RAINCOAT: Randomize Network Communication in Power Grid Cyber Infrastructure to Mislead Cyber Attackers
Hui Lin, Zbigniew Kalbarczyk, Ravishankar Iyer
University of Illinois at Urbana-Champaign
Communication in Power Grid Cyber Infrastructure to Mislead Cyber - - PowerPoint PPT Presentation
RAINCOAT: Randomize Network Communication in Power Grid Cyber Infrastructure to Mislead Cyber Attackers Hui Lin, Zbigniew Kalbarczyk , Ravishankar Iyer University of Illinois at Urbana-Champaign UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN |
University of Illinois at Urbana-Champaign
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS
Detection Rely on general purpose security measures, e.g., firewalls or IDSs Shortcomings:
barriers between corporate and control networks
positives
Detection Combine knowledge on cyber and physical infrastructures Shortcomings:
normal operations
responses mitigating a disruption of physical processes
Preparation: study physical process, to decide malicious operations Penetration: establish a foothold in a control network Execution: deliver malicious operations
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS
Substations Field Site
RTU End Device End Device Sensors/ Breakers
Control Center
HMI IP-based network Hardwired connection
WAN LAN
Sensors/ Breakers Edge network switches
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS
communication path that connects the control center and end devices
sensors, and breakers
traffic to disrupt and mislead attacks
Substations Field Site
RTU End Device End Device Sensors/ Breakers
Control Center
HMI IP-based network Hardwired connection
WAN LAN
Sensors/ Breakers Edge network switches
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS
Substations Field Site
RTU End Device End Device Sensors/ Breakers
Control Center
HMI IP-based network Hardwired connection
WAN LAN
Sensors/ Breakers Edge network switches
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS
– T ranges from 1 to 10 seconds (based on IEEE Std 1646)
6
SCADA
Time
Edge Switch Edge Switch End Device T Control Center Substations
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS
– Obfuscate attackers with randomized device connectivity and the mix
– Allow system operators collecting measurements from all devices with the same interval
SCADA
Time
Edge Switch Edge Switch End Device
⑤ responses with real and spoof data ④ responses with real data
T
① requests to all devices ⑥ responses with real and spoof data ② randomize requests ③ requests to online devices
Control Center Substations
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS
– Randomize data acquisition request – Spoof measurements on behalf of off-line devices
SCADA
Time
Edge Switch Edge Switch End Device
⑤ responses with real and spoof data ④ responses with real data
T
① requests to all devices ⑥ responses with real and spoof data ② randomized requests ③ requests to online devices
Control Center Substations
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS
attack strategies
– In false data injection attacks (FDIA), compromised measurements do not bypass the bad data detection in the state estimation – In control-related attacks (CRA), compromised control commands do not lead to physical damage
Type Preconditions Target FDIA 𝐶
𝑘𝑙, susceptance of all transmission
lines 𝑄
𝑘 𝐻 and 𝑄 𝑘 𝑀 of all substations; 𝑄 𝑘𝑙 of all
transmission lines CRA 𝑄
𝑘 𝐻, 𝑅𝑘 𝐻, 𝑄 𝑘 𝑀, 𝑅𝑘 𝑀 (active/reactive
power generation and consumptions) of all substations; 𝑄
𝑘𝑙, 𝑅𝑘𝑙 (active/reactive power
flows) of all transmission lines Control commands that can disconnect transmission lines or substations in a power grid
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS
– Step 1.a: mislead FDIAs (false data injection attack)
– Step 1.b: mislead CRAs (control-related attacks)
– Iteratively use the results/errors from state estimation to:
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS
– Use commands to disconnect multiple transmission lines to cause overloading lines
– Identify critical transmission lines, which deliver heavy power flows
– Craft decoy measurements such that attackers always target transmission lines that deliver light power flows 100MW 5MW 10MW
A B C
Real Measurements
5MW 100MW 10MW
A B C
Decoy Measurements
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS
– Bypass the bad data detection
12
100MW 5MW 10MW 5MW 100MW 10MW 12MW 96MW 10MW
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS
(including SDN hardware switches) to construct control networks
– Control center collects measurements or issues commands to end devices
Use Matpower to simulate power systems
Estimate state after a command is executed
Use power measurements to build network traffic Execute (attack) command transmitted in real networks
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS
in Matpower
bus, 405-bus, and 1153-bus systems
disconnect transmission lines
successful attacks
successful attacks is reduced from 70% to 5% (for 1153-buses system)
attacks
– Compromise measurements – Measure the probability of successful attacks, which bypass the bad data detection
evaluated attacks are detected
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS
– Targeted attack
– Raincoat
measurements
– Random attack (baseline)
and state
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS
RTS-96; IEEE Reliability Test System, including 73 buses and 120 transmission lines)
to below 20% (when using Raincoat)
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS
– Latency between edge switches and SDN controllers – Latency of SDN controllers constructing spoofed measurements
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS
– Randomize network connectivity of end devices
– Craft decoy measurements
– False data injection attacks that cannot pass the state estimation – Control-related attacks whose probability of generating physical damage is reduced to less than 5%
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN | ENGINEERING AT ILLINOIS
Integrated Intrusion Detection Framework for SCADA (based on Bro)
Network analyzer for SCADA protocols (DNP3) Fast state estimation to detect and mitigate control-related attacks
state estimation to predict consequence of malicious commands RAINCOAT, an SDN-based approach to randomize network communication in Power Grid cyber infrastructure to mislead attackers
connectivity of devices in substations to
ineffective attack strategies
Architecture of an SDN-enabled grid
Research Goals
Experimental validation of the framework