Conference PaperPDF Available

Risk Assessment for Cyber Attacks in Feeder Automation System

Authors:
Risk Assessment for Cyber Attacks in Feeder
Automation System
Qiangsheng Dai, Libao Shi, Yixin Ni
National Key Laboratory of Power Systems in Shenzhen,
Graduate School at Shenzhen, Tsinghua University, Shenzhen, 518055, China
shilb@sz.tsinghua.edu.cn
Abstract—The operating conditions of distribution system can
be perceived and optimized rapidly and effectively with the help
of information and communication technology. However, some
potential cybersecurity risk needs to arouse enough attention. In
this paper, a novel and practical cyber-attack method targeting
remote terminal unit (RTU) is proposed firstly. Regarding the
enormous cyber-physical devices in a distribution system and
the high maintenance costs, this paper also introduces a risk
index to identify the vulnerability of a distribution system to be
studied under cyber-attack. A Bayesian attack graph model is
applied to quantify the probability of successfully exploiting
known and zero-day vulnerabilities, and the relationship
between the attack behavior and the feeder automation action is
further analyzed. Simulation results demonstrate the
effectiveness and validity of the proposed model and method.
Index Terms--Cyber-physical system, cyber security, feeder
automation, Bayesian attack graph, risk assessment.
I. I
NTRODUCTION
In a distribution network, the safe, reliable and cost-
effective power supply cannot be separated from the
supervisory control and data acquisition (SCADA) system. It
is known that the SCADA system highly relies on the
integration of cyber and physical elements, and the SCADA
system is also one of the most important components to
implement the feeder automation (FA) that can protect the
electricity infrastructure and restore service to the outage areas
quickly. However, the deficiency and the vulnerability
existing in cyber surveillance system and cyber-physical
elements have posed severe threats to the distribution system
(DS). Recently, some electric utilities in China have found that
the potential weaknesses of distribution automation (DA)
communication system and the distribution terminal units
(DTUs) could be utilized to compromise the security of DS.
In recent years, due to the emergence of cyber-attack, there
have been extensive investigations of topics that attempt to
assess DS from different viewpoints involving security and
vulnerability [1-3]. Most of the existing research achievements
mainly focus on a hypothetical scene, that is, the DA system,
the protection system or the distributed energy resource are
damaged due to the cyber-attack, and the corresponding
assessment methods mostly use game theory and Monte Carlo
simulation, which are very difficult to be realized for practical
application. Especially, the zero-day vulnerability cannot be
analyzed quantitatively. On the other hand, several cyber-
attack detection methods have been developed to identify
some anomalous or malicious activities [4]. The
corresponding protection schemes and possible
communication risk mitigation mechanisms have also been
proposed [5][6]. In addition, some scholars have tried to
discover the cyber-physical interdependencies via setting up
the co-simulator of communication network and distribution
network [7].
All in all, this paper aims to study the vulnerability of DS
according to a proposed cyber-attack approach and a risk
index. Moreover, the likelihood of successful cyber-attack is
also quantified by applying Bayesian attack graph (BAG), and
the FA mechanism is considered in the analysis of attack
behavior.
II. P
ROBLEM
F
ORMULATION
Fig. 1 shows a typical structure of distribution network.
The top two layers (layer 1 and layer 2) indicate the cyber
system, and the bottom two layers (layer 3 and layer 4)
indicate the physical system. The power energy supplied from
the substation is distributed to the users in layer 4 via the main
feeders consisting of cables and overhead power lines located
in layer 3. Regarding the reliability of power supply, the
cables and overhead power lines are segmented by ring main
unit (RMU) and pole-mounted switch respectively. The open-
close statuses of these circuit breakers within each RMU and
the operating conditions of the DS are gathered by the DTUs
located in layer 2 and further uploaded to the master station in
layer 1 for further analysis. The DTUs will transmit system
operator’s control command to the corresponding breakers.
The communication function for a pole-mounted switch is
realized by feeder terminal units (FTUs).
Figure 1. Cyber-physical DS structure.
By directly releasing computer virus and malware to the
SCADA system or transmitting them from a communication
device, an attacker can control the master station of the DS in
order to cause the instantaneous power outage or even a
This work was supported in part by the National Basic Research
Program of China, 973 program (2013CB228203)
978-1-5386-7703-2/18/$31.00 ©2018 IEEE
Authorized licensed use limited to: Tsinghua University. Downloaded on March 01,2023 at 06:24:29 UTC from IEEE Xplore. Restrictions apply.
cascading blackout. Such case has always been the focus of
most studies. However, as the bi-directional firewall can block
any executable code, and the safe supervision mechanism of
the master station system will prevent any intrusion, this kind
of attack scenario rarely happens.
In fact, given the city appearance, the DTUs are often
installed in the inconspicuous area. The FTUs, mounted on the
distribution line pole, are usually about 3 meters away from
the ground according to the China’s national standards.
Therefore, these two kinds of unattended and widely used
remote terminal units (RTUs) are liable to be attacked. This
paper aims to investigate the corresponding consequences of
cyber-attack against the RTUs. Here, the following risk
assessment index (RI) is introduced to evaluate the cyber-
attack effects: = (1)
where denotes the probability of the vulnerability used to
initiate a successful attack; means the consequences caused
by the attack. Here, the vulnerabilities of RTUs will be
analyzed by using the BAG and the conditional probability
table (CPT). In response to the cyber-attack, the FA system
will operate to locate and isolate the fake “failure”, and finally
restore service to the unaffected users.
III. S
OLUTION
M
ETHOD
A. Bayesian Attack Graph Model
In this paper, the deliberate cyber-attacks will take
advantage of the vulnerabilities of RTUs to control local
device or tamper with the message being sent to the master
station or the other cyber devices. Fig. 2 shows the cyber
system of DTU1 as illustrated in Fig. 1. There are three cyber
components of circuit breakers and two cyber components of
instrument transformers, and each component corresponds to
the physical device in RMU. The micro control unit (MCU)
keeps inquiring the operation statuses of components under
abnormal conditions and uploading them periodically via the
optical network unit (ONU). The MCU can be reconfigured by
DS infrastructure maintainer via the debug interface when
updating software or adjusting profile. In some cases, this
debug interface could also be used by an attacker when the
RTU is available.
Figure 2. Cyber system of DTU1 located in layer 2.
According to a certain cybersecurity inspection report
issued by the China’s electric utility, most RTUs being
installed have unnecessary open networks and Remote
Operations Services (ROS), such as the Telnet, SSH, FTP and
SNMP etc. On the other hand, a large number of services can
be accessed by using some weak passwords. Accordingly, the
attacker can easily access the DTUs from ONU once
connecting to the communication network. Besides, most
RTUs have opened up the web service that can be used to
bypass the login mechanism and access privilege management
page directly.
In this paper, the BAG model is applied to illustrate the
dependences among vulnerabilities and the potential attack
paths quantitatively [8]. The BAG is expressed as a pair
<,>, where is a directed graph composed of nodes and
their relationships. The nodes represent the vulnerability and
its executive condition. denotes the set of probabilities
passing through each node. A node
pointed to node
means that the value of
depends on the value of
, which is
expressed as the parent of
. Each node in graph is
associated with the CPT constituted by . The corresponding
unique joint distribution can be described as follows:
(
,…,
)=(
|(
))

(2)
Figure 3. BAG model for the risk assessment of RTU.
Fig. 3 shows the BAG model for the risk assessment of
RTU as described in Fig. 2. This model aims to obtain the
privilege for the user(4) who can change the communication
data. In Fig.3, the item inside a rectangle means the operating
conditions of exploiting the corresponding vulnerability. The
conditions include privilege (host), service (host) and
connection (source host, destination host), respectively [9].
The item inside an oval denotes the vulnerability (service
name, source host, destination host). Especially the oval
marked by blue color means the zero-day vulnerability. It
should be noticed that the vulnerability can be exploited only
when all the operating conditions mentioned above must be
satisfied simultaneously. In Fig. 3, <ssh,1,2> is the zero-day
vulnerability existed in the ROS, and the <debug,1,2> is the
known flaw that these RTUs can be modified via the debug
interface. In order to access these RTUs, the services ssh(1)
and debug(1) must be available in advance. After connecting
to the services via <1,2>, the intercommunication privilege for
the user(2) can be achieved by exploiting any of two
vulnerabilities. Then by utilizing the vulnerability <login,2,3>
which can be found based on the login authorization
mechanism or the weak password, the control and parameter
setting privilege for the user(3) can be obtained. Meanwhile,
the known vulnerability <web,1,3> can directly obtain the
authority of control privilege. Finally, by exploiting the known
vulnerability <protocol,3,4> existed in the communication
protocol, the packet change privilege can be obtained.
In order to calculate the probability of final privilege being
successfully achieved, the probability of exploiting each
vulnerability independently without considering the
preconditions should be calculated firstly. Such probability
can be estimated through the common vulnerability scoring
system (CVSS) that produces a numerical score according to
the principal characteristics of a vulnerability, such as attack
vector, attack complexity, privileges required and user
interaction etc [10]. As illustrated in [8], the CVSS score of
zero-day vulnerability is set to be 0.8 in this paper.
Authorized licensed use limited to: Tsinghua University. Downloaded on March 01,2023 at 06:24:29 UTC from IEEE Xplore. Restrictions apply.
T
ABLE
I.
CPT
T
ABLE OF THE VULNERABILITY AND THE
C
ONDITION
user(3)
<login,2,3> <web,1,3> T F
T T 1 0
T F 1 0
F T 1 0
F F 0 1
Next, according to the BAG, a CPT is built to calculate the
post-probability with consideration of the preconditions. Table
I shows the CPT for the vulnerability <login,2,3> and the
condition user(3) as shown in Fig. 3. It can be seen from Table
I that the vulnerability can be exploited only when all the
preconditions are satisfied, and the condition can be attained
when any one of the vulnerabilities is exploited. Then the
probabilities of vulnerability (vul
) and condition (
)
can be calculated as follows:
(vul
)=
(
)

con
,con
∈
(3)
(
)=(1−vul
)∗(
),vul
∈
(4)
where
,
are the set of condition of the vulnerability vul
and the set of vulnerability before the condition 
,
respectively. As the CVSS score ranges from 0 to 10, the
score is divided by 10 to implement the normalization.
B. GOOSE-based Intelligent Distributed Approach
Relying on the communication that contains fault
information and refusing action information of breakers
among adjacent RTUs and the mutual collaboration between
them, the intelligent FA system can realize the fault location,
isolation and service restoration (FLISR) function. Based on
the generic object oriented substation event (GOOSE)
communication mechanism stated in IEC 61850 standard, the
communication delays should be less than 4ms. After
restoring the power supply, all the RTUs will upload the fault
information and the final fault processing results to the main
station. The 10kV circuit breakers located at the outlet of the
substation take the time-delayed overcurrent protection as the
general backup protection to isolate the fault current. This
function can also protect the physical devices from overload
operation.
As shown in Fig. 4, the feeder can be divided into several
power supply areas according to the breakers. Different
feeders are interconnected by the tie line breaker. The
intelligent distributed approach will judge a fault occurred in
the mth feeder and the kth power supply area
,
when the
only upstream breaker
reports fault signal (
,
,
). This
signal can be obtained when satisfying:
(
,
,
)

(
,
,
),
∈Ν
,
,
∈Μ
,
(5)
where Ν
,
, Μ
,
are the sets of all downstream breakers and
upstream breakers in
,
respectively. (⋅) denotes a non-
fault signal. It should be noticed that the
,
is restricted to
the non-terminal power supply area because there is no
downstream breaker. In our work, a virtual breaker signal for
the terminal power supply area, such as
,
which always
reports non-fault signal by default is applied during analysis. It
is known that the distribution network is generally designed
with the closed-loop idea and operated in open-loop topology,
i.e. every area has only one upstream breaker. Given that the
communication system in distributed FA is very reliable, the
fault signal from one feeder must be continuous. In other
words, the fault area can be confirmed under the condition
that the breaker before
must report the fault message

,
.
Figure 4. A typical DS with open-loop dual-feeder configuration.
According to (5), the non-tie-line breaker
will be
switched off automatically when its adjacent downstream
breaker
,
and upstream breaker
,
satisfy the following
condition:
((∧
,
∧(
)∧
,
)(󰇧∧
,
∧(
)

,
󰇨,
,
∈
,
,
∈
. (6)
where
and
are the sets of all downstream and upstream
breakers pertinent to breaker
. Once this breaker cannot be
tripped off immediately, it will report refusing action signal to
the adjacent breaker. Then the adjacent normal breaker will
operate to cut off the fault current, which may extend over the
blackout range.
Here, () denotes the off position state of the tie line
breaker
, and () denotes the on position state. The tie line
breaker
will be switched off to restore power supply under
the following condition:
((
))

,
∈Ο
(7)
where Ο
is the set of breakers between the substation and the
tie line at the mth main feeder. After finishing the restoration
service according to the proposed method, the circuit breakers
located at the outlet of the substation may be tripped off after a
certain time delay when the main feeder current exceeds the
relay setting of backup protection as described in following:
,
>
,
(8)
The power outage will cause long-term power loss when
the power supply area is separated from the feeder.
Furthermore, it will also cause short-term power loss during
FA.
C. Attack Scenario
Regarding the realistic cyber-attacks happened before, two
most possible attack scenarios, namely 1) tamper the fault
message and 2) tamper the fault message and refusing action
message (RAM), are proposed in this paper. It should be
<login,2,3>
<2,3> user(2) login(2) T F
T T T 0.8 0.2
F T T 0 1
T F T 0 1
T T F 0 1
F F T 0 1
F T F 0 1
T F F 0 1
F F F 0 1
Authorized licensed use limited to: Tsinghua University. Downloaded on March 01,2023 at 06:24:29 UTC from IEEE Xplore. Restrictions apply.
noticed that the proposed attack scenarios must be subject to
the following premises (assumptions):
a) The substation is under the strict monitoring state. Hence,
the RTUs located inside the substation are free from any
attacks.
b) The cyber-attacker is familiar with the information and
communication technology (ICT), especially has little
technical background in power system. Hence, the attacker
can make the cyber-attack look effortless.
c) The cyber-attacker does not know the geographical wiring
diagram of a certain DS. Therefore, the probability is the same
for attacking any RTU.
d) In order to implement a successful attack, the tampered
message MUST be sent to the correct communication channel
via GOOSE.
1) Scenario 1: Tamper the fault message
Taking (5) and (6) into consideration, the FA will operate
to isolate the power supply area located at the downstream of
, when the attacker fabricates these signals simultaneously
which are described as follows:
a) The fault signal (
) of
.
b) The fault message 
,
received from the upstream
breaker of
. Here, as the fault signal is continuous, the

,
makes the RTU of
mistakenly believe that the
fault happens in the downstream area, and the automation
system runs well.
c) The non-fault message sent to the breakers

∈Ν
,
Μ
,
located at the upstream power supply area
,
of
.
Taking the system shown in Fig. 4 as an example, the
messages (
,
,
), 
,
,
,
and (
,
,
,
) are
elaborately created for
. Then all the other breakers will
report non-fault signal (
)
. The is the transmitted fault
message, and the ones marked by red color denote the
modified message. As a result, we can get
(
,
,
)(
,
,
)
(
,
,
)(
,
,
)(
,
,
)
(
,
,
)(
,
,
)
(
,
,
,
)(
,
,
)
. (9)
It can be seen that only
,
satisfies (5), and it will lead to
a power outage between
and
based on (6). Furthermore,
this attack method will always cause power outage at the
downstream power supply area of the attacked breaker.
2) Scenario 2: Tamper the fault message and RAM
Combining with the aforementioned fault messages, the
attacker can set the RAM additionally. The FA mechanism
will cut off the adjacent breakers to isolate the “fault” which
actually cannot be isolated. This may cause more severe
power outages with little effort.
Regarding the vulnerabilities as given in Fig. 3, the fault
signal and the refusing action signal can be generated by
exploiting the privilege user(3). The communication
information between adjacent RTUs can be tempered by
utilizing the privilege user(4). Here, the information
transmitting and receiving between a pair of breakers will use
the <protocol,3,4> one time due to the service and connection.
This vulnerability has to be considered again when facing
another a pair of breakers.
D. Assessment procedure
Figure 5. Risk assessment considering FA cybersecurity.
Fig. 5 shows the flowchart of the proposed method. The
solution procedures mainly involve the system initialization,
the GOOSE-based intelligent distributed FA strategy, the relay
protection relevant technique and the calculation of risk index
considering the total number of scenarios (marked with
symbol S). In this paper, the consequences will be represented
by monetary losses which are calculated based on sector
customer damage function (SCDF) according to the power
outage time and the type of power consumer [11]. In our
work, the measure of short-term study is considered as 1
minute, and the long-term measure is considered as 120
minutes during analysis.
IV. C
ASE
S
TUDY
A modified three-feeder DS with hand-in-hand mode as
shown in Fig. 6 is studied to validate the effectiveness of the
proposed method. All the main distribution lines consist of
electric cables. Hence, there exist 13 RMUs marked by DTU*
or FTU* to control the relevant breakers. One of the outlet
lines in DTU4 is connected to the overhead power line that
delivers the electricity to the remote place via FTU1. The
detailed system data can be found in [12]. The categories of
power consumers are listed in Table II.
All DTUs and FTUs are controlled in terms of GOOSE-
based technique. The probabilities of preconditions are
assigned values between 0.8 and 1 as suggested in [9].
According to the practical FA projects built in China, the
CVSS scores of <debug,1,2>, <web,1,3>, <login,2,3> and
<protocol,3,4> are set to be 1.7, 2.9, 5.3 and 8 (the details can
be found in [10]) respectively. Hence, the post probability of
successfully exploiting individual RTU can be calculated. The
backup relay threshold settings for three main feeder breakers
Authorized licensed use limited to: Tsinghua University. Downloaded on March 01,2023 at 06:24:29 UTC from IEEE Xplore. Restrictions apply.
are given as follows: 
,
=1.1kA,
,
=
1.6kA,
,
=0.7kA.
Fig. 7 shows the RI values of different breakers under
aforementioned two different attack scenarios considering the
skill level of attackers. It can be seen that the highest RI
corresponds to D53. The main reason is that the current of
main feeder S1 exceeds the threshold of relay setting after
FLISR, resulting in losing all consumers supplied by S1. The
risks pertinent to D41, D61 and D101 are 0, which means that
the proposed attack strategy is invalid for the tie line breaker.
It is reasonable that the fault signal sent from tie line breaker
will be considered as misinformation since there is no current
flowing through the breaker during operation.
Figure 6. Three-feeder DS with hand-in-hand mode.
T
ABLE
II.
C
ATEGORIES OF POWER CONSUMERS
Category Power Supply Are
a
Small industr
y
DTU1 DTU4
Business DTU2 DTU11
DTU5 DTU6
Residenc
e
DTU12 DTU3 DTU7 DTU10
FTU1
Im
ortant users DTU8
Government DTU9
Figure 7. RI indices of individual breakers under attack.
Figure 8. RI indices of RTUs under attack.
The RI values of DTUs that control all the breakers located
at the same RMU are shown in Fig. 8. The RI values of DTU 3,
DTU 6 and FTU1 are very low no matter how high the skill
level of an attacker is. This is because that the consumers are
connected to the end of the feeder, the FA will not affect the
other users. Besides, the power consumers supplied by DTU 7,
DTU 9 and DTU 12 with low values of SCDFs make the RI
values become relatively low. Whereas, such power
consumers with the high values of SCDFs make the RI values
of DTU 4 and DTU 8 extremely high. What makes the RI
value of DTU 5 become the highest one is that the backup
protection of DTU S1 sheds the consumers transferred from
the neighbor area and supplied by DTU S1 itself.
(a) Method1 (Normal) (b) Method 2 (Normal)
Figure 9. The proportion of RI of different kinds of breakers under attack.
In Fig.9, the RI values of breakers located at the same
DTU under cyber-attack are compared according to the types
of breakers. Generally, the inlet breaker will cause more
severe consequences under cyber-attack.
V. C
ONCLUSION
The potential risks in GOOSE-based intelligent distributed
automation system under two most possible cyber-attack
scenarios are elaborately studied in this paper. The probability
of successful attack is calculated by using the BAG and the
CPT. The simulation results demonstrate that not all cyber
assets are equally important. The more capital should be
invested in such assets with higher RI values and the
protection of inlet breaker. It should be noticed that the
categories of power consumers, the topology of the test system,
the protection settings and the maintenance time contribute a
lot to the RI.
R
EFERENCES
[1] D. Shelar and S. Amin, "Security Assessment of Electricity
Distribution Networks Under DER Node Compromises," IEEE
Transactions on Control of Network Systems, vol. 4, pp. 23-36, 2017.
[2] X. D. Liu, M. Shahidehpour, Z. Y. Li, X. Liu, Y. J. Cao, and Z. Y. Li,
"Power System Risk Assessment in Cyber Attacks Considering the
Role of Protection Systems," IEEE Transactions on Smart Grid, vol. 8,
pp. 572-580, Mar 2017.
[3] X. M. Ye, J. H. Zhao, Y. Zhang, and F. S. Wen, "Quantitative
Vulnerability Assessment of Cyber Security for Distribution
Automation Systems," Energies, vol. 8, pp. 5266-5286, Jun 2015.
[4] C. Wang, C. W. Ten, Y. H. Hou, and A. Ginter, "Cyber Inference
System for Substation Anomalies Against Alter-and-Hide Attacks,"
IEEE Transactions on Power Systems, vol. 32, pp. 896-909, Mar 2017.
[5] M. S. Rahman, M. A. Mahmud, A. M. T. Oo, and H. R. Pota, "Multi-
Agent Approach for Enhancing Security of Protection Schemes in
Cyber-Physical Energy Systems," IEEE Transactions on Industrial
Informatics, vol. 13, pp. 436-447, Apr 2017.
[6] E. Bou-Harb, C. Fachkha, M. Pourzandi, M. Debbabi, and C. Assi,
"Communication Security for Smart Grid Distribution Networks,"
IEEE Communications Magazine, vol. 51, pp. 42-49, Jan 2013.
[7] M. Levesque, D. Q. Xu, G. Joos, and M. Maier, "Communications and
power distribution network co-simulation for multidisciplinary smart
grid experimentations," in 45th Annual Simulation Symp., pp. 55-61.
[8] W. Nzoukou, L. Wang, S. Jajodia, and A. Singhal, "A Unified
Framework for Measuring a Network's Mean Time-to-Compromise,"
in 2013 IEEE 32nd International Symposium on Reliable Distributed
Systems, pp. 215-224.
[9] Y. C. Zhang, L. F. Wang, Y. M. Xiang, and C. W. Ten, "Power System
Reliability Evaluation With SCADA Cybersecurity Considerations,"
IEEE Transactions on Smart Grid, vol. 6, pp. 1707-1721, Jul 2015.
[10] P. Mell, K. Scarfone, and S. Romanosky, "Common vulnerability,
scoring system," IEEE Security & Privacy, vol. 4, pp. 85-89, Nov
2006.
[11] R. Li, Y. Li, J. Su, X. Bu, and Y. Hou, "Power supply interruption cost
of important power consumers in distribution network and its
emergency management," Power System Technology, vol. 35, pp. 170-
176, 2011.
[12] A. C. Santos, A. C. B. Delbem, J. B. A. London, and N. G. Bretas,
"Node-Depth Encoding and Multiobjective Evolutionary Algorithm
Applied to Large-Scale Distribution System Reconfiguration," IEEE
Transactions on Power Systems, vol. 25, pp. 1254-1265, 2010.
Authorized licensed use limited to: Tsinghua University. Downloaded on March 01,2023 at 06:24:29 UTC from IEEE Xplore. Restrictions apply.
... The majority of articles, 33%, found in this systematic literature review use previous research to find the different possible vulnerabilities or attacks on the systems that they model [52,46,30,26,29,23,19,16,53,4,28,13,34]. Previous research is also used in combination with other information sources [20,41,31,10,9,11]. This previous research can consist of research articles or published reports. ...
... In addition, their results also showed that if one considers all of the systems vulnerabilities and not only those with the highest CVSS score, the results were much more reliable. Some papers found in this review use a combination of calculating their own CVSS scores with vulnerability databases or other information sources [10,9,11]. Another example of a scoring system is the Common Weakness Enumeration (CWE) is a category system that also calculates a score for the weaknesses or vulnerabilities 2 [35]. The CWE includes all software weaknesses and not only vulnerabilities. ...
Chapter
Full-text available
Power systems are one of the critical infrastructures that has seen an increase in cyber security threats due to digitalization. The digitalization also affects the size and complexity of the infrastructure and therefore makes it more difficult to gain an overview in order to secure the entire power system from attackers. One method of how to gain an overview of possible vulnerabilities and security threats is to use threat modeling. In threat modeling, information regarding the vulnerabilities and possible attacks of power systems is required to create an accurate and useful model. There are several different sources for this information. In this paper we conduct a systematic literature review to find which information sources that have been used in power system threat modeling research. Six different information sources were found: expert knowledge, logs & alerts, previous research, system’s state, vulnerability scoring & databases, and vulnerability scanners.
... Upon the installation of wiretap devices, attackers will gather information from the environment and could access to harvest credentials or escalate privileges [23]. According to the vulnerabilities of RTUs reported in [34] and assumption b), a BAG [16] is extended and used to quantitatively describe the dependences between vulnerabilities and the potential attack paths. Fig. 4 shows the BAG model for the vulnerabilities exposed in Fig. 3. ...
... The detailed scoring guide with CVSS Version 3.0 can be found in [35]. We have investigated the vulnerabilities existed in RTU in [34], and the main conclusion is provided in Table VI. We estimate the impact and severity ratings based on the base metrics group. ...
Article
The rapid deployment of intelligent electronic devices and the development of information and communication technology have improved distribution network (DN) reliability with feeder automation. Thus, the operation of DNs has become more dependent on the cyber-physical components. As the cyber security of smart grid has drawn increasing attention in recent years, this paper proposes a simple yet powerful type of attack targeting the remote terminal units. The proposed attack policy can manipulate the feeder automation operation with the aim of cutting off important power consumers. Regarding the realistic cyber-attacks that previously occurred, an optimal attack model is established for analyzing the attack policy. This optimization model aims to minimize the attack cost and the penalty of being caught or detected while maximizing the remuneration. A Bayesian attack graph model is adopted to quantify the successful probability of exploiting known and zero-day vulnerabilities. The probability of a cyber-attack being caught or detected is modeled based on search theory. Next, an enhanced self-adaptive evolutionary programming is developed to achieve satisfactory solutions for practical applications. Finally, the proposed model and corresponding solution strategies are verified using the RBTS bus 2 DN and the modified IEEE 123-node test feeder.
... For modeling a smart city, we follow the structure in [30]. A risk index is introduced to identify the vulnerability of a distribution system to be studied under cyber-attack, and this index is calculated as follows: ...
Chapter
The inclusion of technological solutions in modern cities opens the possibility to new attacks that can significantly affect the continuity of cities’ services operations. From a security perspective, there is a need to reduce the impact of these attacks through technical and non-technical controls. Since improving cybersecurity has an associated cost, security experts must prioritize the risks that could have more significant impacts to optimize the use of the resources, while maximizing security measures performance. Smart city has an uncertainty related to cybersecurity attacks: when, how, and where they could occur, which attack vectors are used, and what level of impact or loss could cause; to try control this uncertainty, it is necessary to manage a security strategy such as analyzing and managing the potential cybersecurity risks. Nowadays, IoT is becoming a critical element of the smart cities’ implementation. However, the inherent characteristics of IoT ecosystems, such as heterogeneity and a lack of security in design, introduce new challenges from the cybersecurity perspective. For this reason, the intention of this chapter is to analyze the different issues related to the security risks in IoT systems implemented in smart cities.
... For modeling a smart city, we follow the structure in [30]. A risk index is introduced to identify the vulnerability of a distribution system to be studied under cyber-attack, and this index is calculated as follows: ...
Chapter
Cities improve their decision-making capabilities by using emergent technologies such as IoT, big data, and cloud computing. However, the hyper-connectivity product for using these technologies builds new challenges for city officers because it increases the attack surface. Therefore, city officers need to define the best cybersecurity strategies for minimizing the impact of cybersecurity attacks. Hence, they require the use of a risk analysis methodology to identify the city’s critical assets, the vulnerabilities of its components, and the possible attack vectors. Furthermore, cities are dynamic and complex systems due to their different relationships in social, economic, and demographic axis, if they include technologies such as IoT, which are solutions with heterogeneous characteristics (several manufacturers), fast-growing (about 50 billion devices for the year 2030) and, with a lack of solid security, could increase their complexity. In this context, traditional risk methodologies that are generally more static could be limited for evaluating systems and characterize the complexity, uncertainty, ambiguity, and amplifying effect of cyber-attacks on smart cities. To operationalize the systematic cyber risk analysis, some researchers propose using Bayesian networks to evaluate the relationships and causes between the different components of a system in a probabilistic way.
Chapter
Full-text available
Cities have adopted the smart city model based on decision-making to maintain their sustainability and resilience. The decision-making process on a smart city is based on data generated in real-time for the city’s senzorization layer of physical components. For this goal, the digital abstraction of the physical aspects of city using digital twin to simulate scenarios to understand behaviors of a particular event. This study analyzes the use of artificial intelligence techniques and the IoT used in digital twin approaches to analyze cybersecurity risks in the smart city environment.
Chapter
Several risk assessment methodologies are available and established for information systems, but the IoT is now developing. Nurse et al. [1] mention that current risk assessment methods fail in IoT ecosystems due to the following aspects. First, traditional risk methodologies are generally not focused on being carried out in short periods. However, since the IoT ecosystem changes continuously due to the incorporation of new devices, it is necessary to assess security risks quickly. Second, most risk assessments are focused on traditional systems, and they do not consider IoT aspects, such as IoT devices connections to other systems or technologies such as cloud computing, big data, and traditional systems. If the IoT devices lack minimum security, they could expand the possibility of new attacks and expand the attack surface. Third, the location of IoT devices in non-traditional places such as streets or vehicles changes the control of the attack surface. Therefore, managers of city and security experts need to face the following three main aspects to develop security strategies to protect the city: (1) Waiting for long periods to do a security risk assessment is not recommended, (2) The inventory of all IoT devices can be a lengthy task, and (3) Define a process for modeling the complex IoT attack surface. This chapter addresses the aspects related to describing the characteristics of surface attacks in IoT systems and analyzes how these features impulse dynamic risk management approaches.
Article
Full-text available
The extensive application of information and communication technology (ICT) can effectively improve the operational performance of active distribution systems (ADSs). On the other hand, the use of ICT may expose the systems to cyberattacks. Since feeder automation (FA) in advanced ADS provides fast-responding self-healing capability to restore service during an outage, the potential effect of cyberattacks on ADS becomes more devastating. In this paper, two simple yet powerful cyberattack methods targeting remote terminal units (RTUs) are proposed. The physical response of ADS to malicious cyberattacks on FA is elaborately investigated considering the output fluctuation of distributed generators. The impact of this specific cyberattack on ADS is quantified by a risk assessment index measured in scale and in duration to full restoration. The probability of RTU potentially being attacked is modeled based on search theory. Furthermore, a Bayesian attack graph model is applied and designed to quantify the probability of successfully exploiting the currently known and zero-day vulnerabilities. The proposed methodology is tested and validated via using a modified three-feeder ADS and the IEEE 123 Node Test Feeder.
Article
Full-text available
This article focuses on the security assessment of electricity distribution networks (DNs) with vulnerable distributed energy resource (DER) nodes. The adversary model is simultaneous compromise of DER nodes by strategic manipulation of generation set-points. The loss to the defender (DN operator) includes loss of voltage regulation and cost of induced load control under supply-demand mismatch caused by the attack. A 3-stage Defender-Attacker-Defender (DAD) game is formulated: in Stage 1, the defender chooses a security strategy to secure a subset of DER nodes; in Stage 2, the attacker compromises a set of vulnerable DERs and injects false generation set-points; in Stage 3, the defender responds by controlling loads and uncompromised DERs. Solving this trilevel optimization problem is hard due to nonlinear power flows and mixed-integer decision variables. To address this challenge, the problem is approximated by tractable formulations based on linear power flows. The set of critical DER nodes and the set-point manipulations characterizing the optimal attack strategy are characterized. An iterative greedy approach to compute attacker-defender strategies for the original nonlinear problem is proposed. These results provide guidelines for optimal security investment and defender response in pre- and post-attack conditions, respectively.
Article
Full-text available
The distribution automation system (DAS) is vulnerable to cyber-attacks due to the widespread use of terminal devices and standard communication protocols. On account of the cost of defense, it is impossible to ensure the security of every device in the DAS. Given this background, a novel quantitative vulnerability assessment model of cyber security for DAS is developed in this paper. In the assessment model, the potential physical consequences of cyber-attacks are analyzed from two levels: terminal device level and control center server level. Then, the attack process is modeled based on game theory and the relationships among different vulnerabilities are analyzed by introducing a vulnerability adjacency matrix. Finally, the application process of the proposed methodology is illustrated through a case study based on bus 2 of the Roy Billinton Test System (RBTS). The results demonstrate the reasonability and effectiveness of the proposed methodology.
Conference Paper
Full-text available
Multiple simulation tools have been built and studied independently in the communications and power system perspectives of IEEE P2030 to study new Smart Grid applications. However, very few studies have been done on co-simulation by combining both perspectives in a multidiciplinary manner. In this paper, we show implementation details of our novel communications and power distribution network co-simulator based on OMNeT++ and OpenDSS. We then demonstrate the novelty of our co-simulator by showing the impact of data rate-based and event-based sensors on reactive control algorithms of plug-in electric vehicles to reduce critical voltage durations.
Article
Full-text available
The operation and control of the next generation electrical grids will depend on a complex network of computers, software, and communication technologies. Being compromised by a malicious adversary would cause significant damage, including extended power outages and destruction of electrical equipment. Moreover, the implementation of the smart grid will include the deployment of many new enabling technologies such as advanced sensors and metering, and the integration of distributed generation resources. Such technologies and various others will require the addition and utilization of multiple communication mechanisms and infrastructures that may suffer from serious cyber vulnerabilities. These need to be addressed in order to increase the security and thus the greatest adoption and success of the smart grid. In this article, we focus on the communication security aspect, which deals with the distribution component of the smart grid. Consequently, we target the network security of the advanced metering infrastructure coupled with the data communication toward the transmission infrastructure. We discuss the security and feasibility aspects of possible communication mechanisms that could be adopted on that subpart of the grid. By accomplishing this, the correlated vulnerabilities in these systems could be remediated, and associated risks may be mitigated for the purpose of enhancing the cyber security of the future electric grid.
Article
This paper presents a distributed multi-agent scheme to detect and identify cyber threats on the protection systems of power grids. The integration of information and communication technologies (ICTs) into existing power grids builds critical cyberphysical energy systems (CPESs) in which digital relays are networked cyber-physical components subject to various cyber threats. Cyber attacks on protection systems may mimic real faults, cause component failure, and disable the communication links. Agents utilize both cyber and physical properties to reinforce the detection technique and further distinguish cyber attacks from physical faults. This paper also introduces the problem of secure communication protocols and highlights the comparative studies for enhancing the security of the protection systems. The proposed scheme is validated using a benchmark power system under various fault and cyber attack scenarios.
Article
Alarms reported to power control centers are an indication of abnormal events caused by either weather interruptions, system errors, or possibly intentional anomalies. Although these initiating events are random, e.g., faults on transmission lines struck by lightning, the existence of electronically altered analog or digital measurements may implicate the process to identify root causes of abnormal events. This paper is concerned with alter-and-hide (AaH) attacks by tampering the actual measurements to normal states with the background of disruptive switching actions that hide the true values of local events from operators at the control center. Cyber inference system (CyIS) framework is proposed to synthesize all sequential, missing, or altered alarms of related substations against AaH attacks. The stochastic nature of such attack events is modeled by probabilities as an integer programming problem with multiple scenarios. The proposed method is utilized to verify alarm scenarios for a conclusion of the potential AaH attacks on the substations.
Article
This paper presents a risk assessment method for evaluating the cyber security of power systems considering the role of protection systems. This paper considers the impact of bus and transmission line protection systems located in substations on the cyber-physical performance of power systems. The proposed method simulates the physical response of power systems to malicious attacks on protection system settings and parameters. The relationship among settings of protection devices, protection logics, and circuit breaker logics is analyzed. The expected load curtailment (ELC) index is used in this paper to quantify potential system losses due to cyber attacks. The Monte Carlo simulation is applied to calculate ELC for assessing attackers' capabilities as bus arrangements are altered. The effectiveness of the proposed risk assessment method is demonstrated using a 9-bus system and the IEEE 68-bus system.
Article
In distribution network, the outage loss of important power consumers occupies the vast majority of the total outage losses. For this reason, the important power user-based load model, the system model and the outage loss cost model, by which the reliability of distribution network and its economy are analyzed, are built. Beginning with the designing of user questionnaires, the outage loss functions for big industrial consumers, whose production process is complex and their losses caused by interruption are huge, and consumers in other categories are determined, then the load models are built. Utilizing consequences analysis on failure modes, correct reliability indices of distribution network are chosen to compute the reliabilities of load points, thus the system model is built. According to outage loss evaluation rates of load points, the outage loss cost model is built. The reliabilities of load points and system reliability as well outage loss are estimated under three different connection modes, and the effectiveness and accuracy of above-mentioned models are verified by estimation results. It is pointed out that the adoption of distribution generation (DG) is an effective approach to reduce the outage loss in distribution network and improve social emergency capability.
Article
As information and communication networks are highly interconnected with the power grid, cyber security of the supervisory control and data acquisition (SCADA) system has become a critical issue in the electric power sector. By exploiting the vulnerabilities in cyber components and intruding into the local area networks of the control center, corporation, substations, or by injecting false information into communication links, the attackers are able to eavesdrop critical data, reconfigure devices, and send trip commands to the intelligent electronic devices that control the system breakers. Reliability of the power system can thus be impacted by various cyber attacks. In this paper, four attack scenarios for cyber components in networks of the SCADA system are considered, which may trip breakers of physical components. Two Bayesian attack graph models are built to illustrate the attack procedures and to evaluate the probabilities of successful cyber attacks. A mean time-to-compromise model is modified and adopted considering the known and zero-day vulnerabilities on the cyber components, and the frequencies of intrusions through various paths are estimated. With increased breaker trips resulting from the cyber attacks, the loss of load probabilities in the IEEE reliability test system 79 are estimated. The simulation results demonstrate that the power system becomes less reliable as the frequency of successful attacks on the cyber components increases and the skill levels of attackers increase.
Conference Paper
Measuring the mean time-to-compromise provides important insights for understanding a network's weaknesses and for guiding corresponding defense approaches. Most existing network security metrics only deal with the threats of known vulnerabilities and cannot handle zero day attacks with consistent semantics. In this paper, we propose a unified framework for measuring a network's mean time-to-compromise by considering both known, and zero day attacks. Specifically, we first devise models of the mean time for discovering and exploiting individual vulnerabilities. Unlike existing approaches, we replace the generic state transition model with a more vulnerability-specific graphical model. We then employ Bayesian networks to derive the overall mean time-to-compromise by aggregating the results of individual vulnerabilities. Finally, we demonstrate the framework's practical application to network hardening through case studies.