Skip to main content

A Tri-level Programming Framework for Modelling Attacks and Defences in Cyber-Physical Systems

  • Conference paper
  • First Online:
AI 2020: Advances in Artificial Intelligence (AI 2020)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 12576))

Included in the following conference series:

Abstract

Smart power grids suffer from coordinated attacks that exploit both their physical and cyber layers. It is an inevitable requirement to study power systems under such complex hacking scenarios to discover the system vulnerabilities and protect against those vulnerabilities and their attack vectors with appropriate defensive actions. This paper proposes an efficient tri-level programming framework that dynamically determines attacking scenarios, along with the best defensive actions in cyber-physical systems. A tri-level optimisation framework is proposed to fit the optimal decisions of defence strategies, malicious vectors and their operators for optimising the unmet demand while launching hacking behaviours. Defending resource allocation is designed using an evolutionary algorithm to examine coordinated attacks that exploit power systems. The proposed framework includes a Genetic Algorithm (GA) to solve each of the model levels in power systems. This proposed framework can flexibly model malicious vectors and their defences. IEEE 14-bus benchmark is employed to evaluate the proposed framework.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Change history

  • 27 November 2020

    The original version of this chapter was revised. The following corrections have been incorporated:

References

  1. Wu, X., Conejo, A.J.: An efficient tri-level optimization model for electric grid defense planning. IEEE Trans. Power Syst. 32(4), 2984–2994 (2016)

    Article  Google Scholar 

  2. Lu, W., Besanger, Y., Zamaï, É., Radu, D.: Blackouts: description, analysis and classification. Network 2, 14 (2006)

    Google Scholar 

  3. Lai, K., Illindala, M., Subramaniam, K.: A tri-level optimization model to mitigate coordinated attacks on electric power systems in a cyber-physical environment. Appl. Energy 235, 204–218 (2019)

    Article  Google Scholar 

  4. Defense Use Case.: Analysis of the cyber attack on the Ukrainian power grid. Electricity Information Sharing and Analysis Center (E-ISAC), 388 (2016)

    Google Scholar 

  5. Keshk, M., Sitnikova, E., Moustafa, N., Hu, J., Khalil, I.: An integrated framework for privacy-preserving based anomaly detection for cyber-physical systems. IEEE Trans. Sustain. Comput. (2019)

    Google Scholar 

  6. Li, Z., Shahidehpour, M., Alabdulwahab, A., Abusorrah, A.: Analyzing locally coordinated cyber-physical attacks for undetectable line outages. IEEE Trans. Smart Grid 9(1), 35–47 (2016)

    Article  Google Scholar 

  7. Koroniotis, N., Moustafa, N., Sitnikova, E.: A new network forensic framework based on deep learning for internet of things networks: a particle deep framework. Future Gener. Comput. Syst. 110, 91–106 (2020)

    Article  Google Scholar 

  8. Machowski, J., Lubosny, Z., Bialek, J.W., Bumby, J.R.: Power System Dynamics: Stability and Control. Wiley, Hoboken (2020)

    Google Scholar 

  9. Akl, A., Sallam, K., Chakrabortty, R., Moustafa, N., Ryan, M., Choo, K.K.R.: A Novel Multi-level Optimization Framework for Enhancing Cyber-Physical Defenses in Smart Power Systems (2020). https://cloudstor.aarnet.edu.au/plus/s/D8JB2G6KGQtPSAT

  10. Smith, J.C., Song, Y.: A survey of network interdiction models and algorithms. Eur. J. Oper. Res. 283(3), 797–811 (2020)

    Article  MathSciNet  Google Scholar 

  11. Kamarudin, N.D., Rahayu, S.B., Zainol, Z., Rusli, M.S., Ghani, K.A.: Performance comparison of machine learning classifiers on aircraft databases. Def S & T Tech Bull (1985–6571) 11(2), 154–169 (2018)

    Google Scholar 

  12. Liang, G., Weller, S.R., Luo, F., Zhao, J., Dong, Z.Y.: Distributed blockchain-based data protection framework for modern power systems against cyber attacks. IEEE Trans. Smart Grid 10(3), 3162–3173 (2018)

    Article  Google Scholar 

  13. Sinha, A., Malo, P., Deb, K.: A review on bilevel optimization: from classical to evolutionary approaches and applications. IEEE Trans. Evol. Comput. 22(2), 276–295 (2017)

    Article  Google Scholar 

  14. Cortés, J., Dullerud, G.E., Han, S., Le Ny, J., Mitra, S., Pappas, G.J.: Differential privacy in control and network systems. In: 2016 IEEE 55th Conference on Decision and Control (CDC), pp. 4252–4272 (2016)

    Google Scholar 

  15. Hughes, L., de Jong, M., Wang, X.Q.: A generic method for analyzing the risks to energy systems. Appl. Energy 180, 895–908 (2016)

    Article  Google Scholar 

  16. Zhang, P., Li, W., Li, S., Wang, Y., Xiao, W.: Reliability assessment of photovoltaic power systems: review of current status and future perspectives. Appl. Energy 104, 822–833 (2013)

    Article  Google Scholar 

  17. Lai, K., Illindala, M.S.: A distributed energy management strategy for resilient shipboard power system. Appl. Energy 228, 821–832 (2018)

    Article  Google Scholar 

  18. Deng, R., Zhuang, P., Liang, H.: CCPA: coordinated cyber-physical attacks and countermeasures in smart grid. IEEE Trans. Smart Grid 8(5), 2420–2430 (2017)

    Article  Google Scholar 

  19. Zhang, Y., Wei, W.: Decentralised coordination control strategy of the PV generator, storage battery and hydrogen production unit in islanded AC microgrid. IET Renew. Power Gener. 14(6), 1053–1062 (2020)

    Article  Google Scholar 

  20. Sikorski, J.J., Haughton, J., Kraft, M.: Blockchain technology in the chemical industry: machine-to-machine electricity market. Appl. Energy 195, 234–246 (2017)

    Article  Google Scholar 

  21. Xiang, Y., Wang, L., Liu, N.: Coordinated attacks on electric power systems in a cyber-physical environment. Electr. Power Syst. Res. 149, 156–168 (2017)

    Article  Google Scholar 

  22. Costa, A., Georgiadis, D., Ng, T.S., Sim, M.: An optimization model for power grid fortification to maximize attack immunity. Int. J. Electr. Power Energy Syst. 99, 594–602 (2018)

    Article  Google Scholar 

  23. Lin, Y., Bie, Z.: Tri-level optimal hardening plan for a resilient distribution system considering reconfiguration and DG islanding. Appl. Energy 210, 1266–1279 (2018)

    Article  Google Scholar 

  24. Nemati, H., Latify, M.A., Yousefi, G.R.: Coordinated generation and transmission expansion planning for a power system under physical deliberate attacks. Int. J. Electr. Power Energy Syst. 96, 208–221 (2018)

    Article  Google Scholar 

  25. Moreira, A., Strbac, G., Moreno, R., Street, A., Konstantelos, I.: A five-level MILP model for flexible transmission network planning under uncertainty: a min-max regret approach. IEEE Trans. Power Syst. 33(1), 486–501 (2017)

    Article  Google Scholar 

  26. Fang, Y., Sansavini, G.: Optimizing power system investments and resilience against attacks. Reliab. Eng. Syst. Saf. 159, 161–173 (2017)

    Article  Google Scholar 

  27. Davarikia, H., Barati, M.: A tri-level programming model for attack-resilient control of power grids. J. Mod. Power Syst. Clean Energy 6(5), 918–929 (2018)

    Article  Google Scholar 

  28. Deb, K., Agrawal, R.B., et al.: Simulated binary crossover for continuous search space. Complex Syst. 9(2), 115–148 (1995)

    MathSciNet  MATH  Google Scholar 

  29. Zeng, B., Zhao, L.: Solving two-stage robust optimization problems using a column-and-constraint generation method. Oper. Res. Lett. 41(5), 457–461 (2013)

    Article  MathSciNet  Google Scholar 

  30. García, R., Marín, A., Patriksson, M.: Column generation algorithms for nonlinear optimization, i: convergence analysis. Optimization 52(2), 171–200 (2003)

    Article  MathSciNet  Google Scholar 

  31. Zimmerman, R.D., Murillo-Sánchez, C.E., Thomas, R.J.: MATPOWER: steady-state operations, planning, and analysis tools for power systems research and education. IEEE Trans. Power Syst. 26(1), 12–19 (2010)

    Article  Google Scholar 

  32. Iyambo, P.K., Tzoneva, R.: Transient stability analysis of the IEEE 14-bus electric power system. In: AFRICON 2007, pp. 1–9 (2007)

    Google Scholar 

Download references

Acknowledgment

We would like to strongly thank Dr Amany Mohamed Mamdouh AKL, Research Associate at UNSW Canberra, for great support in producing this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Waleed Yamany .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yamany, W., Moustafa, N., Turnbull, B. (2020). A Tri-level Programming Framework for Modelling Attacks and Defences in Cyber-Physical Systems. In: Gallagher, M., Moustafa, N., Lakshika, E. (eds) AI 2020: Advances in Artificial Intelligence. AI 2020. Lecture Notes in Computer Science(), vol 12576. Springer, Cham. https://doi.org/10.1007/978-3-030-64984-5_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-64984-5_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-64983-8

  • Online ISBN: 978-3-030-64984-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics