DETECTING DATA MANIPULATION ATTACKS Review
DETECTING DATA MANIPULATION ATTACKS Review
net/publication/316460531
CITATIONS READS
0 1,371
3 authors, including:
All content following this page was uploaded by Eniye Tebekaemi on 25 April 2017.
Abstract Any form of deliberate activity (physical or cyber) that attempts to un-
dermine control mechanisms that maintain the objectives of reliability,
efficiency, and safety of a physical system can be considered an attack
on the system. Such attacks can be as subtle as configuration changes
that prevent the optimal operation of the power system through data
modification. In this work, we introduce a system that enhances the se-
curity of the interlocking functions in power distribution substations by
using the power flow behavior of the physical system during switching
events as a direct power feedback. This solution detects potential over
the network data modification attacks on the interlocking function us-
ing out of bounds sensor measurements as direct power feedback. This
direct power feedback adds an extra layer of security and redundancy
to any existing security mechanisms of power substation interlocking.
1. Introduction
In the age of smart grids, power substations will be expected to
support bidirectional power flows between distributed energy sources,
storage facilities, and power consumers. Substations use switchgears to
maintain the appropriate flow of power, protect equipment, and pro-
vide redundancy during power source or equipment failures. Interlock-
ing functions in the substations prevent mal-operation of switchgears by
keeping information about the operational state of the switchgear and
permissible state transitions from the current state to the next state.
Doing so ensures the correct sequences of switching and prevents any
2
2. Related Work
Using extraneous peripheral information from sensor measurements
in physical systems to observe the system behavior and state is com-
mon in cyber-physical systems. However, there has been little effort
to integrate this information into intrusion detection systems for cyber-
physical systems. An example solution is discussed by Colbert et al. [1]
who developed a process-oriented method for intrusion detection for use
on Industrial Control Systems (iPoid). In their system, data from crit-
ical elements in the physical system are collected by sensors and used
to estimate the state of the system by an intrusion detection system
(IDS). Control operations sent over the network are intercepted by the
IDS and evaluated using the estimated system state and system guard
conditions. Alerts are raised if the network controlled operation violates
the guard conditions based on the estimated system state.
Koustandria et al. [2] proposed the hybrid control network intrusion
detection system (HC-NIDS). By using expected communications pat-
terns and physical limitations of the physical system they developed an
intrusion detection system that leverages the physical part of the sys-
tem and able to detect a wide range of attack scenarios. Their work was
Tebekaemi, Colbert & Wijesekera 3
limited to protective digital relays for power transmission grids and fo-
cused primarily on attack detection using packet sequence, the time gap
between packets, and the measured current value of relays. They eval-
uate each packet and communications flow against the expected packet
sequence, the maximum allowed time delay, the current measurement of
the relay, and detects an attack if any of these constraints are violated
or a circuit breaker activation request is received when the measured
current is less than the cut-off current.
Mitchell et al. [3] created a behavioral rule-based unmanned air vehi-
cles IDS (BRUIDS). BRUIDS is an adaptive intrusion detection mech-
anism, focusing on unmanned air vehicles using behavior rule specifica-
tions. They use a set of the systems physical behavioral rules and the
system state transformation rules to identify attacks. Their system con-
sists of monitor nodes (sensors and actuators) monitoring other nodes
(sensors and actuators) or a neighbor system (UAV) monitoring another
trusted system (UAV). The monitoring system evaluates the monitored
systems behavior against a set of predefined behavioral and transition
rules and identifies any violation as an attack.
Sawada et al. [4] and Harshe et al. [5] propose a solution to the cyber-
physical security problem by using local (backup) controllers that kicks
in when the remote (central) controller becomes compromised or un-
available. The central controllers usually optimize the networked control
system (NCS) for high performance and the local controller guarantees
minimum performance requirement for the logical subsystem. Their sys-
tem continuously evaluates control signals received from the central con-
troller against the physical system and switches to the backup controller
if a violation is observed.
For cyber-physical systems, security solutions must be designed to
understand the physical system’s unique process behavior. The solutions
discussed above do not directly address data manipulation attacks of the
substation interlocking process, but they provide a useful starting point
in reasoning about security for cyber-physical systems.
3. Substation Interlocking
Switchgears implement protection and control functions which are
triggered in response to system guard conditions, automation and opti-
mization functions or by human intervention. Substations are equipped
with switchgear devices that are independently controlled, and perform
functions such as fault isolation, sectionalization, overcurrent, and over-
voltage protection. Types of switchgear used in substations include; iso-
lator Switches, contactor Switch, earthing switches, and circuit breakers.
4
notifies the CSWI about the failure or success of the operation and in
turn, the CSWI notifies the IHMI of any success or failure. Finally, the
XCBR notifies the CILO of the state change if any in message 8. In Pan
et al. [6], the GOOSE update messages are protected with a keyed-hash
message authentication code (HMAC). From time to time the XCBR
and XSWI are expected to send status messages to the CILO to ensure
the state information maintained by the CILO correctly reflects that of
the physical switchgears.
The behavior of the CILO is described using the validate CSWI re-
quest algorithm (Algorthm 1). The validate CSWI request algorithm
request is called whenever a new request is received. In line 4, the CILO
6
checks for the number of switchgears that would be affected by the re-
quest, obtains the current switchgear configuration in line 5, and the
new configuration based on the change request in line 6. In line 7, the
CILO checks to ensure that the request does not violate any interlocking
rule and returns a true or false. If the number of switchgear that would
be affected by the request is no more than one and the new configura-
tion is valid, the CILO returns a true to the CSWI meaning the change
is allowed. If more than one switchgear is affected by request, the al-
gorithm proceeds to line 10 calling transition sequence function. The
transition sequence specifies the order in which the switchgear affected
by the change request should be implemented. Usually, an execution in-
terval of between 1ms to 10ms delay is allowed for concurrent switchgear
operations.
4. Attack Description
The CILO translates switchgear configuration rules into a valid con-
figuration table as shown in Figure 1. A valid configuration is a vector
that indicates the permitted state of all the switchgear devices at any
given instant. The valid configuration table is the collection of all pos-
sible valid configurations. Let s be the number of switchgear devices in
the substation, then all possible switchgear configuration C ∈ {0, 1}s .
Assuming C ~ 0 is a valid configuration, and n be the total number of
valid configuration, we can define the valid configuration table as a set
T = {C ~0,C ~0,···,C ~ n0 }. Therefore a state change request τi+1 , can only
1 2
be allowed to change the CILO current configuration state from C ~ 0 to
i
C~ 0 if and only if F : C ~ 0 × τi+1 ⇒ C~ 0 ∈ T , where F is the transition
j i j
mapping function, and 1 ≤ i, j ≤ n, i 6= j. Whenever a change request is
successfully executed by the XCBR or XSWI, a status update message is
sent to the CILO, and the CILO updates its current configuration state
from C ~ 0 to C
~0.
i j
Process level communications is time critical as IEC 61850 requires a
delay of not more than 4ms in the transmission of GOOSE and SV mes-
sages. This requirement makes implementing encryption based security
solutions difficult. IEC 61850 does not recommend the encryption of SV
8
ther CS1 or CS2 is closed. Executing the request will raise current values
astronomically (since the voltage is suddenly reduced to approximately
0) which could damage equipment and cause fatal accidents. In Table 2
row 14, we see that executing such request raised the current value to
850 times the nominal current value.
5. Proposed Solution
Electrical equipment and appliance show unique physical attributes
properties when triggered by ON/OFF commands, which can be seen
10
Figure 2. Transient and steady state voltage behavior during switch close operation
(p.u. = measured value/nominal value )
measurements from the sensors are obtained and used to estimates the
current state of the switchgears. In line 4 and 5, the goose update mes-
sage and the power feedback information are compared if the reported
event is consistent and within the same time frame. The GOOSE up-
date and SV feedback messages will arrive at the interlocking function
at slightly times, so we approximate the time values and check if both
messages arrives within an acceptable time frame. If any inconsistency
is found in the reported event or the time frame, then there is a high
probability the GOOSE update message has been modified.
Algorithm 3 runs continuously as a background process and checks
for changes in voltage and current waveforms obtained from the SV
messages. If any significant change is detected in line 3, the security
controller proceeds to obtain the change information using line 4. The
reported change is checked in line 5 to ascertain if the event is a result
of a state change using, and returns true if the event is caused by a
switchgear. If the event is a result of a switchgear operation and no
GOOSE update message is received, then there is a high probability
that the update message has been blocked.
6.1.3 Attacks.
Blocked GOOSE Update: We assume that the attack has access to the
process LAN and blocks the sending of GOOSE update messages.
To simulate this we configured the controllers not to send update
messages after a state change operation.
6.2 Results
The simulation was first run with the CILO security controller de-
activated. The interlocking IED used the GOOSE stNum, sqNum,
and timestamp fields to detect replay attacks. However, if the stNum,
sqNum, and timestamp is modified to mimic a new update message we
were able to successfully modify the interlock configuration state. For
missing or blocked update messages, the interlocking IED had no way
of detecting such events and easily entered an inconsistent state. When
the security controller was activated, both the modified replay attacks
and the missing update messages were detected. The Security controller
always validates the GOOSE update messages with the power feedback
SV messages to ensure that the GOOSE update message is valid. Also,
by continuously listening to changes in the physical system, security con-
trol can detect configurations changes observed by the power feedback
SV messages but not report by the GOOSE update messages.Table 4
shows a summary of the performance of the interlocking function with
and without the security controller. The time (ms) is the time in mil-
liseconds it takes from when the control operation is initiated by the
switch controller (CSWI) to when the interlocking IED updates its con-
figuration state.
7. Conclusion
Interlocking is a critical substation automation function that ensures
the safety of lives and equipment, reliability and resiliency of power
systems. Failures of interlocking functions could result in loss of lives
and property and therefore a high value target for malicious attackers.
Power systems have very constraining time requirements which make the
use of cryptographical techniques and tools to protect data undesirable
Tebekaemi, Colbert & Wijesekera 17
References
[1] E. Colbert D. Sullivan, S. Hutchinson, K. Renard, and S. Smith,
A process-oriented intrusion detection method for industrial control
systems, International Conference on Cyber Warfare and Security,
Academic Conferences International Limited, pp. 497, 2016.
[2] G. Koutsandria, V. Muthukumar, M. Parvania, S. Peisert, C. Mc-
Parland, and A. Scaglione, A hybrid network IDS for protective dig-
ital relays in the power transmission grid, 2014 IEEE International
Conference on Smart Grid Communications (SmartGridComm),
pp. 908-913, 2014.
[3] R.Mitchell and R.Chen, Adaptive intrusion detection of malicious
unmanned air vehicles using behavior rule specifications. IEEE
Transactions on Systems, Man, and Cybernetics Systems, vol. 44(5),
pp. 593-604, 2014.
[4] K. Sawada, T. Sasaki, S. Shin, and S. Hosokawa, A fallback con-
trol study of networked control systems for cybersecurity, Control
Conference (ASCC), 2015 10th Asian, pp. 1-6, 2015.
[5] O. A. Harshe N. T Chiluvuri, C. D. Patterson, and W. T. Baumann,
Design and implementation of a security framework for industrial
18