man-in-the-middle attack on the power grid · man-in-the-middle attack on power grid: attack...

29
MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES Lang Tong School of Electrical and Computer Engineering Cornell University, Ithaca, NY Joint work with Jinsub Kim and Robert J. Thomas Presented at the PSERC Webinar, November 19, 2013

Upload: phamkien

Post on 30-Jun-2018

236 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks

MAN-IN-THE-MIDDLE ATTACK ON POWER GRID:

ATTACK MECHANISMS AND COUNTER MEASURES

Lang Tong School of Electrical and Computer Engineering Cornell University, Ithaca, NY

Joint work with Jinsub Kim and Robert J. Thomas

Presented at the PSERC Webinar, November 19, 2013

Page 2: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks

The 2003 northeast blackout

Source: http://www.noaanews.noaa.gov/stories/s2015.htm Acknowledgement: The speaker thanks Carl Hauser at WSU for pointing out the incorrect image used in the seminar.

Page 3: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks

Pre-blackout events

U.S.-Canada Power System Outage Task Force, “Final report on the August 14, 2003 blackout in the united states and Canada: causes and recommendations, April 2004”

Page 4: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks

Pre-blackout events

U.S.-Canada Power System Outage Task Force, “Final report on the August 14, 2003 blackout in the united states and Canada: causes and recommendations, April 2004”

Page 5: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks

Pre-blackout events

U.S.-Canada Power System Outage Task Force, “Final report on the August 14, 2003 blackout in the united states and Canada: causes and recommendations, April 2004”

Page 6: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks

On the security of the grid

Page 7: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks

Power system and vulnerabilities

Page 8: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks

Power system and vulnerabilities

System vulnerabilities Backdoor attacks (Stuxnet) Man-in-the-middle attack Denial of service attacks

Page 9: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks

Outline

System model and observability State attack: mechanisms and protection Topology attack: mechanisms and protection Data driven attack Summary and conclusions

Main theme:

Develop graph and algebraic (matrix) techniques to characterize unobservable attacks

Gain insights into cost-effective protection mechanisms.

Page 10: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks

Power network and measurement model

Page 11: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks

State estimation and bad data detection

Page 12: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks

Network observability

Page 13: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks

Observability: algebraic condition

Page 14: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks

Unobservable attack

Page 15: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks

Unobservable attack

Page 16: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks

Can attack make network unobservable?

Page 17: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks

Observability:graph theoretic condition

Page 18: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks

Unobservable attack and protection

Page 19: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks

Framing attack

Jinsub Kim, Lang Tong, Robert J. Thomas, “Data framing attack on state estimation with unknown network parameters,” Asilomar Conf. on Signals, Systems, and Computers, Nov., 2013.

Page 20: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks

Framing attack via QCQP

Jinsub Kim, Lang Tong, Robert J. Thomas, “Data framing attack on state estimation with unknown network parameters,” Asilomar Conf. on Signals, Systems, and Computers, Nov., 2013.

Page 21: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks

Topology attack

Jinsub Kim, Lang Tong, “On topology attack of a smart grid: undetectable attacks and countermeasures,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 7, July, 2013.

Page 22: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks

Protection against topology attack

Jinsub Kim, Lang Tong, “On topology attack of a smart grid: undetectable attacks and countermeasures,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 7, July, 2013.

Page 23: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks

Protection against topology attack

Jinsub Kim, Lang Tong, “On topology attack of a smart grid: undetectable attacks and countermeasures,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 7, July, 2013.

Page 24: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks

Protection against topology attack via PMU

Jinsub Kim, Lang Tong, “On phasor measurement unit placement against state and topology attack,” IEEE SmartGridComm, October, 2013.

Page 25: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks

Optimal PMU placement

Jinsub Kim, Lang Tong, “On phasor measurement unit placement against state and topology attack,” IEEE SmartGridComm, October, 2013.

Page 26: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks

Data driven attacks

Network topology and network parameters are difficult to obtain. But they may not be needed!

Algebraic (rank) conditions for attacks can be used to construct data-driven attacks via subspace learning.

Topology conditions can be used to construct attacks using only local measurements.

Jinsub Kim, Lang Tong, Robert J. Thomas, “Data framing attack on state estimation with unknown network parameters,” Asilomar Conf. on Signals, Systems, and Computers, Nov., 2013.

Page 27: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks

Framing attack with unknown network parameters

Jinsub Kim, Lang Tong, Robert J. Thomas, “Data framing attack on state estimation with unknown network parameters,” Asilomar Conf. on Signals, Systems, and Computers, Nov., 2013.

Page 28: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks

Framing attack with unknown network parameters and partial measurements

Jinsub Kim, Lang Tong, Robert J. Thomas, “Data framing attack on state estimation with unknown network parameters,” Asilomar Conf. on Signals, Systems, and Computers, Nov., 2013.

Page 29: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks

Conclusions

Perfect security does not exists. Cyber security (encryption and authentication)

techniques need to be complemented by monitoring and security measures based on physical systems.

Beyond state and topology attacks Attack on real-time (dispatch and market) operations Real-time contingency analysis (RTCA)

Data driven approach to attacks and counter measures