rfdids: radio frequency-based distributed intrusion

19
Tohid Shekari, Christian Bayens, Morris Cohen, Lukas Graber, and Raheem Beyah School of Electrical and Computer Engineering February 2019 RFDIDS: Radio Frequency-based Distributed Intrusion Detection System for the Power Grid

Upload: others

Post on 10-Apr-2022

11 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: RFDIDS: Radio Frequency-based Distributed Intrusion

Tohid Shekari, Christian Bayens, Morris Cohen, Lukas Graber, and Raheem BeyahSchool of Electrical and Computer EngineeringFebruary 2019

RFDIDS: Radio Frequency-based Distributed Intrusion Detection System for the Power Grid

Page 2: RFDIDS: Radio Frequency-based Distributed Intrusion

• Basic Structure of the Power Grid

Power Grid Overview

1/18 Control Center

Page 3: RFDIDS: Radio Frequency-based Distributed Intrusion

• Typical equipment in substations• Transformers• Circuit breakers• Measurement devices and relays

• SCADA system• Control center• Substations (RTUs)

SCADA System and Substations

2/18

Page 4: RFDIDS: Radio Frequency-based Distributed Intrusion

SCADA System and Substations

3/18

Control Center

Substation

Substation Substation

Substation

Page 5: RFDIDS: Radio Frequency-based Distributed Intrusion

• Ukrainian power grid attack on December 2015

• Substation RTUs

• Circuit breakers

• 30 substations

• 230,000 residents

• DDoS attack on the call centers

Power Grid Attacks

4/18

Page 6: RFDIDS: Radio Frequency-based Distributed Intrusion

• Main target of attackers?

• Large attack surface

• Two million attacks per day!

Our Motivations – Why Substations?

5/18

Page 7: RFDIDS: Radio Frequency-based Distributed Intrusion

• Cybersecurity issues has been traditionally handled using network security and IT practices [15]-[28]• Patching more frequently and personnel training

• SCADA network traffic

• Machine learning methods to extract signatures

• Network scanning, password guessing

• Weaknesses• SCADA network can be compromised totally

• Zero day vulnerabilities

Existing Defense Mechanisms

6/18

Page 8: RFDIDS: Radio Frequency-based Distributed Intrusion

• Deploying new low-cost sensors in power substations

• Electromagnetic emanations from power circuits

• Robust against replay/spoofing attacks

General Idea of Our Solution

7/18

Measured electromagnetic signal

Caused by circuit current

Caused by lightning strokes from far distances

SCADA Network

Signal Authentication

Page 9: RFDIDS: Radio Frequency-based Distributed Intrusion

• Large current radiates electromagnetic signal

• Can travel long distances

• Random natural phenomenon

• Roughly 3 million times/day

• Similar signal? Nuclear explosion!

• Travels at the speed of light

Lightning Authentication Method

8/18

Page 10: RFDIDS: Radio Frequency-based Distributed Intrusion

• Lightning database, e.g., NLDN

• Lightning current (intensity)

• Lightning location

• Lightning occurrence time

• Compare the expected arrival time of lightning signals

Lightning Authentication Method

9/18

Page 11: RFDIDS: Radio Frequency-based Distributed Intrusion

• Electromagnetic emissions from circuit current

• Direct mathematical equations

• Reconstructing the circuit current

• Useful attributes

• Circuit current harmonic content (especially 60 Hz)

• Current fundamental frequency

SCADA Network Validation Scheme

10/18

Measured Magnetic field Signal

Reconstructed Circuit Current

Page 12: RFDIDS: Radio Frequency-based Distributed Intrusion

• Harmonic content and fundamental frequency

• Reported to the control center as measurements

• Control actions will affect them

• Circuit breakers

• Transformers

• Protective relays

• Substation RTUs

SCADA Network Validation Scheme

11/18

Page 13: RFDIDS: Radio Frequency-based Distributed Intrusion

• Overview of the proposed scheme

Threat Model and Defense Mechanisms

12/18

• Four attackers were considered

• ICS SCADA knowledge

• Level 1 + EM analysis

• Level 2 + Lightning database

• Level 3 + Geographical information

Page 14: RFDIDS: Radio Frequency-based Distributed Intrusion

• Measurement setup

• Experimental results• One substation of Georgia Power in Atlanta

• Two substations of Choptank Electric in Maryland

• Simulation results• PSCAD and Matlab

Example Attack Scenarios

13/18

Page 15: RFDIDS: Radio Frequency-based Distributed Intrusion

• Attack on the lightning authentication scheme – simulation with experimental data (99.99% true positive, true negative 99.99%)

• Circuit breaker malicious switching - experimental

• Transformer malicious tap changing - simulation (see Section V.B.2)

• False data injection to substation RTUs – simulation and experimental (see Section V.B.3)

• Any other attack that can affect the circuit current

Example Attack Scenarios

14/18

Page 16: RFDIDS: Radio Frequency-based Distributed Intrusion

• Circuit breaker malicious switching• Opening the circuit breaker

Attack Scenarios

15/18

Measured magnetic field signal

First harmonic of the measured signal

SCADA network traffic

SCADA network traffic, T = 11:09:35

Measured magnetic field, T = 11:09:35

Page 17: RFDIDS: Radio Frequency-based Distributed Intrusion

• Conclusions

• An air-gapped physical signal-based distributed IDS is proposed

• The developed sensor is robust against spoofing/replay attacks

• A natural random phenomenon (lightning) is leveraged for signal authentication

• The proposed method is able to detect various types of attacks with high accuracy

Conclusions and Possible Directions

16/18

Page 18: RFDIDS: Radio Frequency-based Distributed Intrusion

• Weaknesses and Possible Directions

• Other attributes can be used in the lightning authentication method

• Remote deployment of RF receivers

• Handling three-phase unbalanced systems

• The minimum number of receivers within the substation

Conclusions and Possible Directions

17/18