Abstract
Smart power grids suffer from coordinated attacks that exploit both their physical and cyber layers. It is an inevitable requirement to study power systems under such complex hacking scenarios to discover the system vulnerabilities and protect against those vulnerabilities and their attack vectors with appropriate defensive actions. This paper proposes an efficient tri-level programming framework that dynamically determines attacking scenarios, along with the best defensive actions in cyber-physical systems. A tri-level optimisation framework is proposed to fit the optimal decisions of defence strategies, malicious vectors and their operators for optimising the unmet demand while launching hacking behaviours. Defending resource allocation is designed using an evolutionary algorithm to examine coordinated attacks that exploit power systems. The proposed framework includes a Genetic Algorithm (GA) to solve each of the model levels in power systems. This proposed framework can flexibly model malicious vectors and their defences. IEEE 14-bus benchmark is employed to evaluate the proposed framework.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Change history
27 November 2020
The original version of this chapter was revised. The following corrections have been incorporated:
References
Wu, X., Conejo, A.J.: An efficient tri-level optimization model for electric grid defense planning. IEEE Trans. Power Syst. 32(4), 2984–2994 (2016)
Lu, W., Besanger, Y., Zamaï, É., Radu, D.: Blackouts: description, analysis and classification. Network 2, 14 (2006)
Lai, K., Illindala, M., Subramaniam, K.: A tri-level optimization model to mitigate coordinated attacks on electric power systems in a cyber-physical environment. Appl. Energy 235, 204–218 (2019)
Defense Use Case.: Analysis of the cyber attack on the Ukrainian power grid. Electricity Information Sharing and Analysis Center (E-ISAC), 388 (2016)
Keshk, M., Sitnikova, E., Moustafa, N., Hu, J., Khalil, I.: An integrated framework for privacy-preserving based anomaly detection for cyber-physical systems. IEEE Trans. Sustain. Comput. (2019)
Li, Z., Shahidehpour, M., Alabdulwahab, A., Abusorrah, A.: Analyzing locally coordinated cyber-physical attacks for undetectable line outages. IEEE Trans. Smart Grid 9(1), 35–47 (2016)
Koroniotis, N., Moustafa, N., Sitnikova, E.: A new network forensic framework based on deep learning for internet of things networks: a particle deep framework. Future Gener. Comput. Syst. 110, 91–106 (2020)
Machowski, J., Lubosny, Z., Bialek, J.W., Bumby, J.R.: Power System Dynamics: Stability and Control. Wiley, Hoboken (2020)
Akl, A., Sallam, K., Chakrabortty, R., Moustafa, N., Ryan, M., Choo, K.K.R.: A Novel Multi-level Optimization Framework for Enhancing Cyber-Physical Defenses in Smart Power Systems (2020). https://cloudstor.aarnet.edu.au/plus/s/D8JB2G6KGQtPSAT
Smith, J.C., Song, Y.: A survey of network interdiction models and algorithms. Eur. J. Oper. Res. 283(3), 797–811 (2020)
Kamarudin, N.D., Rahayu, S.B., Zainol, Z., Rusli, M.S., Ghani, K.A.: Performance comparison of machine learning classifiers on aircraft databases. Def S & T Tech Bull (1985–6571) 11(2), 154–169 (2018)
Liang, G., Weller, S.R., Luo, F., Zhao, J., Dong, Z.Y.: Distributed blockchain-based data protection framework for modern power systems against cyber attacks. IEEE Trans. Smart Grid 10(3), 3162–3173 (2018)
Sinha, A., Malo, P., Deb, K.: A review on bilevel optimization: from classical to evolutionary approaches and applications. IEEE Trans. Evol. Comput. 22(2), 276–295 (2017)
Cortés, J., Dullerud, G.E., Han, S., Le Ny, J., Mitra, S., Pappas, G.J.: Differential privacy in control and network systems. In: 2016 IEEE 55th Conference on Decision and Control (CDC), pp. 4252–4272 (2016)
Hughes, L., de Jong, M., Wang, X.Q.: A generic method for analyzing the risks to energy systems. Appl. Energy 180, 895–908 (2016)
Zhang, P., Li, W., Li, S., Wang, Y., Xiao, W.: Reliability assessment of photovoltaic power systems: review of current status and future perspectives. Appl. Energy 104, 822–833 (2013)
Lai, K., Illindala, M.S.: A distributed energy management strategy for resilient shipboard power system. Appl. Energy 228, 821–832 (2018)
Deng, R., Zhuang, P., Liang, H.: CCPA: coordinated cyber-physical attacks and countermeasures in smart grid. IEEE Trans. Smart Grid 8(5), 2420–2430 (2017)
Zhang, Y., Wei, W.: Decentralised coordination control strategy of the PV generator, storage battery and hydrogen production unit in islanded AC microgrid. IET Renew. Power Gener. 14(6), 1053–1062 (2020)
Sikorski, J.J., Haughton, J., Kraft, M.: Blockchain technology in the chemical industry: machine-to-machine electricity market. Appl. Energy 195, 234–246 (2017)
Xiang, Y., Wang, L., Liu, N.: Coordinated attacks on electric power systems in a cyber-physical environment. Electr. Power Syst. Res. 149, 156–168 (2017)
Costa, A., Georgiadis, D., Ng, T.S., Sim, M.: An optimization model for power grid fortification to maximize attack immunity. Int. J. Electr. Power Energy Syst. 99, 594–602 (2018)
Lin, Y., Bie, Z.: Tri-level optimal hardening plan for a resilient distribution system considering reconfiguration and DG islanding. Appl. Energy 210, 1266–1279 (2018)
Nemati, H., Latify, M.A., Yousefi, G.R.: Coordinated generation and transmission expansion planning for a power system under physical deliberate attacks. Int. J. Electr. Power Energy Syst. 96, 208–221 (2018)
Moreira, A., Strbac, G., Moreno, R., Street, A., Konstantelos, I.: A five-level MILP model for flexible transmission network planning under uncertainty: a min-max regret approach. IEEE Trans. Power Syst. 33(1), 486–501 (2017)
Fang, Y., Sansavini, G.: Optimizing power system investments and resilience against attacks. Reliab. Eng. Syst. Saf. 159, 161–173 (2017)
Davarikia, H., Barati, M.: A tri-level programming model for attack-resilient control of power grids. J. Mod. Power Syst. Clean Energy 6(5), 918–929 (2018)
Deb, K., Agrawal, R.B., et al.: Simulated binary crossover for continuous search space. Complex Syst. 9(2), 115–148 (1995)
Zeng, B., Zhao, L.: Solving two-stage robust optimization problems using a column-and-constraint generation method. Oper. Res. Lett. 41(5), 457–461 (2013)
GarcÃa, R., MarÃn, A., Patriksson, M.: Column generation algorithms for nonlinear optimization, i: convergence analysis. Optimization 52(2), 171–200 (2003)
Zimmerman, R.D., Murillo-Sánchez, C.E., Thomas, R.J.: MATPOWER: steady-state operations, planning, and analysis tools for power systems research and education. IEEE Trans. Power Syst. 26(1), 12–19 (2010)
Iyambo, P.K., Tzoneva, R.: Transient stability analysis of the IEEE 14-bus electric power system. In: AFRICON 2007, pp. 1–9 (2007)
Acknowledgment
We would like to strongly thank Dr Amany Mohamed Mamdouh AKL, Research Associate at UNSW Canberra, for great support in producing this work.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Yamany, W., Moustafa, N., Turnbull, B. (2020). A Tri-level Programming Framework for Modelling Attacks and Defences in Cyber-Physical Systems. In: Gallagher, M., Moustafa, N., Lakshika, E. (eds) AI 2020: Advances in Artificial Intelligence. AI 2020. Lecture Notes in Computer Science(), vol 12576. Springer, Cham. https://doi.org/10.1007/978-3-030-64984-5_8
Download citation
DOI: https://doi.org/10.1007/978-3-030-64984-5_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-64983-8
Online ISBN: 978-3-030-64984-5
eBook Packages: Computer ScienceComputer Science (R0)