Abstract

The thematics focusing on inserting intelligence in cyber-physical critical infrastructures (CI) have been receiving a lot of attention in the recent years. This paper presents a methodology able to differentiate between the normal state of a system composed of interdependent infrastructures and states that appear to be normal but the system (or parts of it) has been compromised. The system under attack seems to operate properly since the associated measurements are simply a variation of the normal ones created by the attacker, and intended to mislead the operator while the consequences may be of catastrophic nature. Here, we propose a holistic modeling scheme based on Gaussian mixture models estimating the probability density function of the parameters coming from linear time invariant (LTI) models. LTI models are approximating the relationships between the datastreams coming from the CI. The experimental platform includes a power grid simulator of the IEEE 30 bus model controlled by a cyber network platform. Subsequently, we implemented a wide range of integrity attacks (replay, ramp, pulse, scaling, and random) with different intensity levels. An extensive experimental campaign was designed and we report satisfying detection results.

Highlights

  • Modern critical infrastructures (CI) rely on advanced information and communication technologies (ICT) which have an important role in their monitoring and control

  • This paper addresses the problem of integrity attacks occurring in an ICT-controlled CI

  • Due to the nature of the proposed solution, the parametrization needs to take place on two sides: (a) each linear time invariant (LTI) model was of an autoregressive type while the order was the one with the highest reconstruction capabilities on a validation set VS taken out of the {3, 4, 5, 6, 7} set; and (b) for the Gaussian modelling part, the number of components was chosen from the set {1, . . . , 30}, where the step is 1

Read more

Summary

Introduction

Modern critical infrastructures (CI) rely on advanced information and communication technologies (ICT) which have an important role in their monitoring and control. The present article focusses on detecting integrity attacks occurring in the ICT layer These can be implemented either by affecting the power grid components/equipment, which are responsible for distribution systems, or by manipulating the exchanging protocol messages in order for the attacker to send malicious data to the field device or the control center operator [12]. The anomalies include simple fault cases without the presence of integrity attacks It is worth mentioning a similar line of works focusing on the detection of bad data provided by phasor measurement units [18,19]. The network operator may decide to switch to an operational state which ensures service while restricting, confining or even overriding the usage of the ICT layer suffering the attack This way, the network can still satisfy the service demand (even without working while operating in an optimal manner) while the attack will have minimum affects on its components. The experimental set-up and results are provided in Section 4 while Section 5 concludes this work

Problem Definition
Probabilistic Modeling
Gaussian Mixture Modeling of LTI Coefficients
The Platform
Cyber-Attacks
Parametrization and Results
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call