A watchdog model for physics-based anomaly detection in digital substations

被引:3
作者
Tarazi, Hussam [1 ]
Sutton, Sara [1 ]
Olinjyk, John [1 ]
Bond, Benjamin [1 ]
Rrushi, Julian [1 ]
机构
[1] Oakland Univ, Sch Engn & Comp Sci, Rochester Hills, MI 48309 USA
关键词
Cyber physical system; Human machine interface; Industrial control system; Programmable logic controller; Watchdog; Sampled measure values; SCL programming language;
D O I
10.1016/j.ijcip.2024.100660
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of cyber-physical systems (CPS) presents new challenges stemming from computations that work primarily with live physics data. Although there is a body of previous research on detection of malware on CPS, more effective designs are needed to address limitations such mimicry attacks and other forms of evasive techniques. Relay algorithms in particular, such as differential and harmonic protection algorithms, are essential to protecting physical equipment such as power transformers from faults. Relay algorithms, though, are often disabled, altered, or otherwise suppressed by malware. In this paper, we first provide background on the main types of failures that may occur in an electrical power substation after relay algorithms are disabled by malware. We also provide some initial insights into malware methods that involve physics -informed data manipulations, which in turn may lead to power outages and physical damage to power transformers. We then describe the design of a watchdog algorithm that is continuously on the look out for anomalies in the execution time of relay algorithms along with their associated performance counters. We implemented the watchdog approach in Python, and evaluated it empirically on emulations of differential and harmonic protection algorithms on a computing machine.
引用
收藏
页数:12
相关论文
共 28 条
[1]  
Adamiak M., 2010, Prot. Control J. Smart Grid, P61
[2]   Attacks on smart grid: power supply interruption and malicious power generation [J].
Adepu, Sridhar ;
Kandasamy, Nandha Kumar ;
Zhou, Jianying ;
Mathur, Aditya .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 19 (02) :189-211
[3]   Challenges and Opportunities in Cyberphysical Systems Security: A Physics-Based Perspective [J].
Ahmed, Chuadhry Mujeeb ;
Zhou, Jianying .
IEEE SECURITY & PRIVACY, 2020, 18 (06) :14-22
[4]  
Claroty research team, 2020, Claroty Biannual ICS Risk & Vulnerability Report: 2H 2020, Claroty Biannual ICS Risk & Vulnerability Report
[5]  
El Hariri M, 2019, 2019 IEEE INTERNATIONAL CONFERENCE ON ENVIRONMENT AND ELECTRICAL ENGINEERING AND 2019 IEEE INDUSTRIAL AND COMMERCIAL POWER SYSTEMS EUROPE (EEEIC / I&CPS EUROPE)
[6]   The IEC 61850 Sampled Measured Values Protocol: Analysis, Threat Identification, and Feasibility of Using NN Forecasters to Detect Spoofed Packets [J].
El Hariri, Mohamad ;
Harmon, Eric ;
Youssef, Tarek ;
Saleh, Mahmoud ;
Habib, Hany ;
Mohammed, Osama .
ENERGIES, 2019, 12 (19)
[7]  
El-Hawary M.E., 2008, IEEE Press Series on Power Engineering, V50
[8]   Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit [J].
Garcia, Luis A. ;
Brasser, Ferdinand ;
Cintuglu, Mehmet H. ;
Sadeghi, Ahmad-Reza ;
Mohammed, Osama ;
Zonouz, Saman A. .
24TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2017), 2017,
[9]  
Global Research & Analysis Team, 2021, Report
[10]  
Gopika R., 2017, IOSR J ELECT ELECT E, V2, P2278