INSE 6640: Smart Grids and Control System Security: Lecture 11 - Introduction To Attack Detection in CPS
INSE 6640: Smart Grids and Control System Security: Lecture 11 - Introduction To Attack Detection in CPS
Security
Fall 2020
Fall 2020 1 / 40
Outline
4 Final Remarks
Fall 2020 2 / 40
Recap: Stealthy Attack Against State Estimation in
Smart Grid
Fall 2020 3 / 40
The Scenario: Power Transmission System and
Control over Network
Fall 2020 5 / 40
Bad Data Detector - Block Diagram
||y − C x̂|| ≶ τ
State Estimation
DC Power Flow
Residual Generation
Fall 2020 6 / 40
Stealthy Attack against State Estimation
State Estimation
DC Power Flow
+
Residual Generation
a = Cd
DC Power Flow
+
Residual Generation
Fall 2020 8 / 40
Perfect False Data Injection
Fall 2020 9 / 40
Dynamic State Estimation: Recap
Fall 2020 10 / 40
Luenberger Observer
x(k + 1) = Ax(k) + Bu(k)
y(k) = Cx(k)
Fall 2020 12 / 40
State Estimator Design and Kalman Filter
Controller
State Estimation
(Kalman Filter)
Plant Model
+
Residual Generation
?
Fall 2020 14 / 40
State-Estimation Attacks with Kalman Filter
State Estimation
(Kalman Filter)
Plant Model
+
Residual Generation
?
Fall 2020 15 / 40
Detection of Replay Attacks
Fall 2020 16 / 40
Replay Attack on Sensor Measurements - Recap
PHASE 1 PHASE 2
Attack policya
a
Stuxnet-like attack
PHASE 1 PHASE 2
3D Modeling
• Model knowledge: No needed
• Disclosure Resources: On the measurement channel
• Disruption Resources: Needed on both channels
Fall 2020 18 / 40
Replay Attack - Performance
+ Controller
M
State Estimation I
(Kalman Filter)
Plant Model
+
Residual Generation 6 6
Attack Performance
• It is usually employed in steady-state conditions otherwise it is
easy to detect
• In steady state conditions: a FDI on the input is not detectable if a
coordinated Replay attack is performed on the measurements
Fall 2020 19 / 40
Replay Attack Detection: Physical Authentication of
Control Systems
State Estimation
(Kalman Filter)
Plant Model
+
Residual Generation
Fall 2020 20 / 40
Replay Attack Detection: Physical Authentication of
Control Systems
AM M
MtM
State Estimation
(Kalman Filter)
Plant Model
+
Residual Generation
TePLAY www.
ELAY
Threshold
Anomaly Detection Rule
Test Result
A G
IToUT WA TEA 1AhIN
TATrnnkw
Fall 2020 21 / 40
Watermarking Advantage vs Drawback
State Estimation
(Kalman Filter)
Plant Model
+
Residual Generation
Fall 2020 22 / 40
Detection of Covert Attacks
Fall 2020 23 / 40
Covert Attack
Covert Attack
Attack policy
Design an FDI attack on both communication channels such that the
effect of the attack on the input signal is canceled in the measurement
channel.
Fall 2020 24 / 40
Covert Attack
Covert Attack
3D Modeling
• Model knowledge: Complete knowledge of P
• Disclosure Resources:
• If the plant has a linear behavior: no disclosure resources are
needed
• If the plant has a nonlinear behavior, then disclosure resources on
the actuation channel are needed
• Disruption Resources: Needed on both channels
Fall 2020 25 / 40
Covert Attack and Anomaly Detector
State Estimation
(Kalman Filter)
Plant Model
+
Residual Generation
State Estimation
(Kalman Filter)
Plant Model
+
Residual Generation
Fall 2020 27 / 40
Covert Attacks: Possible Solutions
• We need to prevent one of the conditions that make the attack
covert, e.g.
• Secure at least one channel
• Make sure that attacker cannot exactly understand the plant model
(so it cannot compute y a )
+ Controller
State Estimation
(Kalman Filter)
Plant Model
+
Residual Generation
Fall 2020 28 / 40
Moving Target against Covert Attack
• Moving Target Idea [Weerakkody, 2015], [Schellenberger, 2017]:
Add auxiliary and randomly changing dynamics coupled with the
plant.
+ Controller
State Estimation
Plant Model for the Augmented Plant
Augmented Plant
Effects:
• Any input attack ua (k) will be reflected on the auxiliary.
• The effects on the auxiliary is unknown and it cannot be canceled
with y a (k). Fall 2020 29 / 40
Moving Target Advantage vs Drawback
State Estimation
Plant Model for the Augmented Plant
Augmented Plant
Fall 2020 30 / 40
Final Remarks
Fall 2020 31 / 40
Security of Smart Grid and CPS
Fall 2020 32 / 40
INSE 6640 - Overview
- Introduction to - Scanning, Enumera- -Advanced Metering Security Models for - Networked Con- - Cyber-attack
- Control Design
Smart Grid tion, Penetration, and Infrastructure and Smart Grid trol System classification and
Infection Privacy Concerns abstraction modeling
- State Estimator
- Smart Grid Archi- - NISTIR 7628 Design and Bad
tecture - Vulnerabilities (De- - Techniques for smart - ISA 99/IEC 62443 - Plant Model - Intelligent attacks
Data Detector
vice Vulnerabilities, metering privacy (zone and conduit Design
- Smart Grid Vulner- Protocol Vulnerabili- protection model) - Stealthy attack
abilities to cyber-at- ties) against state-esti-
tacks mation in Smart
- Attack Tools Grid
Fall 2020 33 / 40
Final Exam - Content (boxes)
Background and
Preliminaries on Privacy problem in Securing the SCADA Systems Fedback Control Netowked Attacks
Hacking the Smart Grid
Smart Grids Smart Grid Smart Grid Modeling System Operations against CPS
- Introduction to - Scanning, Enumera- -Advanced Metering Security Models for - Networked Con- - Cyber-attack
- Control Design
Smart Grid tion, Penetration, and Infrastructure and Smart Grid trol System classification and
Infection Privacy Concerns abstraction modeling
- State Estimator
- Smart Grid Archi- - NISTIR 7628 Design and Bad
tecture - Vulnerabilities (De- - Techniques for smart - ISA 99/IEC 62443 - Plant Model - Intelligent attacks
Data Detector
vice Vulnerabilities, metering privacy (zone and conduit Design
- Smart Grid Vulner- Protocol Vulnerabili- protection model) - Stealthy attack
abilities to cyber-at- ties) Lectures 7-8 against state-esti-
tacks mation in Smart
- Attack Tools Grid
Lectures 1-2 - Attack Methods - Itroduction to
advancced attack
Lectures 3-6 detection strategies
Lectures 9-11
Fall 2020 34 / 40
Sample Questions
Fall 2020 35 / 40
Question 1
Fall 2020 36 / 40
Question 2
State Estimation
Plant Model for the Augmented Plant
Augmented Plant
2 The Plant
2 The Controller, the Plant, the State Estimator, and the Anomaly
Detector
2 The Detection threshold
2 The Seed
Fall 2020 37 / 40
Question 3
• What is the idea behind watermarked control inputs? What are the
drawbacks and advantages?
Fall 2020 38 / 40
Thank you!
Grazie!← in Italian
Good Luck with the Project and Final!
Fall 2020 39 / 40
References I
S. R. Smith
A decoupled feedback structure for covertly appropriating networked control
systems
IFAC Proceedings, 44.1, 90–95, 2011.
Y. Mo, B. Sinopoli
Secure control against replay attacks
IEEE Allerton Conference, pp. 911–918, 2009.
S. Weerakkody, B. Sinopoli
Detecting integrity attacks on control systems using a moving target approach
IEEE 54th Annual Conference on Decision and Control (CDC), 2015.
C. Schellenberger, P. Zhang
Detection of covert attacks on cyber-physical systems by extending the system
dynamics with an auxiliary system
IEEE 56th Annual Conference on Decision and Control (CDC) 2017
Fall 2020 40 / 40