Keywords

1 Introduction

The modern power systems are evolving to accommodate increased renewable sources of energy and active distribution systems with the integration of communication network overlay by information communication technology (ICT). This integration, however, makes facilities in open network [1] be more vulnerable for cyber attackers to invade system safety operation. Ukraine blackout accident [2] was a typical case of power outage with its secondary network suffering from network intrusion attack.

Significant research exists in modeling network intrusion attacks and assessing their impact on cyber physical system (CPS). Literature [3] attempted to characterize attacks on an Industrial Control System, where does not include several aspects of attacks such as start states, intents, and attack points. Generally, many approaches are to base attacks on traditional models derived from information and network security. Such as influences on the system stability with error data injection and various cryptographic attacks. Graph based modeling techniques are derived from research in network security [4, 5]. The attack graph model, which fully taking into account the network topology information, not only can visual the attack behavior of the infiltration process, but also make it more suitable for complex network attack modeling with the support of automated tools [6]. As a typical method, Petri net graph theory shows a great deal of flexibility and a limited stochastic Petri net (LSPN) can specific attack source propagation path to quantify the impact on the target system. Literature [7] proposed a concept about Petri-net-based CPS fusion modelling by implementing service specification into CPS service control flow. On the basis of studying the demand of active distribution system, a CPS control model and control method base on hybrid system were presented in literature [8].

In the evaluation of the security performance of CPS, development and implementation of SCADA cyber security testbeds are reported in [9,10,11]. Although the testbeds enable accurate simulations, the cost is high when to incorporate the entire cyber and power system models. In literature [12], the risk of attacking the system was obtained to evaluate successful attack probability by modeling the communication network and the power network respectively. The authors in [13] proposed the method that suggests the use of public key infrastructure technologies along with trusted computing elements, supported by firewalls, strong user and device authentication. Literature [14,15,16] analyzed the importance of cyber infrastructure security together with power grid security and the need for intrusion attack prevention. However, there is still a lack of methodologies to model the integration of CPDS for security assessment under cyber intrusion scenes.

In view of theoretical study, limited stochastic Petri nets are used in this paper to describe the attacked network states and attack information transmission process by using state transition graph. A unified firewall protection system model is established with highly abstraction of intrusion process and refinement of component constructions. The communication throughput variation is proposed based on the steady-state probability to quantify the impact on substation network when the corresponding power node loses efficacy due to intrusion attacks.

2 System Model and Network Attacks

Cyber Physical System (CPS) is built from, and depends upon the integration of computational algorithms and physical components [17, 18]. Figure 1 illustrates the communication architecture of the cyber-physical power system model, corresponding to the simulation environment. For the power system, the usual power model is showed. With regard to general communication infrastructures, they include wireless transmission networks, SCADA, control center, etc. Typical hardware is known as components in the control center, such as isolated firewall, engineering workstations, and various servers which can store and process the data. And the IEDs reside usually consist of the remote terminal units (RTU), advanced metering infrastructure and the programmable logic controller (PLC). The servers store and process the information sent from and to the RTUs, and the RTU or PLC controls the process of the field devices.

Fig. 1.
figure 1

Cyber physical power system communication infrastructures

The Report No. 7628 《American Institute of Standards and Technology》 [19] points out that the three elements of cybersecurity are confidentiality, integrity and availability, commonly referred to as “CIA” security objectives [20]. Concerning CIA, private networks in power system are becoming more vulnerable to IP-based intrusion attacks with TCP/IP and Ethernet technologies.

At the beginning of the network operation, the initial measurements of state variables are collected by IEDs and then transmitted to the communication network at a certain interval time. After crossing the firewall detection process, the converted digital signals, such as IP address, then are transmitted to the control centre as the input values with TCP/IP communication protocol. Whenever control commands are sent by control centre after being processed by the state estimator to the actuators, the control variables are modified accordingly and the substation network shows a new operating state. For an IP-based intrusion attack, the proposed graph-theoretic system model in Fig. 2 enables the detailed firewall and password protection model analysis for information transfer process in the communication part to substation network. Such behaviors are studied based on the methodological modelling that provides the boundary inspection of malicious packets and intrusion attempts on each computer system.

Fig. 2.
figure 2

Proposed intrusion model

3 Unified System Model Setup Under Intrusion Attacks

  1. A.

    Limited Stochastic Petri Net (LSPN) theory

A basic LSPN consists of the following marks: places, tokens, black spots, transitions and the arc. The relationship between the local states is determined by arc. The directed arcs formed by the direct reachability relation are called the reachable marking states. In this paper, the performance analysis of the LSPN model is based on the isomorphism of its state space and Markov Chain (MC). Each place of LSPN is mapped to state space in MC and the rate of change in the reachability graph corresponds to the transition rate between MC states.

  1. B.

    Component construction extensions

According to the cyber intrusion activity model introduced in Fig. 2, the modelling method is a high level of abstraction for the intelligent substation network. For the network infrastructures with point-to-point transmission that involve no monitoring capabilities, such as state estimate, IEDs and actuators in this paper, the probability of successful information transmission is considered to be 100%.

A successful intrusion attack means that necessary information needs to be acquired from different tools and resources to determine IP addresses in the network firewalls. So, an exact rule set for a secure firewall is very necessary. A mixed firewall filtering rules combining transport layer protocol type and packet IP address are shown in the following Table 1. The computer control center is generally the ultimate goal to realize data tampering. The password model is used to show the monitoring ability of the computer, which includes two parts: failed logon probability and the response rate.

Table 1. The specific firewall filtering rules
  1. C.

    Unified model for substation level network

Based on properties of the transient and time delay transitions in a LSPN network, the system dynamic equilibrium can be achieved. With regard to unified network modelling, system elements can be grouped into substation nodes considering that a transmission line connects two substations. Such as the generators, DERs, transmission lines and load nodes, can be grouped into substation nodes. Based on the LSPN theory, the unified model is concerned with refined communication network components in B part. The state of the random process reflects the cyber intrusion abnormal activity which includes the malicious packet flow in firewall and the password login failure. As shown in the Fig. 3, the firewall protection model includes the firewall based on information detection technology and the realization of authentication login protection. The time transition is consistent with the time required by the attacker to obtain the system response. The tokens are used to represent the intrusion attempts after the attack begins. Especially for distributed energy resource (DER) node, we use LSPN theory to describe and model the switching process of the operating mode effectively that includes work and stop mode.

Fig. 3.
figure 3

Unified firewall protect model for substation network

In the model, the places ‘TCP/IP level 1, 2 and 3’ represent the specific firewall filtering rules and the ‘state monitor’ means the information state monitoring function for malicious packets. Also, ‘UDP refuse’ means that the intrusion attempt is invalid with certain penetration probability. Each transient transition of the firewall can be calculated based on the firewall log [12]. The probability of passing the firewall through each rule is Eq. (1):

$$ P_{i,j}^{fp} = \frac{{f_{i,j}^{fp} }}{{N_{i,j}^{fp} }}, \, P_{i}^{fr} = \frac{{f_{i}^{fr} }}{{N_{i}^{fr} }}, \, P_{i}^{fs} = \frac{{f_{i}^{fs} }}{{N_{i}^{fs} }}, \, P_{i}^{pw} = \frac{{f_{i}^{pw} }}{{N_{i}^{pw} }} $$
(1)

Where \( f_{i,j}^{fp} \) represents the frequency through the firewall. \( N_{i,j}^{fp} \) is the total recorded number of the firewall rule j. \( f_{i}^{fr} \) is the number of rejected packets. \( N_{i}^{fr} \) and \( N_{i}^{fs} \) both are the total number of firewall records. \( f_{i}^{fs} \) is the number of packets directly through state monitoring. The firewall execution speed \( \lambda_{i}^{f} \) is the number of instructions executed per second. The average response speed \( \lambda_{i}^{nr} \) depends on the network transmission status which is estimated using the ping command. For computer system \( i \), the transition probability which respectively represents the computer response time, login attempt and the final target system. The \( f_{i}^{pw} \) is the number of intrusion attempts. \( N_{i}^{pw} \) is the total number of records except the login attempt within a specific time interval which is regarded as an common user input error. The response speed \( \lambda_{i}^{pw} \) is the delay of the repeated login.

4 Quantitative Analysis on Substation Network

The proposed security assessment methodology can be summarized as a two-step approach. (1) The first step is to analyse the computer network topology in the system for deriving possible intrusion attack paths to the control centre. The net modelling with LSPN defines the intrusion scenarios and quantifies the steady invasion state probability. (2) In the second step, the consequence severity of the communication malfunctions of the substation nodes is determined with communication throughput variation. The integration of these two steps makes it possible to quantify the impacts caused by a potential cyber intrusion attack.

  1. A.

    Quantitative computational theory

According to the analysis of communication network in cyber side, the intelligent devices integrated on the computer can be mapped to the communication data point. The steps a successful network intrusion attack must complete are: (1) obtain the availability of computer systems in the network; (2) attempt to invade the computer; (3) understand how to attack through the communication network with appropriate attack access point.

Generally, the state transition matrix \( W \) can be obtained through determining the instantaneous transition and the time delay transitions to describe the intrusion attack behaviours [12]. The Markov equilibrium equation is solved with corresponding Markov chain state. The specific steady-state probability equation is:

$$ \left\{ {\begin{array}{*{20}c} {\tilde{\pi }W = \tilde{\pi }} \\ {\sum\limits_{M \in T \cup V} {\tilde{\pi } = 1} } \\ \end{array} } \right. $$
(2)

Where \( T \) and \( V \) are the set of identities that transient changes and latency changes respectively. \( W \) represents a transfer matrix formed under different attacks. The vector \( \pi \) represents the embedded MC states.

  1. B.

    Attack influence on substation communication network

The focused network intrusion attack refers to the behavior that across the firewall to reach the control center of the computer and make the corresponding target node fail to receive or transmit the correct information by the means of blocking the communication channel. Specifically, the attacker can control the packet size of the channel information transmission directly by changing the packet loss rate to congest network channel. To quantify the communication volume, the change of the channel throughput variation T is analyzed. While the data packets affected by the cyber intrusion attack become malicious, its packet loss rate is seen as the steady state probability value \( \pi \). Thus, the communication throughput variation under the intrusion attack can be expressed as:

$$ T{ = (1 - }\frac{{\pi_{i} N_{2} }}{{N_{2} + N_{1} }} )\times \frac{LR}{L + H}{ = (1 - }\frac{{\pi_{i} N_{2} }}{{1 + {{N_{1} } \mathord{\left/ {\vphantom {{N_{1} } {N_{2} }}} \right. \kern-0pt} {N_{2} }}}} )\times \frac{LR}{L + H} $$
(3)

Where \( \pi_{i} \) is the steady-state probability after intrusion attack, which can be obtained by Eq. (2). Attack ratio \( {{N_{1} } \mathord{\left/ {\vphantom {{N_{1} } {N_{2} }}} \right. \kern-0pt} {N_{2} }} \) depicts the characteristics of the interference attack, which means how well the attacker knows about the substation network. \( L,H \) are respectively the length of the original data message and the preamble. The transmission rate is \( R \). The smaller throughput variation, the stronger the operation robustness of the corresponding communication network in the cyber side.

5 Case Simulations and Implementation

In this section, we evaluate the throughout variation caused by the intrusion attacks on communication networks of the IEEE30 power system. Based on the system wiring diagram, the three-winding transformer bus lines 4, 12, 13 and 6, 9, 10, 11, and the double-winding transformer bus lines 27 and 28 are used as one substation. The system has a total of 24 communication network models. We define the intrusion attack process of each substation into three models: (1) Directly attack the substation network and attempt to reach the control center (as shown ); (2) Attack through the distribution network or substation network (as shown ); (3) Jointly attack through the power plant process control network, distribution network and substation network (as shown ). Assume that there is two-way firewall isolation among the three networks, and only substation network can directly connect to the control center (Fig. 4).

Fig. 4.
figure 4

The communication diagram of substation

According to the above Limited Stochastic Petri net (LSPN) theory, the transfer of tokens among states is similar to the Markov process. The penetration probabilities of firewall rules and packet information state monitors are assumed to be \( P_{i}^{fp} = (0.0095324,0.0181514,0.0019415), \, P_{i}^{fs} = (0.0083154) \) respectively. Also, the rejection probability of malicious packets is \( P_{i}^{fr} = (0.71457) \). The logon failure probability for each machine is designed to be 10%. The computer response rates of computer and firewall are set to be \( \lambda_{1}^{pw} = \lambda_{2}^{pw} = 12 \times 10^{ - 10} \) and \( \lambda_{1}^{f} = \lambda_{1}^{nr} = 63 \times 10^{ - 7} \). The above values are generated by a random number generator.

To support the intuitive judgment, the Table 2 shows the steady-state probability corresponds to the 3 kinds power communication network topologies with different intrusion access points. The values in lines 1 to 4 of the table represent the steady-state values of intrusion behaviors at different locations with different access points A and B. The steady state value of the external attack point is generally less than the internal intrusion scene. Because that the internal firewall is the first firewall from outside to the internal network, which makes the probability of successfully penetrating into the control center increases. The main factor affecting the internal attack vulnerability is the configuration of the communication network and more complex structure (model 3). Therefore, the network configuration and protection of the key nodes in the actual power grid can refer to the above situation.

Table 2. Transmission probability with different intrusion access points

For the network structure model 3, the change trend of the communication throughput variation with the different attack access points is shown in the Fig. 5. The network intrusion attacks from outside the firewall have a strong effect on the throughput of data communications (strongly opposed to the other two models), and from within the firewall. When the node is attacked, its throughput is changed by the communication topology of the larger impact. Because the low probability attack inside the network makes the throughput of data transmission less affected by the network communication structure. The range of communication throughput changes in model 3 are more affected by the data transmission path and network topology model which indicates the more robustness of the corresponding communication network model.

Fig. 5.
figure 5

Throughput variations in model 3

6 Conclusion

In this paper, the intelligent substation network modeling problem has been investigated considering the information transmission process in a cyber-physical system subject to effects of the intrusion attacks. Towards the fine modeling for network components equipped with different protection methods, here the firewall and computer login system protection methods were studied and a unified firewall protection communication model of substation network was established. In the case of distinguishing the three different levels of attack paths with two access points, the proposed analytical framework evaluated the steady-state attack probability of a successful attack based on LSPN graph theory. Then the communication throughput variation is proposed to quantify the impact on intelligent substation network. Moreover, the network intrusion attack definition, intrusion attack scenarios, specific throughput variation formula and its simulation results mentioned in this paper can provide a reference for identifying the vulnerability of substation network in the face of network intrusion attacks.