Mitigating IoT-Based Cyberattacks on the Smart Grid
Exploring the challenges of cybersecurity in the Smart Grid, focusing on IoT-triggered threats and security challenges. Discusses the need for reliable information access, confidentiality, and privacy protection in the context of evolving attack vectors. Highlights related works in intrusion detection systems and anomaly detection methods for securing Smart Grid infrastructure.
Download Presentation
Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
E N D
Presentation Transcript
M ITIG ATING IO T- B A SED CY BERATTACKS O N TH E SM A RT G RID Suleyman Uludag Yasin Yilmaz, Mahsa Mozaffari Department of Computer Science University of Michigan, Flint, MI Secure and Intelligent Systems Lab sis.eng.usf.edu Department of Electrical Engineering University of South Florida, Tampa, FL
OUTLINE What is Smart Grid? Cybersecurity in the Smart Grid IoT-based Cyberattacks to the Smart Grid MIAMI-DIL framework Simulation results
WHAT IS SMART GRID? Information technology Next generation power system Need for: More reliable More efficient More Secure Greener Enables two-way data communication Real-time monitoring of smart grid Data collection purposes Existing power systems Communica tion technology Smart Grid Power Technology Advanced Computing
SMART GRID MODEL ?? ??1 ??? ??? ?? 1 ?? ? ?? ? ?? ?? ?? ???1 ?? ?? 1 ?? ? ?? ? ??1 ?? ??? ??? ?? ?? ?? 1 ?? ? ?? ?
CYBERSECURITY IN SMART GRID Reliable access to Information: DoS attacks Availability Ensure information authenticity: False data Integrity Injection Confidentiality Protect personal privacy
IOT-TRIGGERED THREATS Smart Grid connected to huge number of IoT devices through smart meters Low security level in simple IoT devices New Genre of attack vectors : IoT-triggered attacks An example : Mirai Botnet Victim Attacker 1 server 1 This Photo by Unknown Author is licensed under CC BY-SA
SECURITY CHALLENGES IN SMART GRID High dimensionality Mitigation methods should address these challenges Quick Detection Uncertainty Dynamicity
RELATED WORKS 1 Specification based IDS 2 Configuration based IDS 3 Anomaly Detection on Encrypted Traffic 4 Randomization based IDS 5 Distributed IDS in a multi-layer network architecture of smart grid 6 Real time anomaly based IDS utilizing stream data mining 1R. Berthier and W. H. Sanders, Specification-Based Intrusion Detection for Advanced Metering Infrastructures, in 2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing. IEEE, dec 2011,pp. 184 193. 2 M. Q. Ali and E. Al-shaer, Configuration-based IDS for Advanced Metering Infrastructure, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pp. 451 462, 2013. 3 R. Berthier, D. I. Urbina, A. A. Cardenas, M. Guerrero, U. Herberg, J. G. Jetcheva, D. Mashima, J. H. Huh, and R. B. Bobba, On the practicality of detecting anomalies with encrypted traffic in AMI, in 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm). IEEE, nov 2014, pp. 890 895. 4 M. Q. Ali and E. Al-Shaer, Randomization-Based Intrusion Detection System for Advanced Metering Infrastructure, ACM Transactions on Information and System Security, vol. 18, no. 2, pp. 7:1 -7:30, dec 2015. 5Y. Zhang, L. Wang, W. Sun, R. C. G. Ii, and M. Alam, Distributed Intrusion Detection System in a Multi-Layer Network Architecture of Smart Grids, IEEE Transactions on Smart Grid, vol. 2, no. 4, pp. 796 808, dec 2011. 6F. A. A. Alseiari and Z. Aung, Real-time anomaly-based distributed intrusion detection systems for advanced Metering Infrastructure utilizing stream data mining, in 2015 International Conference on Smart Grid and Clean Energy Technologies (ICSGCE). IEEE, oct 2015, pp.148 153.
THE MITIGATION APPROACH M I A M I - D I L : M I N I M A L LY I N VA S I V E AT TAC K M I T I G AT I O N V I A D E T E C T I O N , I S O L AT I O N , L O C A L I Z AT I O N
MIAMI-DIL FRAMEWORK Detection of Anomaly Isolation Localization Real-time detection by ODIT
UNDERPINNING ANOMALY DETECTION ALGORITHM: ONLINE DISCREPANCY TEST (ODIT) Timely and Accurate detection of CUSUM ODIT Online Non-parametric Simplicity of GEM approach 1,2 1A. O. Hero III, Geometric entropy minimization (GEM) for anomaly detection and localization , In Proc. Advances in Neural Information Processing Systems (NIPS), pp. 585 592, 2006. 2 K. Srichanran and A. O. Hero III, Efficient anomaly detection using bipartite k-NN graphs , In Proc. Advances in Neural Information Processing Systems (NIPS), pp. 478 486, 2011.
ODIT: TRAINING Training set ? = ?1,?2, ,?? of non- attack data
ODIT: TRAINING Training set ? = ?1,?2, ,?? of non- attack data Randomly separates into two sets ??1,??2
ODIT: TRAINING Training set ? = ?1,?2, ,?? of non- attack data Randomly separates into two sets ??1,??2 for each point in ??1find kNN from ??2
ODIT: TRAINING Training set ? = ?1,?2, ,?? of non- attack data Randomly separates into two sets ??1,??2 ?? for each point in ??1find kNN from ??2 ?1 from ??1 with the Select M points ?? smallest total edge length ?? = Mth smallest total edge length
ODIT: TEST For each test point ?? find total edge length to kNN from ??2 ??= ?? ?? : positive/negative evidence for anomaly
ODIT: TEST For each test point ?? find total edge length to kNN from ??2 ??= ?? ?? : positive/negative evidence for anomaly Accumulate anomaly evidences over time ??= max ?? 1 Declare anomaly when evidence exceeds threshold ?? ??= 0 ?? + ?? ,0 ,?0 ?? } ??= min{?: ?? Threshold selected to strike a balance between early detection and small false alarm rate
SYSTEM-WIDE IDS Hierarchical and distributed IDS ??, ??,?? Each level monitors the lower level and computes a statistic ?? ??1 ??? ??? ?, ??? ?? Statistics propagate upwards ?? 1 ?? ? ?? ? ??, ??,??: anomaly evidences at different levels of hierarchy ???1 ???1 ?? ?? ?? ?? ?? ?? ?? ?? 3 ODITs run ?? 1 ?? ? ?? ? ??= min ?: ?? ? ??= min ?: ?? ? ??= min{?: ?? ?} Anomaly declared when one alarms ??= min ??,??,?? ??1 ?? ??? ??? ?? ?? ?? ? ?? 1 ?? ?
ISOLATION AND LOCALIZATION OF ANOMALY Detection of Anomaly Isolation Localization Real-time detection by ODIT Temporary isolation of the suspected DAs
ISOLATION AND LOCALIZATION OF ANOMALY Detection of Anomaly Isolation Localization Real-time detection by ODIT Temporary isolation of the suspected DAs Detailed investigation of suspected nodes
AN ATTACK SCENARIO One million IoT devices Attack in 10% of HANs Attack starts at time 20 SM statistics start increasing in the attacked HANs
ODIT VS. CUSUM FALSE DATA INJECTION ATTACK CUSUM, like an oracle, knows the actual distribution of baseline N(0.5, 0.01) and attack data N(0.5+0.2, 0.01) G-CUSUM estimates the baseline parameters with %1 error ODIT achieves a close performance to the oracle CUSUM
ODIT VS. CUSUM JAMMING-TYPE DOS ATTACK Attack data N(0.5,( 0.1)2)
CONCLUSION With the proliferation of IoT devices and vulnerabilities associated with them, there is an increasing need to cope with IoT-based attacks MIAMI-DIL framework is proposed as an Intrusion Detection System in Smart Grid Scalable Online Non-parametric Protocol-agnostic & free from any data type assumptions ODIT is capable of timely and accurately detecting attacks