{"title":"Model-Based Detection of Coordinated Attacks (DCA) in Distribution Systems","authors":"Nitasha Sahani;Chen-Ching Liu","doi":"10.1109/OAJPE.2024.3489477","DOIUrl":null,"url":null,"abstract":"The fast-paced growth in digitization of smart grid components enhances system observability and remote-control capabilities through efficient communication. However, enhanced connectivity results in heightened system vulnerability towards cybersecurity risks in the cyber-physical power system. Coordinated cyber-attacks (CCA), when undetected, lead to system-wide impact in terms of large disturbances or widespread outages. Detecting CCA in the cyber layer is critical to thwart cyber-attacks in real-time before the attack impacts the physical system. The challenge of locating CCA stems from the complex grid dynamics, making it difficult to distinguish between normal operational variations and cyber-attack impact. CCA often employs multiple attack vectors targeting geographically distributed components, further complicating CCA identification. Existing research in intrusion detection is primarily focused on the transmission network and limited to detecting individual attacks. In this paper, a novel proactive DCA strategy is proposed for early detection of CCA by establishing correlations among distinct attack events through model-based reinforcement learning that utilizes abductive reasoning to conclude the attacker goal. The solution includes understanding the system model, learning the system dynamics, and correlating individual cyber-attacks to extract the attacker’s objective. The developed learning algorithm identifies the most probable attack path to reach the attacker’s objective by predicting the next attack steps. A DNP3-based cyber-physical co-simulation testbed is developed to test the proposed algorithm using the IEEE 13-node test feeder.","PeriodicalId":56187,"journal":{"name":"IEEE Open Access Journal of Power and Energy","volume":"11 ","pages":"558-570"},"PeriodicalIF":3.3000,"publicationDate":"2024-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10740327","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Open Access Journal of Power and Energy","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/10740327/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENERGY & FUELS","Score":null,"Total":0}
引用次数: 0
Abstract
The fast-paced growth in digitization of smart grid components enhances system observability and remote-control capabilities through efficient communication. However, enhanced connectivity results in heightened system vulnerability towards cybersecurity risks in the cyber-physical power system. Coordinated cyber-attacks (CCA), when undetected, lead to system-wide impact in terms of large disturbances or widespread outages. Detecting CCA in the cyber layer is critical to thwart cyber-attacks in real-time before the attack impacts the physical system. The challenge of locating CCA stems from the complex grid dynamics, making it difficult to distinguish between normal operational variations and cyber-attack impact. CCA often employs multiple attack vectors targeting geographically distributed components, further complicating CCA identification. Existing research in intrusion detection is primarily focused on the transmission network and limited to detecting individual attacks. In this paper, a novel proactive DCA strategy is proposed for early detection of CCA by establishing correlations among distinct attack events through model-based reinforcement learning that utilizes abductive reasoning to conclude the attacker goal. The solution includes understanding the system model, learning the system dynamics, and correlating individual cyber-attacks to extract the attacker’s objective. The developed learning algorithm identifies the most probable attack path to reach the attacker’s objective by predicting the next attack steps. A DNP3-based cyber-physical co-simulation testbed is developed to test the proposed algorithm using the IEEE 13-node test feeder.
智能电网组件数字化的快速发展通过高效通信增强了系统的可观测性和远程控制能力。然而,连接性的增强导致系统更容易受到网络物理电力系统中网络安全风险的影响。协同网络攻击(CCA)如果未被发现,就会对整个系统造成影响,导致大规模干扰或大面积停电。要在攻击影响物理系统之前实时挫败网络攻击,在网络层检测 CCA 至关重要。定位 CCA 所面临的挑战源于复杂的电网动态,因此很难区分正常运行变化和网络攻击影响。CCA 通常采用多种攻击载体,针对地理分布广泛的组件,这使得 CCA 的识别更加复杂。现有的入侵检测研究主要集中在输电网络上,仅限于检测单个攻击。本文提出了一种新型的主动式 DCA 策略,通过基于模型的强化学习建立不同攻击事件之间的相关性,利用归纳推理得出攻击者的目标,从而实现对 CCA 的早期检测。该解决方案包括理解系统模型、学习系统动态和关联单个网络攻击以提取攻击者的目标。所开发的学习算法通过预测下一步攻击步骤,确定最有可能达到攻击目标的攻击路径。开发了一个基于 DNP3 的网络物理协同仿真测试平台,利用 IEEE 13 节点测试馈线来测试所提出的算法。