-20, 2016, Denver, USA 1

Page 2: Stealthy Cyber Attacks and Impact Analysis on Wide- Area …powercybersec.ece.iastate.edu/powercyber/download/presentations/… · 5/4/2017 North America Power Symposium 2016, Sep.

2

Smart grid Domains for Communication and electricity flows

The smart grid consists of large interconnected system with advancedcommunication technology for better control and monitoring functions.

The advancement in communication and data sharing devices has allowedincreased attack surfaces.

Cyber related sophisticated attacks has happened in the past few years.

Several reliability standards and roadmaps have been introduced through NISTIR7628, NERC CIP Compliance, FERC EISA Act, DOE smart grid recovery act programsetc.

Smart Grid-A Cyber Physical System

Page 3: Stealthy Cyber Attacks and Impact Analysis on Wide- Area …powercybersec.ece.iastate.edu/powercyber/download/presentations/… · 5/4/2017 North America Power Symposium 2016, Sep.

3

Cyber-Attacks on Ukraine Power Grid (Dec 23, 2015)

Impact of Cyber Attacks:• Complete shut down of 7 110 kv and 23 35 kv substations for 3 hours.• Affected multiple part of distribution grid. • 225,000 customers lost their power.

Smart Grid: Cyber Threat

[1] Robert M. Lee, Michael J. Assante, Tim Conway, “Analysis of the Cyber Attack on the Ukrainian Power Grid” SANS, Defense use case, March18, 2016.

Page 4: Stealthy Cyber Attacks and Impact Analysis on Wide- Area …powercybersec.ece.iastate.edu/powercyber/download/presentations/… · 5/4/2017 North America Power Symposium 2016, Sep.

4

WAMPAC Application in Smart Grid

State Estimation

Automatic Generation Control

Remedial Action Scheme

WAMPAC relies on SCADA communication network to

maintain power system stability

Page 5: Stealthy Cyber Attacks and Impact Analysis on Wide- Area …powercybersec.ece.iastate.edu/powercyber/download/presentations/… · 5/4/2017 North America Power Symposium 2016, Sep.

5

OUTLINE

Cyber-Physical Remedial Action Scheme

Motivation and Objective

Cyber Attack Modelling

Impact Analysis

Results and Discussions

Future Work

Page 6: Stealthy Cyber Attacks and Impact Analysis on Wide- Area …powercybersec.ece.iastate.edu/powercyber/download/presentations/… · 5/4/2017 North America Power Symposium 2016, Sep.

5/4/2017North America Power Symposium 2016, Sep. 18-20, 2016,

Denver, USA6

Remedial Action Schemes (RAS) – Automatic protection systems designed to

detect abnormal or predetermined system conditions, and take corrective actions

other than and/or in addition to the isolation of faulted components to maintain

system reliability.

Typical RAS corrective actions are :

• Changes in load (MW)

• Changes in generation (MW and MVAR)

• Changes in system configuration to maintain system stability, acceptable voltage or power flows

RAS controller

WAN

Relay x

Relay 1

Relay x

Relay 1

Monitoring Mitigation

Remote Substation x

Wide-Area Protection

Source: V. Madani, D. Novosel, S. Horowitz, M. Adamiak, J. Amantegui, D. Karlsson, S. Imai, and A. Apostolov, “Ieee psrc report on global industry experiences with system integrity protection schemes

(sips),” Power Delivery, IEEE Transactions on, vol. 25, pp. 2143 –2155, oct. 2010.

Page 7: Stealthy Cyber Attacks and Impact Analysis on Wide- Area …powercybersec.ece.iastate.edu/powercyber/download/presentations/… · 5/4/2017 North America Power Symposium 2016, Sep.

5/4/2017North America Power Symposium 2016, Sep. 18-20, 2016,

Denver, USA7

Overview of RAS scheme

Generation rejection RAS architecture asdefined by NERC*.

RAS action - Perform system restoration (auto-reclosing) along with corrective action usingbinary logic.

Relies on geographically distributed devices

Vulnerable to cyber attacks – Data Integrity, DoSand Coordinated attacks

RAS flow chart

Generation Rejection RAS

*Source: “Remedial Action Scheme” Definition Development, Project 2010-05.2 – Special Protection Systems, June 2014,

http://www.nerc.com/pa/Stand/Prjct201005_2SpclPrtctnSstmPhs2/FAQ_RAS_Definition_0604_final.pdf

Page 8: Stealthy Cyber Attacks and Impact Analysis on Wide- Area …powercybersec.ece.iastate.edu/powercyber/download/presentations/… · 5/4/2017 North America Power Symposium 2016, Sep.

5/4/2017North America Power Symposium 2016, Sep. 18-20, 2016,

Denver, USA8

Distributed RAS enabled IEEE 9 bus system

Line Tripped

RASc 1 RASc 2 RASc 3 Reduced Generation

(MW)

L45 1 - - 23L46 1 - - 18L78 - 1 - 18L75 - 1 - 53L98 - - 1 15L96 - - 1 35

Predefined Action Table

Data – relays status, line flows and power generationupdated every 0.1 seconds.

RAS Command – Corrective action taken by RAScontroller (RASc) based on predefined action table

Experimental Implementation

Page 9: Stealthy Cyber Attacks and Impact Analysis on Wide- Area …powercybersec.ece.iastate.edu/powercyber/download/presentations/… · 5/4/2017 North America Power Symposium 2016, Sep.

5/4/2017North America Power Symposium 2016, Sep. 18-20, 2016,

Denver, USA9

Power System Model

B2 B7

B5

Relay 1

Relay 2

G2

B8

Wide Area

Network

Relay 1

Relay 2RTDS

Control Center RTU

RASc 2Original

script

12

R R

3

Attacker

Fake

script

3

4

Malware (USB)

3

Steps involved during attack on RAS controller at bus 2

Stealthy Coordinated Attack on RAS

4

Page 10: Stealthy Cyber Attacks and Impact Analysis on Wide- Area …powercybersec.ece.iastate.edu/powercyber/download/presentations/… · 5/4/2017 North America Power Symposium 2016, Sep.

5/4/2017North America Power Symposium 2016, Sep. 18-20, 2016,

Denver, USA10

Coordinated Attack Scenario

• Trip relay R1 to trigger RAS – generator rejection scheme• Relay trip attack

• Pulse Generators on and off using malicious logic at RASc• Infect RASc with Malware and replace with malicious control logic

• Stale/outdated or fake status information to control center• Replay old information or fake status on telemetry

Impact Analysis for varying duty cycles of pulse attack

Cases -10%, 50%, 90% @ 4 seconds time period.

Page 11: Stealthy Cyber Attacks and Impact Analysis on Wide- Area …powercybersec.ece.iastate.edu/powercyber/download/presentations/… · 5/4/2017 North America Power Symposium 2016, Sep.

Impact Analysis – Evaluation on Power Cyber Testbed

Load voltages during attack (50% Duty cycle)

Load reference (Pset2), power output (P2), mechanical torque

(TM2), angular speed (W2) in RTDS.

Sample results - Pulse attack at 50% Duty cycle

11

Key takeaways• Periodic disturbances• Continuous fluctuation in the load voltages• Loss of synchronism• high probability of load shedding.

North America Power Symposium 2016, Sep. 18-20, 2016, Denver, USA

5/4/2017

Page 12: Stealthy Cyber Attacks and Impact Analysis on Wide- Area …powercybersec.ece.iastate.edu/powercyber/download/presentations/… · 5/4/2017 North America Power Symposium 2016, Sep.

Pulse attack at 10% Duty cycle

12

Pulse attack at 90% Duty cycle

Load reference (Pset2), power output (P2), mechanical torque (TM2)for10% duty cycle in RTDS.

Load reference (Pset2), power output (P2), mechanical torque (TM2) for 90% duty cycle in RTDS.

North America Power Symposium 2016, Sep. 18-20, 2016, Denver, USA5/4/2017

Page 13: Stealthy Cyber Attacks and Impact Analysis on Wide- Area …powercybersec.ece.iastate.edu/powercyber/download/presentations/… · 5/4/2017 North America Power Symposium 2016, Sep.

13

Results and Discussions

Results of Cyber Attacks

Higher duty cycles cause higher mechanical oscillations in

generator.

The higher duty cycle have more severe impact characteristics.

Huge monetary losses due to damage of generators.

It shows how the attacker can compromise the RAS scheme.

It described multiple steps involved in creating stealthy coordinated

attacks, undetected by control center.

Impact analysis for different classes of pulse attacks using

PowerCyber tested.

Stealthy coordinated attacks can have severe impact on system

stability.

Page 14: Stealthy Cyber Attacks and Impact Analysis on Wide- Area …powercybersec.ece.iastate.edu/powercyber/download/presentations/… · 5/4/2017 North America Power Symposium 2016, Sep.

5/4/2017North America Power Symposium 2016, Sep. 18-20, 2016,

Denver, USA14

Thank You !!!Queries…