Physical-Model-Checking to Detect Switching-Related Attacks in Power Systems

Recent public disclosures on attacks targeting the power industry showed that savvy attackers are now capable of occulting themselves from conventional rule-based network intrusion detection systems (IDS), bringing about serious threats. In order to leverage the work of rule-based IDS, this paper pr...

Full description

Bibliographic Details
Main Authors: Mohamad El Hariri, Samy Faddel, Osama Mohammed
Format: Article
Language:English
Published: MDPI AG 2018-07-01
Series:Sensors
Subjects:
Online Access:http://www.mdpi.com/1424-8220/18/8/2478
_version_ 1811185311848333312
author Mohamad El Hariri
Samy Faddel
Osama Mohammed
author_facet Mohamad El Hariri
Samy Faddel
Osama Mohammed
author_sort Mohamad El Hariri
collection DOAJ
description Recent public disclosures on attacks targeting the power industry showed that savvy attackers are now capable of occulting themselves from conventional rule-based network intrusion detection systems (IDS), bringing about serious threats. In order to leverage the work of rule-based IDS, this paper presents an artificially intelligent physical-model-checking intrusion detection framework capable of detecting tampered-with control commands from control centers of power grids. Unlike the work presented in the literature, the work in this paper utilizes artificial intelligence (AI) to learn the load flow characteristics of the power system and benefits from the fast responses of the AI to decode and understand contents of network packets. The output of the AI is processed through an expert system to verify that incoming control commands do not violate the physical system operational constraints and do not put the power system in an insecure state. The proposed content-aware IDS is tested in simulation on a 14-bus IEEE benchmark system. Experimental verification on a small power system, with an IEC 61850 network architecture is also carried out. The results showed the accuracy of the proposed framework in successfully detecting malicious and/or erroneous control commands.
first_indexed 2024-04-11T13:27:22Z
format Article
id doaj.art-fb87693f7b6242f6aadd3965a83f95fd
institution Directory Open Access Journal
issn 1424-8220
language English
last_indexed 2024-04-11T13:27:22Z
publishDate 2018-07-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj.art-fb87693f7b6242f6aadd3965a83f95fd2022-12-22T04:22:00ZengMDPI AGSensors1424-82202018-07-01188247810.3390/s18082478s18082478Physical-Model-Checking to Detect Switching-Related Attacks in Power SystemsMohamad El Hariri0Samy Faddel1Osama Mohammed2Energy Systems Research Laboratory, Department of Electrical and Computer Engineering, Florida International University, Miami, FL 33174, USAEnergy Systems Research Laboratory, Department of Electrical and Computer Engineering, Florida International University, Miami, FL 33174, USAEnergy Systems Research Laboratory, Department of Electrical and Computer Engineering, Florida International University, Miami, FL 33174, USARecent public disclosures on attacks targeting the power industry showed that savvy attackers are now capable of occulting themselves from conventional rule-based network intrusion detection systems (IDS), bringing about serious threats. In order to leverage the work of rule-based IDS, this paper presents an artificially intelligent physical-model-checking intrusion detection framework capable of detecting tampered-with control commands from control centers of power grids. Unlike the work presented in the literature, the work in this paper utilizes artificial intelligence (AI) to learn the load flow characteristics of the power system and benefits from the fast responses of the AI to decode and understand contents of network packets. The output of the AI is processed through an expert system to verify that incoming control commands do not violate the physical system operational constraints and do not put the power system in an insecure state. The proposed content-aware IDS is tested in simulation on a 14-bus IEEE benchmark system. Experimental verification on a small power system, with an IEC 61850 network architecture is also carried out. The results showed the accuracy of the proposed framework in successfully detecting malicious and/or erroneous control commands.http://www.mdpi.com/1424-8220/18/8/2478agent systemscyber-physical securitydecentralized controlintelligent systems
spellingShingle Mohamad El Hariri
Samy Faddel
Osama Mohammed
Physical-Model-Checking to Detect Switching-Related Attacks in Power Systems
Sensors
agent systems
cyber-physical security
decentralized control
intelligent systems
title Physical-Model-Checking to Detect Switching-Related Attacks in Power Systems
title_full Physical-Model-Checking to Detect Switching-Related Attacks in Power Systems
title_fullStr Physical-Model-Checking to Detect Switching-Related Attacks in Power Systems
title_full_unstemmed Physical-Model-Checking to Detect Switching-Related Attacks in Power Systems
title_short Physical-Model-Checking to Detect Switching-Related Attacks in Power Systems
title_sort physical model checking to detect switching related attacks in power systems
topic agent systems
cyber-physical security
decentralized control
intelligent systems
url http://www.mdpi.com/1424-8220/18/8/2478
work_keys_str_mv AT mohamadelhariri physicalmodelcheckingtodetectswitchingrelatedattacksinpowersystems
AT samyfaddel physicalmodelcheckingtodetectswitchingrelatedattacksinpowersystems
AT osamamohammed physicalmodelcheckingtodetectswitchingrelatedattacksinpowersystems