REACT to Cyber Attacks on Power Grids

被引:34
作者
Soltan, Saleh [1 ]
Yannakakis, Mihalis [2 ]
Zussman, Gil [3 ]
机构
[1] Princeton Univ, Electircal Engn Dept, Princeton, NJ 08544 USA
[2] Columbia Univ, Dept Comp Sci, New York, NY 10027 USA
[3] Columbia Univ, Dept Elect Engn, New York, NY 10027 USA
来源
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING | 2019年 / 6卷 / 03期
基金
美国国家科学基金会;
关键词
Power grids; cyber-physical attacks; false data injection; line failures detection; graph theory; algorithms; STATE ESTIMATION; VULNERABILITY;
D O I
10.1109/TNSE.2018.2837894
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Motivated by the recent cyber attack on the Ukrainian power grid, we study cyber attacks on power grids that affect both the physical infrastructure and the data at the control center-which therefore are cyber-physical in nature. In particular, we assume that an adversary attacks an area by: (i) remotely disconnecting some lines within the attacked area, and (ii) modifying the information received from the attacked area to mask the line failures and hide the attacked area from the control center. For the latter, we consider two types of attacks: (i) data distortion: which distorts the data by adding powerful noise to the actual data, and (ii) data replay: which replays a locally consistent old data instead of the actual data. We use the DC power flow model and prove that the problem of finding the set of line failures given the phase angles of the nodes outside of the attacked area is strongly NP-hard, even when the attacked area is known. However, we introduce the polynomial time REcurrent Attack Containment and deTection (REACT) Algorithm to approximately detect the attacked area and line failures after a cyber-physical attack. We numerically show that it performs well in detecting the attacked area, and detecting single, double, and triple line failures in small and large attacked areas.
引用
收藏
页码:459 / 473
页数:15
相关论文
共 42 条
[1]   Error and attack tolerance of complex networks [J].
Albert, R ;
Jeong, H ;
Barabási, AL .
NATURE, 2000, 406 (6794) :378-382
[2]   Operational Models of Infrastructure Resilience [J].
Alderson, David L. ;
Brown, Gerald G. ;
Carlyle, W. Matthew .
RISK ANALYSIS, 2015, 35 (04) :562-586
[3]  
[Anonymous], 1979, Computers and Intractablity: A Guide to the Theory of NP-Completeness
[4]  
[Anonymous], 2016, ANAL CYBER ATTACK UK
[5]  
Bapat R.B., 2010, Graphs and Matrices, V27
[6]  
Bernstein A, 2014, IEEE INFOCOM SER, P2634, DOI 10.1109/INFOCOM.2014.6848211
[7]  
Bienstock Daniel, 2017, ACM SIGMETRICS Performance Evaluation Review, V45, P115, DOI 10.1145/3152042.3152077
[8]  
Bienstock D., 2016, Electrical transmission system cascades and vulnerability - an operations research viewpoint, volume 22 of MOS-SIAM Series on Optimization
[9]  
Bobba R.B., 2010, Preprints of the First Workshop on Secure Control Systems, CPSWEEK, V2010
[10]  
Bondy J.A., 2008, GTM