1. Introduction
The seamless merging of traditional power systems with cutting-edge information technologies has become an inevitable trend in smart grids [
1,
2]. In a power distribution system, with the help of advanced information technologies and intelligent feeder remote terminal units (FRTU), a distribution automation system (DAS) is able to provide higher reliability, greater efficiency and intensive interactions with consumers [
3].
Nonetheless, the adoption of common communication protocols and deployment of various intelligent electronic devices (IED) introduces more vulnerabilities which can be used by cyber attackers [
4]. Moreover, the tighter integration of cyber systems and physical power systems can easily lead to cyber-attacks that can degrade control performance or even cause power outages in a smart grid [
5,
6]. Thus, knowing how to deal with the cyber security issues of smart grids has become a new challenge. Some basic guidelines for cyber security have been published [
7,
8] and some studies on the cyber security of power control systems have been carried out in the past few years [
9,
10,
11,
12,
13,
14]. The existence of exploitable vulnerabilities is the precondition for cyber-attacks.
However, most of the existing cyber security studies focus on the control systems in power plants or substations. In these studies, the intelligent terminal devices are usually located in restricted areas. On the contrary, the terminal devices in a DAS are usually located at remote areas with limited physical protection, e.g., FRTUs [
15]. These terminal devices act as widespread real-time monitors and intelligent controllers in a distribution system, and can exchange measurement data and control commands with the DAS control center server through communication network in normal operations. As for cyber-attacks, an attacker can penetrate FRTUs or other terminal devices via the modems between them and the communication network. On account of the limited computational capacity, most of the effective security measures found in computer networks cannot be used directly in the terminal devices [
16]. Moreover, the intelligent terminal devices in a DAS will support more open and standardized communication protocols such as IEC 61850 in the near future [
17]. For these reasons, the DAS is more vulnerable to cyber-attacks and therefore the security issues in a DAS should be properly addressed.
It is worth noting that ensuring the complete security of every single device in the DAS is hardly possible from the point of view of the cost of implementing the security measures [
18]. Thus, an assessment framework for vulnerability ranking in a DAS is urgently required. The common vulnerability scoring system (CVSS) provides an open framework for vulnerability assessment [
19]. It evaluates the impacts of vulnerabilities in computer networks from three aspects: base, temporal and environmental. However, the CVSS scores each vulnerability independently. It cannot analyze the impacts of cyber- attacks on physical systems, and does not take the interactions among different vulnerabilities into consideration. Ten [
11] proposed an assessment framework to evaluate the vulnerability of supervisory control and data acquisition (SCADA) systems. Zonous [
13] presented a unified formalism to model cyber-physical systems and proposed a vulnerability ranking method according to the potential physical consequences as well as attack complexity. However, these researches mainly focus on the cyber-attacks against power transmission systems and the interaction between attackers and defenders has not been analysed.
This paper focuses on the vulnerability assessment issue in a DAS. The purposes are to study the potential physical consequences of cyber-attacks on a DAS and to help system operators rank the vulnerabilities so as to more effectively enhance the cyber security of a DAS. The main contribution of this paper is proposing an original vulnerability assessment model to rank the vulnerabilities in a DAS based on potential consequences of cyber-attacks and the relationship among different vulnerabilities. Specifically, the potential physical consequences of cyber-attacks are discussed from two aspects: terminal devices and control center servers. The attack processes are modeled as a series of attack-defense games (ADGs) and relationships among different vulnerabilities are analyzed by introducing vulnerability adjacency matrix.
The rest of this paper is organized as follows:
Section 2 presents the overall process of vulnerability assessment.
Section 3 analyzes the physical consequences of cyber-attacks.
Section 4 and
Section 5 build the game model and introduce the vulnerability adjacency matrix to analyze the relationship among vulnerabilities, respectively. A case study based on bus 2 of the Roy Billinton Test System (RBTS) is used to illustrate how to apply the proposed method in
Section 6. Finally, some conclusions are given in
Section 7.
3. Physical Consequences Analysis
Based on the discussion in
Section 2.1, the physical consequences caused by loss of integrity and availability are analyzed from two levels: terminal devices and control center server. Moreover, both of the normal and fault work condition are considered in this paper.
As shown in
Figure 3, a typical multi-sectioned and multi-linked distribution system is given for understanding the potential physical consequences of cyber-attacks. In
Figure 3, CB, L, F, S, T represents the circuit breaker, the load, the FRTU, the section switch and the tie switch, respectively. Every switch and circuit breaker is monitored and controlled by control center through an FRTU. The main feeder is divided into several feeder sections by the circuit breaker and other switches.
Figure 3.
Multi-sectioned and multi-linked network of a distribution system.
Figure 3.
Multi-sectioned and multi-linked network of a distribution system.
When a fault occurs, there are two schemes to implement the restoration function: centralized feeder automation (Scheme 1) and agent-based feeder automation (Scheme 2). As for Scheme 1, all the information will be sent to the control center server from FRTUs, and the server performs fault detection, isolation, and restoration. In Scheme 2, an FRTU can exchange information with its neighbor FRTUs to detect and isolate the fault area. The FRTU of the feeder breaker (
i.e., F0 in
Figure 3) collects information from other FRTUs in feeder
h, communicates with the FRTUs of the breakers in its neighbor feeders (
i.e., the feeders that are connected with feeder
h through tie switches), and then performs restoration function to the power outage area.
3.1. Terminal Devices
3.1.1. FRTUs of Section Switches
Control commands and measurement data are the core information being exchanged in a DAS. The control commands are mainly used to operate switches, while the measurement data is used for decision-making. Thus, the consequence caused by loss of integrity in FRTUs of section switches can be determined by:
where
Ih,i represents the consequence caused by loss of integrity in
Fh,i and
Fh,i is the
ith FRTU in main feeder
h;
and
denotes the consequence caused by loss of control command integrity and measurement data integrity in
Fh,i respectively.
Loss of control commands integrity or measurement data integrity allows an attacker to modify the corresponding information. The modification of control information will result in loss of load directly. For example, a command injection attack on F4 can trip section switch S4 and therefore cause the loss of load L5. With the help of fault detection, isolation and restoration, the power supply to L5 can be restored automatically in several minutes. Thus, the consequence caused by integrity loss of control command is described as:
where Ω
h,j is the impact factor of the loads in the
jth feeder section of feeder
h;
th is the duration of power outage which is equal to the time needed to apply restoration function in feeder
h;
Nh is the number of feeder sections in feeder
h;
Lk and
ωk represents the loading level and the importance of
kth load respectively;
Sh,j is the set of loads in
jth feeder section of feeder
h. The importance of load represents the comprehensive influence on personal and property safety, which is on a scale of 1–5 [
26]. The more important the load is, the higher it scores.
The modification of measurement data will mislead the DAS to make an improper control decision. Let us take the measurement data in F2 as an example. When a fault occurs between S1 and S2, S1 experiences a fault current while S2 does not. The correct actions include disconnecting S1 and S2, and closing tie switches to restore power supply to the rest of the distribution system. However, if the measurement data in F2 is tampered, the control center server (in Scheme 1) or agent-based FRTUs (in Scheme 2) would mistakenly believe that S2 experiences a fault current and therefore disconnect S2 and S3. Moreover, CB1 cannot be reclosed as a result that the fault has not been isolated. Thus, L1 and L3 will be wrongly removed compared to the correct control actions. On the other hand, if the fault occurs between S2 and S3, the manipulation of measurement data in F2 may mislead the control center server or agent-based FRTUs into believing that S2 does not experience a fault current. Consequently, S1 and S2 will be disconnected, and therefore L2 will be left in blackout. Furthermore, because of the fault has not been isolated, fault current appears again in the neighbor feeder (
i.e., feeder
h′) which supplies electricity to L3 after restoration. Therefore, the loads which need to be restored in feeder
h and the loads in feeder
h′ will experience outage for some time until the fault is finally isolated by another fault diagnosis process. Based on this discussion, the consequence caused by loss of measurement data integrity can be represented by:
where
γh,i is the failure rate of the
ith feeder section of feeder
h;
Th,i is the time required to repair the permanent failure in
ith feeder section of feeder
h;
Nh′ is the number of feeder sections in feeder
h′;
th′ is the time needed to apply restore function in feeder
h′. If the fault occurs in the last feeder section, set
th′ = 0 because there is no need to close tie switches in this circumstance.
As for availability, it ensures both the control center server and the FRTUs to get the requested information in time. Loss of availability would result in expanding the blackout area. For example, if the trip commands cannot reach S2 when a fault occurs between S1 and S2, S1 and S3 will be disconnected in order to isolate the fault. As a result, L3 will lose electricity additionally.
Therefore, the physical consequence caused by loss of availability in FRTUs of section switches can be denoted as:
where
Ah,i denotes the consequences caused by loss of availability in
Fh,i.
3.1.2. FRTUs of Tie Switches
Tie switches are normally open switches. This enables power wheeling in normal operation and fault restoration. A cyber-attack on the FRTU of a tie switch can result in loss of load. For example, if a fault occurs between S1 and S2, while T1 cannot be closed because of the commands from F5 is modified or not received, just closing T2 may not be able to fully restore the blackout area due to the system constraints. Therefore, the consequence caused by loss of control commands integrity or availability in FTRUs of tie switches can be denoted as:
where
Stie is the set of tie switches;
Stie,i is the set of main feeders which can be connected by
ith tie switch;
Scut,h is the set of the loads that cannot be restored when a fault occurs in feeder
h.
In the above equations, the load with a higher importance usually has a higher priority in restoration. Thus,
Scut,h can be confirmed by Algorithm 1. In this algorithm,
SΔ is the set of loads that need to be restored by closing tie switches;
Pl is the redundant capacity of other feeders; Ψ is a temporary variable;
NSΔ is the number of the power consumers in
SΔ.
Algorithm 1. LoadCut |
Input: SΔ, Pl
Output: Scut,h
begin
sorting the loads in SΔ according to its importance;
for i = 1 to NSΔ do
ΔP ← ΔP + SΔ(i)
end
if ΔP ≤ Pl then
return Scut,h ← ∅;
end
j ← 1;
for i = 1 to NSΔ do
Ψ ← Ψ + SΔ (i);
if Ψ > Pl then
Scut,h(j) ← SΔ(i);
Ψ ← Ψ − SΔ (i);
j ← j + 1;
end
end
end |
3.1.3. FRTU of Feeder Breaker
The FRTU of a feeder breaker plays different roles in different restoration schemes. In Scheme 1, the control center server performs the isolation and restoration strategies. F0 (
i.e., the FRTU of feeder breaker in feeder
h) does not communicate with other FRTUs. The consequence caused by loss of integrity in F0 is similar with that of FRTUs of section switches:
where
Sh,CB is the set of feeder breakers in feeder
h.
If the close command cannot reach CB1 after fault isolation, the loads in the source side of feeder
h will remain in blackout. Thus, the consequence caused by loss of availability in the FRTU of a feeder breaker can be represented as:
In Scheme 2, F0 makes the restoration strategy and sends commands to other FRTUs. A modified command from F0 to trip CB1 may lead to blackout in feeder
h. On the other hand, if a fault occurs in the neighbor feeder of feeder
h, F0 may send a tampered response to misguide the neighbor feeder into believing that feeder
h does not have extra power to restore the outage loads. In other words, feeder
h is unable to provide restoration power to its neighbor feeders. Therefore, in Scheme 2, the consequence caused by loss of integrity in F0 can be confirmed by:
where
Snei,h denotes the set of neighbor feeders of feeder
h.
If the service of F0 is not available when a fault occurs, the loads will remain in outage as a result of CB1 and tie switches have not been closed. Furthermore, feeder
h′ cannot get restoration power from feeder
h because it cannot get the necessary information from F0. Thus, in Scheme 2, the consequence caused by loss of availability in F0 can be confirmed by:
3.2. Control Center Server
The control center server performs supervisory control to the distribution system in normal operation, and plays different roles when a fault occurs according to different schemes.
In Scheme 1, the control center server is in charge of making control decisions and sending control commands to the FRTUs when a fault occurs. If the control center server is attacked, the loss of control commands integrity can result in blackout of the entire distribution system. Thus:
Where
Ictrl is the consequence caused by loss of information integrity in control center server;
SF is the set of feeders;
Tserver is the time needed to recover the control center server.
If the control center server is not available to formulate control strategies, the fault will not be removed and the loads in the fault feeder will remain in outage. Thus, the consequence caused by loss of information availability in control center server (
i.e.,
Actrl) can be represented as:
In Scheme 2, the agent-based FRTUs are in charge of fault detection, isolation and restoration. Loss of availability in a control center server will not affect fault isolation and loads restoration. In other words, an attack on the availability of a control center server will not result in loss of load, so Actrl = 0. However, the control center server can still trip or close the switches through remote control in normal operations. Thus, the physical consequence caused by loss of integrity in control center server in this scheme is determined by Equation (12).
4. DAS Vulnerability Assessment Model
4.1. Selecting Access Point
Both the FRTUs and the control center server in the DAS can be used as initial access points by attackers. The possibility of selecting a specific vulnerability to be access point is mainly related to two factors: (1) the difficulty of getting access to a specific vulnerability; (2) the potential physical consequences of successful exploitation of a vulnerability.
The metrics of access difficulty are shown in
Table 1. The greater the difficulty is, the lower the metric value will be.
Table 1 reflects the reality that comprehensive physical protection and network isolation are helpful to prevent a vulnerability from being attacked.
Table 1.
Access Difficulty Scoring Evaluation.
Table 1.
Access Difficulty Scoring Evaluation.
Metric value | Description |
---|
0.2 | A vulnerability is of comprehensive physical protection and is local exploitable only. |
0.5 | A vulnerability is of comprehensive physical protection and is remotely exploitable. |
0.8 | A vulnerability is of little physical protection and is local exploitable only. |
1.0 | A vulnerability is of little physical protection and is remotely exploitable. |
After getting access to the access point, the attackers can launch a further attack by taking advantages of the vulnerabilities in other devices. As a matter of fact, the exploitation of a vulnerability does not always result in the complete loss of integrity and availability. Different vulnerabilities have different impacts on the security properties. For the vulnerability
i in device
t, the potential physical consequence after being attacked takes the following form:
In Equation (14),
Rvul,i denotes the potential physical consequence if vulnerability
i (
i.e.,
Vi) is successfully exploited;
λi measures the complexity to exploit
Vi, its reference value is provided by the
Access Complexity metric in CVSS [
19];
Ct = [
Ih,t Ah,t] (if
t belongs to terminal devices) or
Ct = [
Ictrl Actrl] (if
t is a control center server) is a vector of a specific device
t which includes two aspects of potential physical consequences;
αi = [
αint,i αavail,i] is a logical array, where
αint,i and
αavail,i represent whether an attack on
Vi will result in loss of integrity and availability in device
t respectively. If the exploitation of
Vi does have an impact on the loss of integrity or availability, the corresponding element is assigned to 1, otherwise the element is assigned to 0.
Therefore, the possibility of selecting
Vi to be access point (
i.e.,
Pacc,i) can be represented as follows:
where
Rap,i and
Rap,j represent the difficulty to get access to
Vi and
Vj respectively;
Sacc is the set of potential access points in a DAS.
4.2. Hacking Other Vulnerabilities
After penetrating an access point, an attacker can get sensitive information about surrounding devices such as device settings and vulnerability information for a next-step attack. As mentioned above, the relationship between the attacker and the system operator can be modeled as a two-person ADG. The attacker’s strategy is to select an attack target, and the defender’s strategy is to take a defense action. In order to predict the probability distribution of attack actions and defense strategies that reasonable attacker and defender would take, the attacker’s payoff and defender’s payoff should be analyzed elaborately.
The maximal payoff for an attacker by attacking Vj in device t’ can be calculated according to Equation (14). However, the attacker can barely get the maximal payoff because of the defense strategies and access difficulty. Suppose an attack is launched from Vi, the set of attacker’s strategy and defender’s strategy can be denoted as and respectively, where represents the strategy of attacking Vj, represents using kth defense strategy.
The payoff function for an attacker,
i.e.,
, can be represented as follows:
where
represents the positive impact of the defense strategy
when the attacker takes the strategy
. The quantitative method of
will be presented in the following text.
Because of the real-time requirement of DAS operations and the limited computing power in terminal devices, some common secure methods such as message authentication may have disruptive effects on the normal operation of a DAS [
8,
27], so both the positive and negative impacts of a specific defense strategy should be taken into consideration in formulating the payoff function for a defender.
The positive impact refers to the defense reward against an attack,
i.e., the reduction of attacker’s payoff through deploying a defense strategy. Different defense strategies lead to different defense effects. For example, message authentication contributes to checking data integrity. Therefore, the positive impact could be denoted as follows:
In Equation (17), ∧ represents the logical AND operation which performs the logical operation on each element of array αj and array βk; βk = [βint,k βavail,k] is a logical array, where βint,k and βavail,k represent whether defense strategy contributes to enhance the integrity and availability, respecively. If effectively enhances the integrity or availability, the corresponding element is set to be 1, otherwise it will be 0.
The negative impacts of a defense strategy mainly include loss of availability of devices and other costs of deploying the defense strategy. In practice, the overall cost of deploying defense strategies in a DAS is usually constrained, so we need to rank the vulnerabilities and then enhance the DAS cyber security in a more effective way, i.e., according to the ranking list. While the cost of deploying the defense strategy for a single device is not a major concern in calculating the defender’s payoff. For example, if a defense strategy can significantly increase the cyber security of the DAS, it should be used even if it requires a high cost to deploy.
In a DAS, both the control center server and the terminal devices require time-critical responses to achieve real-time monitoring and controlling. In other words, only the timely transmitted data is valid. Therefore, considering that the FRTUs in a DAS usually have very limited computing power, some typical defense strategies such as using encryption techniques in message authentication are not always feasible. For example, an over complex cryptographic algorithm will increase the computational complexity and need additional time for encryption and decryption before the information is sent and received. As a result, the real-time transmission of control commands and measurement data requirement might be violated. How to design a cryptographic algorithm which can ensure that the messages can be appropriately encrypted while limiting the latency is a research hotspot [
15,
16,
28], but it is out of the scope of this paper. In this paper, the time needed to transmit information between the control center server and the terminal devices, including transmission time and the extra computation time for encryption and decryption, can be calculated according to the computer network knowledge [
29]. If the overall time exceeds a pre-set threshold, the defense strategy is supposed to have a negative impact on the availability of information. The negative impact of
kth defense strategy,
i.e.,
, is denoted as:
where Φ
k represents the set of devices which are influenced by
kth defense strategy.
According to the above discussion, the defender’s payoff function can be represented by:
Based on the payoff functions for the attack and the defender,
i.e., Equation (16) and (19), the probability distribution of attack actions,
i.e.,
, can be obtained by solving the Nash equilibrium of the ADG [
30].
, where
is the possibility of attacking
Vj from
Vi. If there are multiple equilibrium solutions, the Pareto efficiency criterion is used to identify the final solutions.
5. Vulnerability Adjacency Matrix
The quantitative assessment result of a vulnerability denotes the possibility that the vulnerability is attacked. The vulnerability with a higher score is more likely to be attacked. Here, the vulnerability adjacency matrix is introduced to analyze the relationship between different vulnerabilities.
Definition 1: Single-step Vulnerability Adjacency Matrix (SVAM). The element
Vi,j in an SVAM denotes the possibility that
Vj is selected to be the next-step attack target when the threat reaches
Vi. The bigger the value of
Vi,j is, the more likely
Vj is attacked from
Vi. When
i = 1,
V1,j represents the possibility that vulnerability
j is selected to be the access point, thus
Vi,j =
Pacc,j; otherwise, the value of
Vi,j can be determined as:
where
Si is the set of the vulnerabilities that can be exploited through a single-step attack from
Vi.
SVAM describes the relationship of two vulnerabilities within a single-step attack, but it cannot deal with the multi-step attack scenario. Assuming that there are multiple attack paths between the source node (
Vi) and the destination node (
Vj), the possibilities of selecting different paths can be calculated by Algorithm 2. This algorithm traverses all the nodes based on depth first search strategy, where
Ei,j is the set of attack paths between
Vi and
Vj,
Pi,j is the set of the possibilities of selecting different paths. Some rings which will result in repetitive computation of the quantitative results may occur in attack paths during traversing. Thus, we use
π to store the nodes in the attack path,
. If the next-step attack node
, the iterative process will be stopped.
Pπ is the possibility of selecting the path. In order to get
Ei,j and
Pi,j, the initial values of π and
Pπ are
Vi and 1, respectively.
Algorithm 2. FindPaths |
Input: SVAM, Vj, π, Pπ
Output: Ei,j, Pi,j
begin
Vlast ← the last node in π;
Ei,j ← ∅;
if Vlast == Vj then
Ei,j ← π;
Pi,j ← Pπ;
return Ei,j and Pi,j;
end
for each child node of i in SVAM do
if Vi,m ≠ 0 and Vm ∉ π then
// Vnext is the set of next-step attackable nodes.
Vnext ← Vm;
end
end
for each Vn ∈ Vnext
add Vn to the bottom of π;
(Ei,j, Pi,j) = FindPaths (SVAM, Vj, π, Pπ×SVAM(Vlast, Vn));
end
end |
The statistical data of cyber-attacks shows that the length of an attack path is usually shorter than 10 steps. Therefore, the attacks which need more than 10 attack steps should be removed from
Ei,j. In conclusion, the quantitative result of
Vj,
i.e.,
Qj, can be denoted as:
where
denotes the possibility of attacking
Vj through k
th path.
6. Case Studies
The IEEE RBTS bus 2 distribution system [
31] is introduced here to illustrate how to apply the proposed assessment model. Both the scenarios of Scheme 1 and Scheme 2 are simulated. Simulation results demonstrated the effectiveness of the method.
Figure 4 shows the topology of the RBTS bus 2 system and the locations of FRTUs. There are four main feeders, ten section switches and two tie switches in total. Every switch is monitored and controlled by an FRTU. The communication network of the RBTS bus 2 is assumed to be a ring network which is also depicted by the dashed lines in
Figure 4.
Figure 4.
Distribution system for RBTS bus 2 including FRTUs.
Figure 4.
Distribution system for RBTS bus 2 including FRTUs.
In the simulation, the response time to apply restore function is assumed to be 5 min, and the time required to repair a permanent failure or the control center server is assumed to be 60 minutes [
3]. The importance of each load is given in
Table 2, the other detailed information of RBTS bus 2 is shown in reference [
31].
Table 2.
The importance of different loads.
Table 2.
The importance of different loads.
Load points | Customer type | Load importance |
---|
1–3, 10–12, 17–19 | residential | 1 |
8, 9 | industrial | 3 |
4, 5, 13, 14, 20, 21 | government/institution | 3 |
6, 7, 15, 16, 22 | commercial | 2 |
According to the discussion in
Section 3, in the scenario of Scheme 1, the potential physical consequences caused by loss of integrity and availability in control center server are 41.751 MWh and 6.7761 MWh, respectively. In Scheme 2, only the attacks on the integrity of control center server would result in loss of load and the result of physical consequence is 41.751 MWh. As for the terminal devices, the potential physical consequences are shown as
Figure 5. As is clearly seen, the physical consequences of attacking FRTUs of feeder circuit breakers become larger in Scheme 2. This is mainly because that an attack on the FRTU of a feeder circuit breaker would affect not only the loads in the related feeder, but also the loads in its neighbor feeder in Scheme 2.
Figure 5.
(a) Physical consequences of attacking FRTUs in Scheme 1; (b) Physical consequences of attacking FRTUs in Scheme 2.
Figure 5.
(a) Physical consequences of attacking FRTUs in Scheme 1; (b) Physical consequences of attacking FRTUs in Scheme 2.
The hypothetical vulnerability information of the DAS in this case study is shown as
Table 3, including the types of vulnerabilities and the corresponding access complexity (AC). Among which, “Get administrator rights” and “Privilege escalation” means the exploitation of related vulnerabilities will result in loss of integrity and availability, “Denial of Service” will result in loss of availability, “Unauthorized access” will result in loss of integrity. In practice, the vulnerability information could be acquired by vulnerability scanning.
Taking vulnerability 17 as an example, the maximal payoff for an attacker by attacking this vulnerability in Scheme 1 and Scheme 2 can be calculated as follows:
Thus, by attacking vulnerability 17, the attacker can get a payoff up to 34.4563 MWh and 29.6425 MWh in Scheme 1 and Scheme 2, respectively. For other vulnerabilities, the maximal payoffs for the attacker are depicted in
Figure 6. Obviously, an attacker can cause greater losses by attacking vulnerability 17 than others.
Table 3.
Information of vulnerabilities.
Table 3.
Information of vulnerabilities.
Vul. No. | Affiliated IEDs | Identifier | Type of Vulnerability | AC |
---|
1 | F1,0 | CVE-2011-4034 | Get administrator rights | 0.61 |
2 | F1,1 | CVE-2012-0258 | Get administrator rights | 0.61 |
3 | F1,2 | CVE-2013-3528 | Get administrator rights | 0.71 |
4 | F1,3 | CVE-2012-0258 | Get administrator rights | 0.61 |
5 | F1,4 | CVE-2012-3847 | Denial of Service | 0.71 |
6 | F2,0 | CVE-2011-4034 | Get administrator rights | 0.61 |
7 | F2,1 | CVE-2012-3847 | Denial of Service | 0.71 |
8 | F3,0 | CVE-2011-4034 | Get administrator rights | 0.61 |
9 | F3,1 | CVE-2011-4056 | Unauthorized access | 0.61 |
10 | F3,2 | CVE-2011-4056 | Unauthorized access | 0.61 |
11 | F3,3 | CVE-2011-4056 | Unauthorized access | 0.61 |
12 | F3,4 | CVE-2012-3847 | Denial of Service | 0.71 |
13 | F4,0 | CVE-2011-4034 | Get administrator rights | 0.61 |
14 | F4,1 | CVE-2012-0258 | Get administrator rights | 0.61 |
15 | F4,2 | CVE-2013-3528 | Get administrator rights | 0.71 |
16 | F4,3 | CVE-2012-0258 | Get administrator rights | 0.61 |
17 | Central Server | CVE-2011-4514 | Privilege escalation | 0.71 |
18 | Central Server | CVE-2012-3847 | Denial of Service | 0.71 |
Figure 6.
Maximal payoffs of attacking different vulnerabilities.
Figure 6.
Maximal payoffs of attacking different vulnerabilities.
In a DAS, all the FRTUs and the control center server are potential access points. In general, the control center server is located in the control station and the FRTUs of circuit breakers are located in substations, both of which are well protected in restricted areas. Other FRTUs are located in remote areas with limited physical protection. Therefore, the access difficulty and the possibility that a specific vulnerability is selected to be access point are shown in
Table 4. As calculated above, an attacker can cause the severest physical consequence by attacking vulnerability 17. So, as seen in this table, the possibility of selecting vulnerability 17 to be access point is much higher than others.
Table 4.
Selecting access point.
Table 4.
Selecting access point.
Vul. No. | Rap | Pacc (Scheme 1) | Pacc (Scheme 2) | Vul. No. | Rap | Pacc (Scheme 1) | Pacc (Scheme 2) |
---|
1 | 0.2 | 0.0118 | 0.0262 | 10 | 1 | 0.0363 | 0.0377 |
2 | 1 | 0.0489 | 0.0508 | 11 | 1 | 0.0211 | 0.0219 |
3 | 1 | 0.0574 | 0.0596 | 12 | 1 | 0.0761 | 0.0790 |
4 | 1 | 0.0321 | 0.0333 | 13 | 1 | 0.0102 | 0.0341 |
5 | 1 | 0.0451 | 0.0468 | 14 | 0.2 | 0.0408 | 0.0423 |
6 | 0.2 | 0.0076 | 0.0254 | 15 | 1 | 0.0482 | 0.0500 |
7 | 1 | 0.0193 | 0.0201 | 16 | 1 | 0.0427 | 0.0443 |
8 | 1 | 0.0094 | 0.0338 | 17 | 0.2 | 0.4038 | 0.3607 |
9 | 0.2 | 0.0327 | 0.0340 | 18 | 0.2 | 0.0564 | 0 |
After penetrating access points, an attacker can launch further attacks. Some commonly used defense strategies [
32] are used in this study. The detailed information of these countermeasures is described in
Table 5. Updating patches are helpful to enhance the overall security properties.
Table 5.
Description of defense strategies.
Table 5.
Description of defense strategies.
No. | Name | Description |
---|
1 | Message authentication | Check the integrity of information |
2 | Update patch 1 | Patches for Vul. No. 17 |
3 | Update patch 2 | Patches for Vul. No. 5, 7, 12, and 18 |
4 | Update patch 3 | Patches for Vul. No. 9, 10, and 11 |
5 | No countermeasures | None defense measures are deployed |
The possibility that a specific vulnerability is selected to be the next-step attack node can be calculated by solving the Nash equilibrium of an ADG. For example, in Scheme 2, when the attacker penetrates into vulnerability 1 successfully, the attackable nodes by a single-step attack include vulnerability 2 to vulnerability 6. According to the analysis in
Section 4.2, the Nash equilibrium for attacker is
σa = (0, 0.5211, 0, 0.4789, 0), which means that the possibility of choosing vulnerability 3 and vulnerability 5 to be the next-step attack nodes are 0.5211 and 0.4789 respectively.
Based on the analysis of selecting access points and the relationship among different vulnerabilities, we can get the final quantitative results of all vulnerabilities which are shown in
Table 6 and
Figure 7.
Table 6.
Quantitative results of vulnerabilities in different schemes.
Table 6.
Quantitative results of vulnerabilities in different schemes.
Vul. No. | Score (Scheme 1) | Score (Scheme 2) | Vul. No. | Score (Scheme 1) | Score (Scheme 2) |
---|
1 | 0.0118 | 0.2622 | 10 | 0.0363 | 0.0377 |
2 | 0.0489 | 0.0508 | 11 | 0.0211 | 0.0219 |
3 | 0.0574 | 0.1652 | 12 | 0.0761 | 0.1928 |
4 | 0.0321 | 0.0333 | 13 | 0.0102 | 0.3771 |
5 | 0.0451 | 0.1537 | 14 | 0.0408 | 0.0423 |
6 | 0.0076 | 0.0455 | 15 | 0.0482 | 0.2978 |
7 | 0.0193 | 0.0201 | 16 | 0.0427 | 0.0443 |
8 | 0.0094 | 0.1274 | 17 | 0.4699 | 0.3607 |
9 | 0.0327 | 0.0340 | 18 | 0.5300 | 0 |
Figure 7.
Comparisons of quantitative results of vulnerabilities in different schemes.
Figure 7.
Comparisons of quantitative results of vulnerabilities in different schemes.
As observed from
Table 6 and
Figure 7, both the vulnerabilities in terminal devices and control center server are likely to be attacked. In Scheme 1, the vulnerabilities in the control center server are more likely to be attacked. This is mainly because that the control center server plays a pivotal role in both normal operation and fault restoration. It collects information from each FRTU, and sends control decisions to them. Although the vulnerabilities in the control center server are harder to exploit, the payoffs are much higher, so the control center server vulnerabilities are more attractive to attackers. Compared to Scheme 1, many FRTUs have a higher possibility to be attacked in Scheme 2. Besides vulnerability 17 which is located in the control center server, vulnerability 1, 13 and 15 have relatively higher scores. This is because that the agent-based FRTUs have the ability to exchange information with its neighbor FRTUs, and to restore power to the blackout area when a fault occurs without the help of the control center server. As for vulnerability 18, attacks on it will result in loss of availability, but will not lead to loss of load in Scheme 2 (see
Section 3.2), so vulnerability 18 is not attractive to attackers.
The quantitative results denote the possibility that a specific vulnerability will be attacked. Thus, the proposed assessment framework can be used as a tool in distribution system planning and is helpful to identify any cyber security bottlenecks in a distribution system. The vulnerability with a higher score is more likely to be attacked and should receive priority consideration for cyber security.