Strategic and Intelligent Smart Grid Systems Engineering
Strategic and Intelligent Smart Grid Systems Engineering
Strategic and Intelligent Smart Grid Systems Engineering
Emmanuel Hooper
Harvard-MIT-Yale Cyber Security, USA
ehooper@fas.harvard.edu, ehooper@aya.yale.edu
Abstract
System engineering and smart grid technology The Bulk Generation generates electricity from
faces several challenges in the context of systems renewable and non renewable energy sources in bulk
engineering. First, smart grid development quantities. These sources can also be classified as
technology requires regular analysis and testing of renewable variable sources, such as solar and wind;
its performance in the transition from Supervisory renewable non-variable such as hydro, biomass,
Control and Data Acquisition (SCADA) and the geothermal and pump storage; or no renewable, non-
critical infrastructures it controls and monitors. variable, such as nuclear, coal and gas. It may also
Secondly, smart grid technology is based on several contain energy storage for later distribution (see
premises including the efficiency of renewable Figure 1 below).
energy versus traditional energy sources. Thirdly,
smart grids functions include the potential to provide The Transmission domain carries bulk electricity
accurate real-time prediction of the output energy over power transmission lines over long distances,
for dynamic adjustments of the output based on the connecting the bulk generation to the energy
load demand from consumers. However, none of consumption centers of the smart grid. It also
these address the greater challenge facing recent contains the power system substations; the
developments for the smart grid initiativesnamely, transmission and the distribution substations. It may
intelligence and smart grid performance. The also connect to energy storage facilities and
integration of smart grid with cyber infrastructures alternative distributed energy resources at the
is intended to provide cost-effective deployment and transmission level (see Figure 2 below).
additional features in the functions. This systems
engineering technology however, does not The Distribution domain distributes the electricity
adequately address the intelligent, system design, to and from the end customers. The distribution
data mining and accuracy of feedback input from network connects the smart meters and all intelligent
load demands and cyber-related issues of smart field devices; manages and controls them through a
grids. This is significant for Critical Infrastructure two-way wireless or wire line communications
Protection (CIP), Critical Energy Infrastructure network. It may also connect to energy storage
Information Protection (CII) and Critical Energy facilities and alternative distributed energy resources
Infrastructure Information Protection (CEII) and at the distribution level (see Figure 3 below).
Data Privacy for Transmission of Sensitive Data.
1. Introduction
The following recent IEEE and NIST standards on Figure 1. Smart Grid Conceptual Model
Smart Grid demonstrates the conceptual model: IEEE/NIST Smart Grid Framework
Smart Grid Conceptual Model: IEEE/NIST Smart Bulk Generation
Grid Framework:
with all other domains and makes sure they are
coordinated in a competitive market environment.
The markets also handles the energy information
clearinghouse operation and information exchange
with third party service providers, like the inter
utility plug-in-vehicle roaming billing information
(see Figure 6 below).
2. Intellectual Merits
The intellectual merits of this inter-disciplinary
research includes the enhancement of US National
Security and legal, regulations, technology, and its
impact on related areas of financial, economic,
business, employment, insurance, medical, health
and renewable energy critical infrastructures,
Figure 3. Smart Grid Conceptual Model including the smart grid and cyber security.
IEEE/NIST Smart Grid Framework Furthermore, it will enhance collaboration between
The Distribution DOD and academia, including the Minerva initiative,
education, government, leadership, economics,
Customer consists of the end users (home, ethical standards, governance, compliance, and
commercial/building, and industrial) of electricity public policy development. The research will include
connected to the electric distribution network both exploration and development of strategic and
through the smart meters. The smart meters control effective solutions to address the emerging
and manage the flow of electricity to and from the challenges of 21st century global for US national
customers and provides energy information about security, intelligence, counter-intelligence and
energy usage and patterns. Each customer has its academia, industry and the society at large.
own domain comprised of electricity premise and
two way communications networks. It may also 3. New Approach for Critical
generate, store, and manage the use of energy and the Infrastructure Security
connectivity with plug-in-vehicles (see Figure 4
below). The research develop new effective approaches
of traceback and traceability for malicious activities
The Operations dimension manages and control the in critical information, cyber security and privacy
electricity flow of all other domains. It uses a two- transaction during data transfer of highly sensitive
way communications network to connect to data containing private at intermediary points of
substations, customer premises networks and other global critical infrastructures. The new approach will
intelligent field devices, providing monitoring, be successful and effective since the techniques and
reporting, controlling and supervision status and mechanisms for traceability examine relevant
important process information decision. Business attributes features at intermediary stages of data
intelligence processes gathers data from the customer transactions of the critical infrastructure. This is
and network and provides intelligence to support the followed by filtering for maximum occurrence of
decision making (see Figure 5 below). features pertaining to characteristics of normal and
abnormal transactions. These attributes are mined
Markets domain operates and coordinates the using hybrid data mining algorithms to identify
participants in electricity markets. It provides the unique classes in the traceability matrix for security
market management, the wholesaling, the retailing and privacy. The uniqueness in this approach for
and trading of energy services operation. It interfaces
traceability includes identification of both class-
specific feature attribute for specific traceability
patterns and classless attributes for suspicious,
unknown or unidentified transaction traces of events.
This includes a combination of data mining
algorithms in developing the traceability matrix for
each type of data transaction to determine the class,
group, category, subcategory, type or classless type
of activities at all intermediary nodes in the critical
cyber infrastructure.
4. Research Method
The research methodology consists of effective
traceability and traceback techniques. The first step
consists of relevant data acquisition and extraction fitness function [6, 9] were used for traceback and
from monitoring and filtering detection mechanisms analysis of categories and subcategories of anomaly
of counter-intelligence for evasive interceptions of patterns. For traceback of subtle and complex attacks
highly sensitive data considered secure information a Framework of Hybrid consisting of Rule Induction
at intermediary points of critical infrastructures. using Holtes 1R rule [4] and Statistical Analysis [5]
Secondly, we extract these relevant feature attributes, were applied via the Rosetta toolset [6], followed by
classes, subclasses pertaining to the security and filtering for maximum support of conditional
privacy of data transactions to generate a traceability attributes to increase accuracies. Various cases of
matrix for cyber forensics in critical information classes were selected at random and algorithms were
infrastructure applications and databases. Thirdly, we applied to each class type. This produces a set of
use a combination of data mining algorithms to decision rules or general patterns via minimal
design a traceability matrix for each type of data attribute subsets that distinguish on a per object
transaction: class, group, category, subcategory, type basis. This is followed by filtering rules with
or classless type of activities at each intermediary maximum support for each transaction in order to
points of the critical cyber infrastructure to identify obtain an optimum set of conditions for each ruleset
security levels. This comprises aggregation, for class, group, category, subcategory, type or
correlation and data mining using hybrid algorithms classless type of activities at each intermediary node
to identify unique characteristics of each type of data in the critical cyber infrastructure. This was followed
transaction and their associated security. This by development of matrix - table of conditions for
ensures effective traceback and traceability matrix to each attribute in rulesets. Subsequently, for each
indicate the real extent of security and privacy in attribute value item, if-then rules were developed
anonymization during data transactions in the critical based on the attribute values each conditional ruleset.
information infrastructure. Finally we use the results A program was written using the conditional rules
to implement and enforce future traceability, from the Table (Matrix) of rulesets for each class of
auditing, logging and filtering of security and the specfied cases in the training data. Finally, there
privacy feature attribute matrices. These are was validation of the accuracies of traceback and
applicable towards effective traceback, traceability, traceability using test data. See summary of results in
transparency and auditability for forensics in cyber Table 1.
and critical infrastructure networks, applications and
databases. 5.2. Research Results
7. References
[1] Cisco Systems Inc. Cisco Secure ACS for
Windows, version 4.0, 2005. San Jose, CA, USA.
and scalable traceback of patterns of astute [2] J. A. Hartigan. Clustering Algorithms. JohnWiley
infrastructure malicious activities. This includes and Sons, Inc., New York, USA, 1975.
effective aggregation and correlation, filtering for
maximum efficiencies and hybrid algorithmic data [3] J. A. Hartigan and M. A. Wong. A k-means
mining for effective traceability in architectures of clustering algorithm. Applied Statistics, 128(3):100
critical information infrastructures using multiple 108, JulySeptember 1979.
protocols, applications and sensitive data for
forensics in cyber security. This section describes the [4] R. C. Holte. Very simple classification rules
results of the effective use of firewall packet filters in perform well on most commonly used datasets.
the intelligent response strategies using the Network Machine Learning, 11:6390, 1993.
Quarantine Channels (NQC) and Hybrid Data
Mining. This results in effective in the final [5] R. C. Holte, A. L., and B. W. Porter. Concept
responses to normal hosts seeking to establish learning and the problem of small disjuncts. In
connections in the internal network and malicious Proceedings of the Eleventh International Joint
intentions and hosts. The packet filters improved the Conference on Artificial Intelligence, pages 813
response capability of the IDS after accurate 818, San Mateo, CA, 1989.
detection of the final status of the packets (see Table
2). [6] A. hrn. Discernibility and Rough Sets in
The results of the experiments are significant Medicine: Tools and Applications. PhD thesis,
since they provide effective responses, reduce false Norwegian University of Science and Technology,
positives and improve the detection and response Department of Computer and Information Science,
capability of the IDS. The test accuracies are 1999. http://www.idi.ntnu.no/ aleks/thesis.
significant as they indicate high detection accuracy
and reduction in false positives. These accuracies [7] Network Associates. McAfee Intrushield IDS:
demonstrate the significance of the strategies in 4000 Series, 2007. Santa Clara, CA, USA.
using adaptive policies and alert filters in the NQC in
reducing false positives and distinguishing between [8] Rulequest Research. Rule Induction with C5.0,
benign connections and actual attacks in real-time. See5/Cubist software, 2005.