Cargando…

Physical-Model-Checking to Detect Switching-Related Attacks in Power Systems

Recent public disclosures on attacks targeting the power industry showed that savvy attackers are now capable of occulting themselves from conventional rule-based network intrusion detection systems (IDS), bringing about serious threats. In order to leverage the work of rule-based IDS, this paper pr...

Descripción completa

Detalles Bibliográficos
Autores principales: El Hariri, Mohamad, Faddel, Samy, Mohammed, Osama
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2018
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6112022/
https://www.ncbi.nlm.nih.gov/pubmed/30065218
http://dx.doi.org/10.3390/s18082478
_version_ 1783350773907718144
author El Hariri, Mohamad
Faddel, Samy
Mohammed, Osama
author_facet El Hariri, Mohamad
Faddel, Samy
Mohammed, Osama
author_sort El Hariri, Mohamad
collection PubMed
description Recent public disclosures on attacks targeting the power industry showed that savvy attackers are now capable of occulting themselves from conventional rule-based network intrusion detection systems (IDS), bringing about serious threats. In order to leverage the work of rule-based IDS, this paper presents an artificially intelligent physical-model-checking intrusion detection framework capable of detecting tampered-with control commands from control centers of power grids. Unlike the work presented in the literature, the work in this paper utilizes artificial intelligence (AI) to learn the load flow characteristics of the power system and benefits from the fast responses of the AI to decode and understand contents of network packets. The output of the AI is processed through an expert system to verify that incoming control commands do not violate the physical system operational constraints and do not put the power system in an insecure state. The proposed content-aware IDS is tested in simulation on a 14-bus IEEE benchmark system. Experimental verification on a small power system, with an IEC 61850 network architecture is also carried out. The results showed the accuracy of the proposed framework in successfully detecting malicious and/or erroneous control commands.
format Online
Article
Text
id pubmed-6112022
institution National Center for Biotechnology Information
language English
publishDate 2018
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-61120222018-08-30 Physical-Model-Checking to Detect Switching-Related Attacks in Power Systems El Hariri, Mohamad Faddel, Samy Mohammed, Osama Sensors (Basel) Article Recent public disclosures on attacks targeting the power industry showed that savvy attackers are now capable of occulting themselves from conventional rule-based network intrusion detection systems (IDS), bringing about serious threats. In order to leverage the work of rule-based IDS, this paper presents an artificially intelligent physical-model-checking intrusion detection framework capable of detecting tampered-with control commands from control centers of power grids. Unlike the work presented in the literature, the work in this paper utilizes artificial intelligence (AI) to learn the load flow characteristics of the power system and benefits from the fast responses of the AI to decode and understand contents of network packets. The output of the AI is processed through an expert system to verify that incoming control commands do not violate the physical system operational constraints and do not put the power system in an insecure state. The proposed content-aware IDS is tested in simulation on a 14-bus IEEE benchmark system. Experimental verification on a small power system, with an IEC 61850 network architecture is also carried out. The results showed the accuracy of the proposed framework in successfully detecting malicious and/or erroneous control commands. MDPI 2018-07-31 /pmc/articles/PMC6112022/ /pubmed/30065218 http://dx.doi.org/10.3390/s18082478 Text en © 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
El Hariri, Mohamad
Faddel, Samy
Mohammed, Osama
Physical-Model-Checking to Detect Switching-Related Attacks in Power Systems
title Physical-Model-Checking to Detect Switching-Related Attacks in Power Systems
title_full Physical-Model-Checking to Detect Switching-Related Attacks in Power Systems
title_fullStr Physical-Model-Checking to Detect Switching-Related Attacks in Power Systems
title_full_unstemmed Physical-Model-Checking to Detect Switching-Related Attacks in Power Systems
title_short Physical-Model-Checking to Detect Switching-Related Attacks in Power Systems
title_sort physical-model-checking to detect switching-related attacks in power systems
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6112022/
https://www.ncbi.nlm.nih.gov/pubmed/30065218
http://dx.doi.org/10.3390/s18082478
work_keys_str_mv AT elharirimohamad physicalmodelcheckingtodetectswitchingrelatedattacksinpowersystems
AT faddelsamy physicalmodelcheckingtodetectswitchingrelatedattacksinpowersystems
AT mohammedosama physicalmodelcheckingtodetectswitchingrelatedattacksinpowersystems