1
Concept Lab Designing SCADA Systems for the Self-Verifiability of Their Security & Survivability A Cyber-Physical and Agent-Based Approach to Detecting and Recovering from a False Data Injection Attack on a Power Grid SCADA System Provide algorithms that can enable SCADA / EMS systems to autonomously detect, isolate, and respond to false data injection (FDI) cyber-attacks Objective Focus on FDI attacks that create false sense of observable transmission grid state (address unobservability in future) Introduce autonomous software agents to model cyber-physical properties of the grid / EMS at their cyber-physical location Theoretically prove that for any and all vectors of FDI cyber-attack, the agents can autonomously detect it, even if some agents may be compromised Validate proof by modeling and simulation Implement proof-of-concept on SCADA devices Technical Approach 3. Develop and Implement New Protective Measures to Reduce Risk 3.1 Capabilities to evaluate the robustness and survivability of new platforms, systems, networks, architectures, policies, and other system changes commercially available 3.5 Capabilities that enable security solutions to continue operation during a cyber-attack that are available as upgrades and are built in to new security solutions 4. Manage Incidents 4.1 Tools to identify cyber events across all levels of energy delivery system networks commercially available 4.7 Capabilities for automated response to cyber incidents, including best practices for implementing these capabilities available Roadmap Milestones Self-assessment techniques appear in [4]. Table 2 summarizes the techniques. Please see summary white paper. Results to Date: Techniques to Assess AC Grid Vulnerabilities Table 1: SCADA Attack Matrix References Take-Away Message Comprehensive power grid SCADA security requires a cyber-physical systems approach. Evaluate the threat with respect to its impact on properties of the power grid, not just the cybernetic infrastructure. Remedies should also focus on mitigating the impact of the threat, especially for cost-effective solutions to cyber-security. Knowledge to avert threat can be leveraged from multiple perspectives and subsystems: Electrical properties, control theory, cybernetic properties Knowledge from other EMS functions The Simulation Test Bed Adapted from [2], which appears in [1]. Power grid, showing an overload condition on Line 8. Clicking the mouse on the line shows its properties. The main control window for the power grid simulator. By default, a half-second of simulation time corresponds to 5 minutes of real time. We use historical data published by the Bonneville Power Administration on their website. Our current data set is for the period 1 January–27 September 2011. Total load, expressed in per unit (p.u). Load measurements are represented in 5-minute intervals. SCADA Agent Architecture Test Bed Data Flow Power grid, showing an overload condition on Line 8. Clicking the mouse on the line shows its properties. Legend for Load 0.0 - 15.0 15.0 - 30.0 30.0 - 45.0 45.0 - 60.0 60.0 - 75.0 75.0 - 90.0 90.0 + Legend for Genera... 0.0 - 50.0 50.0 - 100.0 100.0 - 150.0 150.0 - 200.0 200.0 - 250.0 250.0 - 300.0 300.0 + Legend for Bus 0.80 - 0.85 0.85 - 0.90 0.90 - 0.95 0.95 - 1.00 1.00 -1.05 1.05 - 1.0999 1.0999 + Legend for Line 40.00 - 50.00 50.00 - 60.00 60.00 - 70.00 70.00 - 80.00 80.00 - 90.00 90.00 - 100.00 100.00 + Power Flow on the power line, expressed as a percentage of line capacity. Power Grid 5 6 7 4 19 20 3 15 14 39 57 40 56 42 11 9 10 35 36 32 33 34 30 26 27 31 53 52 13 18 2 45 44 47 48 49 50 43 41 38 28 29 8 24 23 22 21 25 37 54 55 46 51 1 16 12 17 4 5 21 20 19 6 7 37 34 33 32 45 42 35 38 39 40 36 77 75 55 71 56 31 32 50 49 31 59 60 66 61 24 64 10 11 62 53 43 41 67 68 69 8 44 46 47 48 52 73 51 79 78 76 63 13 74 54 80 9 65 2 3 18 28 1 1 6 26 23 12 15 15 17 27 25 29 30 58 Line No = 8 Real Power = 2.3372 Reactive Power = 0.14809 Power Magnitude = 2.3419 Line Limit = 2.2 Line Utilization = 106.4499% Five Simulation Models Required to Study the Proposed SCADA Agent Protection System For now, we assume that all RTUs communicate directly with the control center. Voltage Magnitude = 0.985 Voltage Angle = -0.22086 Real Power = Reactive Power = Bus No = 3 58 Clicking the mouse over a bus icon shows its properties. Configure Power Grid Start Range End Range Real Time Simulation Time Start Terminate Pause Sec(s) Sec(s) Current File being processed 2011/01/01 00:00 2011/09/27 22:55 300 0.5 2011/01/01 00:00 Chart Total Load Load Time 900 2011.01.01 06:00 2011.01.01 12:00 2011.01.01 18:00 2011.01.01 00:00 800 700 600 Load Table 2: Summary of Results from [4] 1 2 3 4 TAA-AAVD AAMA-AAVD TAA-DAVD DAMA-DAVD 1. Will find all AC measurements for the AMS, including for buses with no power injections 2. AMS includes AC measurements. 1. Requires comprehensive knowledge of the power grid topography and of the SCADA system 1. AMS includes AC measurements. 2. Does not require knowledge of grid topography 1. Will find all DC measurements for the AMS, including buses with no power injections 2. Linear matrix, easier to calculate 1. Will find DC measurements for AMS 2. Does not require knowledge of grid topography 3. Linear matrix, easier to calculate 1. Prone to introducing error that is detectable by bad data detection 2. Will not consider measurements for buses with no power injections 1. Prone to introducing error that is detectable by bad data detection 2. Requires comprehensive knowledge of the power grid topography and of the SCADA system 1. Will not consider measurements for buses with no power injections 2. Non-linear Jacobian matrix computations Disclaimer This information was prepared as an account of work sponsored by an agency of the U.S. Government. Neither the U.S. government nor any agency thereof, nor any of their employees, makes any warranty, expressed or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness, of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. References herein to any specific commercial product, process, or service by trade name, trade mark, manufacturer, or otherwise, does not necessarily consti- tute or imply its endorsement, recommendation, or favoring by the U.S. Government or any agency thereof. The views and opinions of authors expressed herein do not necessarily state or reflect those of the U.S. government or any agency thereof. Red box highlights: This research directly responds to this threat. Orange / yellow box highlights: This research has the potential of responding to this threat. The potential response is not yet under investigation. 1. National Communications System (NCS), Technical Information Bulletin 04-1, “Supervisory Control and Data Acquisition (SCADA) Systems,” NCS TIB 04-1, October 2004, pp. 76. http://www.ncs.gov/library/tech_bulletins/2004/tib_04-1.pdf 2. J. Pollet, “SCADA Security Strategy,” Plant Data Technologies. 8 August 2002. Appears as “Table 6.1 SCADA Attack Matrix,” in [1]. 3. Energy Sector Control Systems Working Group (ESCSWG), “Roadmap to Achieve Energy Delivery Systems Cybersecurity,” September 2011, p. 81. https://www.controlsystemsroadmap.net/ieRoadmap%20Documents/roadmap.pdf 4. G. Hug-Glanzmann and J.A. Giampapa, “Vulnerability Assessment of AC State Estimation with Respect to False Data Injection Cyber-Attacks,” in IEEE Transactions on Smart Grid, Vol. 3, No. 3, pp. 1362–1370, September 2012, DOI: 10.1109/TSG. 2012.2195338. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6275516&isnumber=6275510 5. A. Tajer, S. Kar, H.V. Poor, and S. Cui, “Distributed Joint Cyber Attack Detection and State Recovery in Smart Grids,” in Proceedings of Cyber and Physical Security and Privacy (IEEE SmartGridComm), © 2011 IEEE, pp. 202–207. http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=06102319 Contact Information Joseph Andrew Giampapa Senior Member of the Research Technical Staff Research, Technology, and System Solutions (RTSS) Program Software Engineering Institute Telephone: +1 412-268-6379 Email: [email protected] Ground Truth Bus Bus RTU-1 RTU-2 Control Center: Bad Data Detecon, State Esmaon SCADA Agent-1 SCADA Agent-2 Agent Model of the Control Center Distribuon Grid Other Control Centers SCADA Agents of Other Areas Other EMS Funcons OPF CA AGC OPF-A CA-A AGC-A DG-A OCC-A Line Test Bed Data Flow Visualizaon of the Power Grid’s Ground Truth Visualizaon of the Power grid Operator’s Percepon of Grid State FDI Cyber- Aack State Measure Esmate State Power grid operator’s percepon should be as close to ground truth as possible. Bad Data Topologically- Movated Errors Esmated State Temporary Data Store Measured State Agree with Measurements Disagree with Measurements Evaluate Locally SCADA Agents Control Center: Bad Data Detecon, State Esmaon Team Members Joseph Andrew Giampapa Software Engineering Institute PI, Project Point of Contact Gabriela Hug-Glanzmann Electrical and Computer Engineering, Carnegie Mellon University Co-PI, Assistant Professor Soummya Kar Electrical and Computer Engineering, Carnegie Mellon University Researcher, Assistant Research Professor Kawa Cheung MS Student, Electrical and Computer Engineering, Carnegie Mellon University Research Assistant Mayank Kamalchand Malu MS Student, Institute for Software Research, Carnegie Mellon University Research Programmer Pros Method Cons NA NA

Designing SCADA Systems for the Self-Verifiability of ...€¦ · Research, Technology, and System Solutions (RTSS) Program Software Engineering Institute Telephone: +1 412-268-6379

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Designing SCADA Systems for the Self-Verifiability of ...€¦ · Research, Technology, and System Solutions (RTSS) Program Software Engineering Institute Telephone: +1 412-268-6379

Concept Lab

Designing SCADA Systems for the Self-Verifiability of Their Security & SurvivabilityA Cyber-Physical and Agent-Based Approach to Detecting and Recovering from a False Data Injection Attack on a Power Grid SCADA System

Provide algorithms that can enable SCADA / EMS systems to autonomously detect, isolate, and respond to false data injection (FDI) cyber-attacks

Objective

• Focus on FDI attacks that create false sense of observable transmission grid state (address unobservability in future)

• Introduce autonomous software agents to modelcyber-physical properties of the grid / EMS at their cyber-physical location

• Theoretically prove that for any and all vectors of FDI cyber-attack, the agents can autonomously detect it, even if some agents may be compromised

• Validate proof by modeling and simulation• Implement proof-of-concept on SCADA devices

Technical Approach

3. Develop and Implement New Protective Measures to Reduce Risk

3.1 Capabilities to evaluate the robustness and survivability of new platforms, systems, networks, architectures, policies, and other system changes commercially available

3.5 Capabilities that enable security solutions to continue operation during a cyber-attack that are available as upgrades and are built in to new security solutions

4. Manage Incidents4.1 Tools to identify cyber events across all levels of energy

delivery system networks commercially available4.7 Capabilities for automated response to cyber incidents,

including best practices for implementing these capabilities available

Roadmap Milestones

• Self-assessment techniques appear in [4].• Table 2 summarizes the techniques.• Please see summary white paper.

Results to Date: Techniques to Assess AC Grid Vulnerabilities

Table 1: SCADA Attack Matrix

References

Take-Away MessageComprehensive power grid SCADA security requires a cyber-physical systems approach.

• Evaluate the threat with respect to its impact on properties of the power grid, not just the cybernetic infrastructure.

• Remedies should also focus on mitigating the impact of the threat, especially for cost-effective solutions to cyber-security.

Knowledge to avert threat can be leveraged from multiple perspectives and subsystems:

• Electrical properties, control theory, cybernetic properties

• Knowledge from other EMS functions

The Simulation Test Bed

Adapted from [2], which appears in [1].

Power grid, showing an overload condition on Line 8. Clicking the mouse on the line shows its properties.

The main control window for the power grid simulator. By default, a half-second of simulation time corresponds to 5 minutes of real time. We use historical data published by the Bonneville Power Administration on their website. Our current data set is for the period 1 January–27 September 2011.

Total load, expressed in per unit (p.u). Load measurements are represented in 5-minute intervals.

SCADA Agent Architecture

Test Bed Data Flow

Power grid, showing an overload condition on Line 8. Clicking the mouse on the line shows its properties.

Legend for Load

0.0 - 15.0

15.0 - 30.0

30.0 - 45.0

45.0 - 60.0

60.0 - 75.0

75.0 - 90.0

90.0 +

Legend for Genera...

0.0 - 50.0

50.0 - 100.0

100.0 - 150.0

150.0 - 200.0

200.0 - 250.0

250.0 - 300.0

300.0 +

Legend for Bus

0.80 - 0.85

0.85 - 0.90

0.90 - 0.95

0.95 - 1.00

1.00 -1.05

1.05 - 1.0999

1.0999 +

Legend for Line

40.00 - 50.00

50.00 - 60.00

60.00 - 70.00

70.00 - 80.00

80.00 - 90.00

90.00 - 100.00

100.00 +

Power Flow on the power line, expressed as a percentage of line capacity.

Power Grid

5

6

7

4

19 20

3

15

14

39 57

40 56

42

11

9 10

35 3632

33

3430

26

27

31

5352

13

18

2

45

44

47

48

49 50

43

41

38

28

29

8

24 23 22

21

25 37

54 55

46

51

1 16

12

17

4

5

21

20 19

67

37 34 33

32

45

423538

3940

36

77

75

55 7156

31

3250

4931

5960

66

61

24

64

10

11

62

53

43

41 67 68 69

8

44 46 47 48 52 73

51

7978

76

63

13

74 54

80

9 65

23

1828

11 6

2623

12

15

15

17

27

25

29 3058

Line No = 8

Real Power = 2.3372

Reactive Power = 0.14809

Power Magnitude = 2.3419

Line Limit = 2.2

Line Utilization = 106.4499%

Five Simulation Models Required to Study the Proposed SCADA Agent Protection System

For now, we assume that all RTUs communicate directly with the control center.

Voltage Magnitude = 0.985

Voltage Angle = -0.22086

Real Power =

Reactive Power =

Bus No = 3

58

Clicking the mouse over a bus icon shows its properties.

Configure Power Grid

Start Range

End Range

Real Time

Simulation Time

Start Terminate Pause

Sec(s)

Sec(s)

Current

File being processed

2011/01/01 00:00

2011/09/27 22:55

300

0.5

2011/01/01 00:00

Chart

Total Load

Load

Time

900

2011.01.01 06:00 2011.01.01 12:00 2011.01.01 18:00 2011.01.01 00:00

800

700

600

Load

Table 2: Summary of Results from [4]

1

2

3

4

TAA-AAVD

AAMA-AAVD

TAA-DAVD

DAMA-DAVD

1. Will find all AC measurements for the AMS, including for buses with no power injections

2. AMS includes AC measurements.

1. Requires comprehensive knowledge of the power grid topography and of the SCADA system

1. AMS includes AC measurements. 2. Does not require knowledge of

grid topography

1. Will find all DC measurements for the AMS, including buses with no power injections

2. Linear matrix, easier to calculate

1. Will find DC measurements for AMS 2. Does not require knowledge of

grid topography 3. Linear matrix, easier to calculate

1. Prone to introducing error that is detectable by bad data detection

2. Will not consider measurements for buses with no power injections

1. Prone to introducing error that is detectable by bad data detection

2. Requires comprehensive knowledge of the power grid topography and of the SCADA system

1. Will not consider measurements for buses with no power injections

2. Non-linear Jacobian matrix computationsDisclaimer This information was prepared as an account of work sponsored by an agency of the U.S. Government. Neither the U.S. government nor any agency thereof, nor any of their employees, makes any warranty, expressed or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness, of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. References herein to any specific commercial product, process, or service by trade name, trade mark, manufacturer, or otherwise, does not necessarily consti-tute or imply its endorsement, recommendation, or favoring by the U.S. Government or any agency thereof. The views and opinions of authors expressed herein do not necessarily state or reflect those of the U.S. government or any agency thereof.

Red box highlights: This research directly responds to this threat.

Orange / yellow box highlights: This research has the potential of responding to this threat. The potential response is not yet under investigation.

1. National Communications System (NCS), Technical Information Bulletin 04-1, “Supervisory Control and Data Acquisition (SCADA) Systems,” NCS TIB 04-1, October 2004, pp. 76. http://www.ncs.gov/library/tech_bulletins/2004/tib_04-1.pdf

2. J. Pollet, “SCADA Security Strategy,” Plant Data Technologies. 8 August 2002. Appears as “Table 6.1 SCADA Attack Matrix,” in [1].

3. Energy Sector Control Systems Working Group (ESCSWG), “Roadmap to Achieve Energy Delivery Systems Cybersecurity,” September 2011, p. 81. https://www.controlsystemsroadmap.net/ieRoadmap%20Documents/roadmap.pdf

4. G. Hug-Glanzmann and J.A. Giampapa, “Vulnerability Assessment of AC State Estimation with Respect to False Data Injection Cyber-Attacks,” in IEEE Transactions on Smart Grid, Vol. 3, No. 3, pp. 1362–1370, September 2012, DOI: 10.1109/TSG. 2012.2195338. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6275516&isnumber=6275510

5. A. Tajer, S. Kar, H.V. Poor, and S. Cui, “Distributed Joint Cyber Attack Detection and State Recovery in Smart Grids,” in Proceedings of Cyber and Physical Security and Privacy (IEEE SmartGridComm), © 2011 IEEE, pp. 202–207. http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=06102319

Contact Information Joseph Andrew GiampapaSenior Member of the Research Technical Staff Research, Technology, and System Solutions (RTSS) ProgramSoftware Engineering Institute Telephone: +1 412-268-6379Email: [email protected]

Ground Truth

Bus Bus

RTU-1 RTU-2

Control Center:Bad Data

Detection, StateEstimation

SCADAAgent-1

SCADAAgent-2

Agent Modelof the Control

Center

DistributionGrid

Other ControlCenters

SCADA Agentsof Other Areas

Other EMS Functions

…OPF CA AGC

OPF-A CA-A AGC-ADG-AOCC-A

Line

Test Bed Data FlowVisualization

of thePower Grid’sGround Truth

Visualization of thePower grid Operator’s

Perception of Grid State

FDI Cyber-Attack State

Measure

EstimateState

Power grid operator’s perception shouldbe as close to ground truth as possible.

BadData

Topologically-Motivated

Errors

EstimatedState

TemporaryData Store

MeasuredState

Agree withMeasurements

Disagree withMeasurements

EvaluateLocally

SCADA Agents

Control Center:Bad Data

Detection, StateEstimation

Team MembersJoseph Andrew GiampapaSoftware Engineering Institute PI, Project Point of Contact

Gabriela Hug-GlanzmannElectrical and Computer Engineering, Carnegie Mellon University Co-PI, Assistant Professor

Soummya KarElectrical and Computer Engineering, Carnegie Mellon UniversityResearcher, Assistant Research Professor

Kawa CheungMS Student, Electrical and Computer Engineering, Carnegie Mellon UniversityResearch Assistant

Mayank Kamalchand MaluMS Student, Institute for Software Research, Carnegie Mellon UniversityResearch Programmer

ProsMethod Cons

NA

NA