Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3470481.3472705acmconferencesArticle/Chapter ViewAbstractPublication PagescpsweekConference Proceedingsconference-collections
research-article
Public Access

Power-attack: a comprehensive tool-chain for modeling and simulating attacks in power systems

Published: 06 October 2021 Publication History

Abstract

Due to the increased deployment of novel communication, control and protection functions, the grid has become vulnerable to a variety of attacks. Designing robust machine learning based attack detection and mitigation algorithms require large amounts of data that rely heavily on a representative environment, where different attacks can be simulated. This paper presents a comprehensive tool-chain for modeling and simulating attacks in power systems. The paper makes the following contributions, first, we present a probabilistic domain specific language to define multiple attack scenarios and simulation configuration parameters. Secondly, we extend the PyPower-dynamics simulator with protection system components to simulate cyber attacks in control and protection layers of power system. In the end, we demonstrate multiple attack scenarios with a case study based on IEEE 39 bus system.

References

[1]
[n.d.]. National SCADA Test Bed | Department of Energy. https://www.energy.gov/oe/technology-development/energy-delivery-systems-cybersecurity/national-scada-test-bed
[2]
[n.d.]. PowerFactory - DIgSILENT. https://www.digsilent.de/en/powerfactory.html
[3]
[n.d.]. PowerWorld: The visual approach to electric power systems. https://www.powerworld.com/
[4]
T. Athay, R. Podmore, and S. Virmani. 1979. A Practical Method for the Direct Analysis of Transient Stability. IEEE Transactions on Power Apparatus and Systems PAS-98, 2 (1979), 573--584.
[5]
David C. Bergman, Dong Jin, David M. Nicol, and Tim Yardley. 2009. The Virtual Power System Testbed and Inter-Testbed Integration. In Proceedings of the 2nd Conference on Cyber Security Experimentation and Test (Montreal, Canada) (CSET'09). USENIX Association, USA, 5.
[6]
Xinjie Chang. 1999. Network simulations with OPNET. In WSC'99. 1999 Winter Simulation Conference Proceedings.'Simulation-A Bridge to the Future'(Cat. No. 99CH37038), Vol. 1. IEEE, 307--314.
[7]
Ajay Chhokra. [n.d.]. Power Attack. https://github.com/chhokrad/power-attack
[8]
A. Chhokra, A. Dubey, N. Mahadevan, and G. Karsai. 2015. A component-based approach for modeling failure propagations in power systems. In 2015 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems.
[9]
I. Dejanović, R. Vaderna, G. Milosavljević, and Ž. Vuković. 2017. TextX: A Python tool for Domain-Specific Languages implementation. Knowledge-Based Systems 115 (2017), 1--4.
[10]
A. Hahn, A. Ashok, S. Sridhar, and M. Govindarasu. 2013. Cyber-Physical Security Testbeds: Architecture, Application, and Evaluation for Smart Grid. IEEE Transactions on Smart Grid (2013), 847--855.
[11]
Saqib Hasan, Ajay Chhokra, Abhishek Dubey, Nagabhushan Mahadevan, Gabor Karsai, Rishabh Jain, and Srdjan Lukic. 2017. A simulation testbed for cascade analysis. In 2017 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). IEEE, 1--5.
[12]
S. Hasan, A. Dubey, A. Chhokra, N. Mahadevan, G. Karsai, and X. Koutsoukos. 2017. A modeling framework to integrate exogenous tools for identifying critical components in power systems. In 2017 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES). 1--6.
[13]
Hannes Holm, Martin Karresand, Arne Vidström, and Erik Westring. 2015. A survey of industrial control system testbeds. In Nordic Conference on Secure IT Systems. Springer, 11--26.
[14]
J. Hong, S. Wu, A. Stefanov, A. Fshosha, C. Liu, P. Gladyshev, and M. Govindarasu. 2011. An intrusion and defense testbed in a cyber-power system environment. In 2011 IEEE Power and Energy Society General Meeting. 1--5.
[15]
M. Liljenstam, J. Liu, D. Nicol, Y. Yuan, G. Yan, and C. Grier. 2005. RINSE: the real-time immersive network simulation environment for network security exercises. In Workshop on Principles of Advanced and Distributed Simulation (PADS'05). 119--128.
[16]
Richard Lincoln. [n.d.]. PYPOWER. https://github.com/rwl/PYPOWER
[17]
M. Mallouhi, Y. Al-Nashif, D. Cox, T. Chadaga, and S. Hariri. 2011. A testbed for analyzing security of SCADA control systems (TASSCS). In ISGT 2011. 1--7.
[18]
Michael McDonald, John Mulder, Bryan Richardson, Regis Cassidy, Adrian Chavez, Nicholas Pattengale, Guylaine Pollock, Jorge Urrea, Moses Schwartz, William Atkins, et al. 2010. Modeling and simulation for cyber-physical system security research, development and applications. Sandia National Laboratories, Tech. Rep. Sandia Report SAND2010-0568 (2010).
[19]
Federico Milano. 2005. An open source power system analysis toolbox. IEEE Transactions on Power systems 20, 3 (2005), 1199--1206.
[20]
Sai Pushpak Nandanoori, Soumya Kundu, Seemita Pal, Khushbu Agarwal, and Sutanay Choudhury. 2020. Model-Agnostic Algorithm for Real-Time Attack Identification in Power Grid using Koopman Modes. IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids. (2020).
[21]
C. Queiroz, A. Mahmood, and Z. Tari. 2011. SCADASim---A Framework for Building SCADA Simulations. IEEE Transactions on Smart Grid 2, 4 (2011), 589--597.
[22]
Julius Susanto. [n.d.]. PYPOWER Dynamics. https://github.com/susantoj/PYPOWER-Dynamics
[23]
Hao Tu, Yuhua Du, Hui Yu, Abhishek Dubey, Srdjan Lukic, and Gabor Karsai. 2019. Resilient information architecture platform for the smart grid (riaps): a novel open-source platform for microgrid control. IEEE Transactions on Industrial Electronics (2019).
[24]
Joe Weiss. 2016. Aurora generator test. Handbook of SCADA/Control Systems Security (2016), 107.

Cited By

View all
  • (2022)Review on Semantic Modeling and Simulation of Cybersecurity and Interoperability on the Internet of Underwater ThingsFuture Internet10.3390/fi1501001115:1(11)Online publication date: 26-Dec-2022

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MSCPES '21: Proceedings of the 9th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems
May 2021
83 pages
ISBN:9781450386081
DOI:10.1145/3470481
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

  • IEEE Signal Processing Society
  • IEEE CS

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 October 2021

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. cyber attacks
  2. cyber security
  3. power system simulation
  4. protection system

Qualifiers

  • Research-article

Funding Sources

Conference

CPS-IoT Week '21
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)168
  • Downloads (Last 6 weeks)18
Reflects downloads up to 01 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Review on Semantic Modeling and Simulation of Cybersecurity and Interoperability on the Internet of Underwater ThingsFuture Internet10.3390/fi1501001115:1(11)Online publication date: 26-Dec-2022

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media