This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

11institutetext: Computing, Informatics, and Decision Systems Engineering
Arizona State University
11email: {sailiks,kaustav.basu,asen,rao}@asu.edu

Moving Target Defense for Robust Monitoring of Electric Grid Transformers in
Adversarial Environments

Sailik Sengupta    Kaustav Basu   
Arunabha Sen and Subbarao Kambhampati
Abstract

Electric power grid components, such as high voltage transformers (HVTs), generating stations, substations, etc. are expensive to maintain and, in the event of failure, replace. Thus, regularly monitoring the behavior of such components is of utmost importance. Furthermore, the recent increase in the number of cyberattacks on such systems demands that such monitoring strategies should be robust. In this paper, we draw inspiration from work in Moving Target Defense (MTD) and consider a dynamic monitoring strategy that makes it difficult for an attacker to prevent unique identification of behavioral signals that indicate the status of HVTs. We first formulate the problem of finding a differentially immune configuration set for an MTD in the context of power grids and then propose algorithms to compute it. To find the optimal movement strategy, we model the MTD as a two-player game and consider the Stackelberg strategy. With the help of IEEE test cases, we show the efficacy and scalability of our proposed approaches.111Accepted to the Conference on Decision and Game Theory for Security (GameSec), 2020.

1 Introduction

The electric power grid forms the backbone of all the other critical infrastructures (communication, transportation, water distribution, etc) of a country, and thus, necessitates the presence of adequate monitoring strategies to quickly detect any anomalous behavior(s) that may have manifested in the system. It is of utmost importance to not only detect such anomalous behavior but also to take appropriate actions quickly to prevent the failures of power grid components which in turn, may lead to a large scale blackout [1]. Components such as High Voltage Transformers (HVTs), generating stations, substations, etc. are essential to the power grid and thus, their operational behaviors are monitored at all times with the help of Phasor Measurement Units (PMUs are devices, which are utilized as sensors, for monitoring the power grid). The problem of placing these sensors has been studied by multiple researchers over the past decade [21, 18]. Recently, in [4, 17], the authors proposed a sensor placement approach that can uniquely identify the source of the anomaly by utilizing the sensor readings generated by PMUs. With the continuous discovery of real-world attacks such as Stuxnet [13], Dragonfly [28] and a wide range of cyberattacks– jamming, Denial of Service, packet dropping, false-data injection and compromise of data integrity [15, 16]– robustness of existing sensor placement mechanisms becomes critical. Thus, in this work, we leverage the ideas of Moving Target Defense (MTD) in cybersecurity [12, 25] and the Minimum Discriminating Code Set (MDCS) based PMU placement [3, 4] to build a defense-in-depth solution.

We continuously move the detection surface to make it challenging for an adversary to impede the unique identification of failure signals of HVTs. While PMUs are difficult to move, as opposed to the movement of physical resources in security games [19], once placed, they can be efficiently activated and deactivated, similar to the dynamic movement in intrusion detection systems [23]. While one may choose to activate all the PMUs placed upfront, the cost of maintaining them can become an impediment. Hence, the periodic use of a smaller subset (that still ensures unique identification) of the sensors placed upfront can be considered. Further, work in MTD has relied solely on heuristic guidance when constructing the configuration set that can result in all defenses being vulnerable to one attack, i.e. it is not differentially immune [22]. In this paper, we propose methods that ensure the MTD configuration set is differentially immune.

First, we define a novel variant of the MDCS problem, called the KK-differentially Immune MDCS (hereafter KK-δ\deltaMDCS). We find KK MDCSs of a graph, in which all KK solutions can uniquely identify failing HVTs, with the added constraint that no two MDCSs share a common vertex; thus resulting in a differentially immune configuration set for the MTD. Given that the original MDCS problem is NP-Complete, we show that KK-δ\deltaMDCS is also NP-Complete and provide an optimal Quadratically Constrained Integer Linear Programming (QC-ILP) approach to find the KmaxK_{\max}-MDCS of a graph. While our approach proves scalable for large power networks (MATPOWER IEEE test cases), we also propose a greedy approach that is computationally faster but trades-off on finding the largest KK value. Second, we model the interaction between the power utility company (hereafter, the defender) and the adversary, as a normal-form game. The notion of Strong Stackelberg equilibrium used in this game-theoretic formulation, popular in existing literature [26, 25], assumes a strong-threat model and aids in finding a good sensor activation strategy for the defender. Finally, we show the efficacy of our strategy and the scalability of our proposed approach on several IEEE power test cases of varying sizes.

2 Preliminaries

Refer to caption
Figure 1: IEEE 14 Bus Single Line Diagram

In this section, we first describe an electric power grid scenario and highlight how it can be modeled as a graph. Then, we describe the MDCS problem, showcasing how solutions to it can help with sensor placement, for the unique monitoring of HVTs. Finally, we provide a quick overview of Moving Target Defense (MTD) and the notion of differential immunity.

2.1 The Electric Power Grid as a Graph

In Figure 1, we show the IEEE 14 Bus single line diagram of an electrical power grid. In [4], the authors proposed a set of graph construction rules that model the monitoring of HVTs as a bipartite graph G=(TS,E)G=(T\cup S,E), where TT represents the set of High Voltage Transformers (HVTs) that need to be uniquely monitored and SS represents the locations where the PMUs (or sensors) can be potentially placed (PMU’s cannot be directly placed on HVTs), and EE represents the set of edges that exist if the operational behavior signal of an HVT (tTt\in T) reaches a PMU (sSs\in S) within a pre-specified number of hops. As Signal-to-Noise ratio (SNR) is used to measure the operational signal of an HVT in the real-world, and are known to quickly deteriorate over multiple hops, we, similar to prior works [4, 17], consider the number of hops to be at most 22 (see Figure 2).

2.2 Minimum Discriminating Code Set (MDCS)

The MDCS problem is a special case of the Minimum Identifying Code Set (MICS) [14], and was first studied in [6]. Given a graph, the goal of MICS is to identify the smallest set of nodes on which sensors can be placed such that two properties are met (given domain-specific information propagation constraints). First, if an event occurs at an entity represented by a node in the graph, a unique set of sensors is activated leading to easy identification of the node (entity). Second, every node should trigger a non-empty set of sensors if an event occurs at the node. In MDCS, the problem is adapted to a bipartite graph scenario with two (disjoint) sets of nodes– (i) nodes of interest, where an event may occur, which have to be uniquely identified with the sensors, and (ii) nodes on which sensors can be placed. Formally, we can define the MDCS problem in the context of sensor placement in power grid systems as follows [4].

Definition 1

Given a Bipartite Graph, G=(TS,E)G=(T\cup S,E), a vertex set SSS^{\prime}\subseteq S is defined to be the Discriminating Code Set of GG, if tT,N(t)S\forall t\in T,N(t)\cap S^{\prime} is unique, where N(t)N(t) denotes the neighborhood of tt. The Minimum Discriminating Code Set (MDCS) problem is to find the Discriminating Code Set of minimum size.

Refer to caption
Figure 2: Bipartite Graph derived from the IEEE 1414-bus network with 22-hop signal propagation constraints.

Figure 2 represents the bipartite graph obtained from Figure 1, with 55 nodes in TT, representing the 5 HVTs, and 4040 nodes in SS. An MDCS solution SSS^{\prime}\subseteq S of this graph consists of three nodes (indicated by the three colored nodes) which ensure that they provide a unique code to identify each of the 55 nodes in TT (colors above the nodes of TT indicate the unique combination of sensors activated).

2.3 Moving Target Defense (MTD) and Differential Immunity

Conceptually, MTD, popular in cyber-security, seeks to continuously move between a set of system configurations available to a defender, to take away the attacker’s advantage of reconnaissance [12]. The key idea is that the attacker may not encounter the expected system configuration at the time of the attack, thereby being rendered ineffective. Formally, an MTD system can be described using the three-tuple C,T,M\langle C,T,M\rangle where CC represents the set of system configurations a defender can move between, TT represents a timing function that describes when the defender moves and MM represents the movement strategy [24]. The goal of this work is two-fold– (1) to construct a desirable set CC (for which we define the KK-δ\deltaMDCS problem in section 3) and (2) an optimal movement strategy MM (by modeling the interaction as a game in section 4).

Note that when a single attack can cripple all the defense configurations C\in C, MTD cannot aid in improving the robustness. In [22], the authors introduce the notion of differential immunity that aims at measuring the amount of diversity between configurations C\in C. In this work, we consider a CC that is differentially immune (denoted as δ\delta), i.e. each attack, allowed by the threat model defined later, can only cripple one defense configuration. This ensures maximum diversity of CC and implies the highest robustness gains for the formulated MTD.

3 KK Differentially Immune MDCS (KK-δ\deltaMDCS)

To design the configuration set CC for an MTD system, we first need to find multiple MDCS sets of a bipartite graph. For this purpose, we desire KK differentially immune MDCS (KK-δ\deltaMDCS) where no two MDCS solutions share a common sensor placement point. Formally,

Definition 2

(KK-δ\deltaMDCS) Given a Bipartite Graph, G=(TS,E)G=(T\cup S,E), KK vertex sets SiS,i{1,,K}S_{i}\subseteq S,i\in\{1,\dots,K\} are defined to be KK-δ\deltaMDCS of GG, if the following conditions hold– (1) all the sets SiS_{i} are MDCSs of graph GG and (2) for all possible pairs of sets (Si,Sj)(S_{i},S_{j}), SiSj=S_{i}\cap S_{j}=\emptyset.

First, we want to activate the minimum number of sensors placed in the network at any point in time. Hence, we use KK sets, all of which are MDCS, i.e. have the smallest cardinality. Second, the use of differentially immune MDCS tries to optimize for robustness in adversarial settings. If an attacker were to attack a particular sensor placement point sSs\in S, it can hope to, at best, cripple a singular MDCS SiCS_{i}\in C, from uniquely identifying HVT failure. If the defender selects an MDCS SjC(ji)S_{j}\in C(j\neq i), then the attacker will not succeed in affecting the functionality of the power grid sensors. We will now show that the decision problem corresponding to KK-δ\deltaMDCS is NP-complete.

Refer to caption
Figure 3: The IEEE 14-bus power grid graph has 4δ4-\deltaMCDS solutions.
Lemma 1

KK-δ\deltaMDCS is NP-Complete, given KK is an integer and K>0K>0.

Proof.

We note that the original MDCS problem, which is known to be NP-Complete [6], is a special case (when K=1K=1). ∎

Corollary 1

KK-δ\delta Graph Problems such as KK-δ\deltaMinimum Identifying Code Set (MICS), KK-δ\deltaMinimum Set Cover (MSC), KK-δ\deltaMinimum Vertex Cover (MVC) are NP-Complete when KK is an integer and K>0K>0.222Note that in the context of these problems, the distinction between the node sets TT and SS in MDCS are unnecessary and one can view the graphs as G=(V,E)G=(V,E).

Let us denote the size of an MDCS for a bipartite graph GG as mm. In KK-δ\deltaMDCS, the goal of the defender is to find KK MDCSs each of size mm. Then, the defender needs to place KmK*m sensors in the power grid and, at any point in time, activate an MDCS set (of size mm) to uniquely identify failures in TT. While a large number of defender strategies (i.e. larger values of KK) helps to increase their options for sensor activation in turn reducing the success rate for the attacker, it also incurs the cost of placing KmK*m sensors. Thus, the ideal choice of KK should trade-off robustness vs. sensor costs (when K=1K=1, robustness using MTD is impossible to achieve).

In cases where the defender has sufficient resources, one might ask what is the maximum size of KK? Depending on the structure of the underlying graph, this question may have a trivial answer. For example, if the bipartite graph has a tTt\in T and N(t)={s},sSN(t)=\{s\},s\in S, any MDCS of GG needs to place a sensor on ss to uniquely detect a fault in tt. Hence, there can exist no two MDCSs that do not share a common node since ss has to be a part of both. In such cases, the max value of KK, denoted as KmaxK_{\max}, is 11. Beyond such cases, similar to the problem of finding the maximum value of KK in the KK-clique problem, finding KmaxK_{\max} demands a search procedure over the search space of KK that we now describe.

3.1 Finding max KK for KK-δ\deltaMDCS

We first propose a Quadratically Constrained Integer Linear Program (QCILP) that given a value of KK, finds KK Discriminating Code Sets (DCSs). We then showcase the algorithm for searching over possible values of k{1,,|S|}k\in\{1,\dots,|S|\} to find the largest KK. To define the QCILP for G=(TS,E)G=(T\cup S,E), we first consider |S|k|S|*k binary variables where, xsk=1x_{sk}=1 if a sensor is placed in node sSs\in S for the kkth DCS, and 0 otherwise. We also use a variable ll that denotes the size of the DCSs found. We can now describe our QCILP, presented below.

minl,x\displaystyle\min_{l,x} l\displaystyle l (1)
s.t.l\displaystyle s.t.\quad l =\displaystyle= sxskk All k DCS has the same size l.\displaystyle\sum_{s}x_{sk}\quad\forall k\quad\textsf{\scriptsize\color[rgb]{0.5,0.5,0.5}\definecolor[named]{pgfstrokecolor}{rgb}{0.5,0.5,0.5} All $k$ DCS has the same size $l$.}
sS(xskxsk)2\displaystyle\sum_{s\in S}(x_{sk}-x_{sk^{\prime}})^{2} =\displaystyle= 2l(k,k) No two DCSs should have a common sensor.\displaystyle 2l\quad\forall(k,k^{\prime})\quad\textsf{\scriptsize\color[rgb]{0.5,0.5,0.5}\definecolor[named]{pgfstrokecolor}{rgb}{0.5,0.5,0.5} No two DCSs should have a common sensor.}
sN(t)xsk\displaystyle\sum_{s\in N(t)}x_{sk} \displaystyle\geq 1t,k All tT has a sensor monitoring them for all the k solutions.\displaystyle 1\quad\forall t,\forall k\qquad\textsf{\scriptsize\color[rgb]{0.5,0.5,0.5}\definecolor[named]{pgfstrokecolor}{rgb}{0.5,0.5,0.5} All $t\in T$ has a sensor monitoring them for all the $k$ solutions.}
sN(t)ΔN(t)xsk\displaystyle\sum_{s\in N(t)\Delta N(t^{\prime})}x_{sk} \displaystyle\geq 1(t,t),k t and t trigger unique sensors for the k-th DCS.\displaystyle 1\quad\forall(t,t^{\prime}),\forall k\quad\textsf{\scriptsize\color[rgb]{0.5,0.5,0.5}\definecolor[named]{pgfstrokecolor}{rgb}{0.5,0.5,0.5} $t$ and $t^{\prime}$ trigger unique sensors for the $k$-th DCS.}
xsk\displaystyle x_{sk} \displaystyle\in 0,1s,k\displaystyle{0,1}\forall s,\forall k

The last two constraints ensure that each of the KK solutions is Discrimination Code Sets where (1) all tTt\in T trigger at least one sensor sSs\in S and (2) for all pairs of tt and tt^{\prime} (both T\in T), there exists at least one sensor in the symmetric difference set of tt and tt^{\prime} that is a part of the DCS, which in turn uniquely distinguishes between tt and tt^{\prime}. The first two constraints ensure that all kk DCSs are of equal size and no two DCSs shares a common sensor. We can now ask the question as to whether the DCSs found by Equation 1 is indeed the Minimum DCSs (MDCSs) for the graph GG. In this regard, we now show the following.

Theorem 3.1

For all values KKmaxK\leq K_{\max}, the optimization problem in Equation 1 returns KK-δ\deltaMDCS.

Proof.

We consider proof by contradiction. Given the value of K(Kmax)K(\leq K_{\max}), let us assume that the solution returned by Equation 1 is not the KK-δ\deltaMDCS for the graph GG. If this is the case, at least one of the two properties in the definition of KK-δ\deltaMDCS is violated. Thus, either (1) the returned solution consists of a DCS that is not the Minimum DCS, or (2) there exists a sub-set (of size greater than one) among the set of DCSs that share a common node.

Owing to the third and fourth constraints, all the solutions constitute a DCS. Now, if (1) is violated, all the DCSs returned by the QCILP, of length ll, are not the MDCS for GG. Thus, the MDCS must have a DCS of size lll^{\prime}\leq l. Given that the minimization objective finds the smallest DCS and KKmaxK\leq K_{\max}, this cannot be possible. Hence, (1) does not hold.

For (2), let us say that there exists a subset of the DCSs returned that share a common node. If this was the case, then at least one solution pair has to share a common node. If this node is denoted as ss^{*} and the two solutions are termed as kk and kk^{\prime}, then for the second constraint, given xsk=xsk=1x_{s^{*}k}=x_{s^{*}k^{\prime}}=1, the term for ss^{*} is zero. Even if the other l1l-1 nodes in the solutions kk and kk^{\prime} are unique, the terms will add up to 2(l1)2*(l-1) thereby violating the second constraint. This is not possible and as a consequence, (2) does not hold. ∎

Given this, we can now consider cases where K>KmaxK>K_{\max}. When K>KmaxK>K_{\max}, the optimization problem in Equation 1 is either infeasible or returns KK DCSs that are not MDCS for graph G. This condition holds by the definition of KmaxK_{\max} (proof by contradiction ensues if neither of the two cases holds). With these conditions in mind we can design an iterative approach, shown in algorithm 1, to find the KmaxδK_{\max}-\deltaMDCS of a given graph.

1:In: G=(TS,E)G=(T\cup S,E) 2:Out: KmaxδK_{\max}-\deltaMDCS 3: solutions \leftarrow\emptyset 4:K1K\leftarrow 1 5:while K|S|K\leq|S| do 6:    solutionsK{}_{K}\leftarrow Solve Equation 1 with KK 7:    if solutions=K={}_{K}==\emptyset then 8:       break                Infeasible for K>KmaxK>K_{\max} 9:    end if 10:    if solutions !=!=\emptyset and ||solutions(l)|<|(l)|<|solutions(l)K|{}_{K}(l)|  then 11:       break                DCS returned is not MDCS for K>KmaxK>K_{\max} 12:    end if 13:    solutions \leftarrow solutionsK 14:    KK+1K\leftarrow K+1 15:end while 16:return  solutions
Algorithm 1 Finding KmaxδK_{\max}-\deltaMDCS.

Figure 3 showcases the 4δ4-\deltaMDCS solutions returned by algorithm 1 for the 14-bus power grid network. The different colors indicate the different MDCSs found for GG and the shades of the same color indicate an MDCS set. As shown, each of the four MDCS has a size of l=3l=3 and uniquely identifies all the transformers TT. The lack of overlapping colors in the bottom set of nodes indicates that no two MDCS share a common sSs\in S.

While the procedure in algorithm 1 finds the KmaxδK_{\max}-\deltaMDCS, it can be time-consuming for the largest networks (although it works well on large power-grids as shown in the experimental section). Thus, one can consider a greedy approach in which one solves the MDCS problem using [4]. We then solve this ILP with the additional constraints that xs=0x_{s}=0 for all the sensors found in the current solution and keep doing so until (1) the ILP becomes infeasible or (2) results in DCS that does not have minimum cardinality. In the experimental section, we will see that although this approach is faster, it can output KK-δ\deltaMDCS where K<KmaxK<K_{\max}. The sub-optimality is a result of the ordering “enforced” by the current optimal MDCSs which in turn, proves to be infeasible constraints for the latter iterations of the problem.

4 Game Theoretic Formulation

The defender’s goal is to maintain the unique identifying capability of HVTs at all times. Conversely, the attacker tries to prevent this capability, thereby making it harder for the defender to effectively monitor the HVTs. Here, we seek to find the optimal movement function MM for the sensor activation MTD to aid the defender to realize its objective. To do so, we consider a strong threat-model where the attacker 𝒜\mathcal{A} with recon, is aware of the defender 𝒟\mathcal{D}’s (probabilistic) sensor activation strategy, thereby making the Stackelberg Equilibrium an appropriate solution concept for our setting. We use a polynomial-time approach to find the Strong Stackelberg Equilibrium of the game [8]. We now briefly describe the various parameters of the formulated game (see Figure 4).

Defense Actions

The defender has KmaxK_{\max} pure strategies and the configuration set C=KmaxδC=K_{\max}-\deltaMDCS. If one uses the greedy algorithm instead of the optimal approach (both described in the previous section), the number of pure strategies obtained may be less than KmaxK_{\max}.

Attack Actions

We assume that an attacker can spend reconnaissance effort in figuring out the sensor placement point. Thus, its action set includes attacking a sensor that may be considered for activation (instead of all nodes in |S||S|). While one can consider attackers with the capability to attack multiple sensor activation points, it is often too expensive a cost model as it demands resource procurement and distribution over a wide geographic area.

Refer to caption
Figure 4: Game-matrix for the dynamic sensor activation problem.
Player Utilities

The game has two different kinds of utilities that are used to calculate the rewards. First, the defender receives the utility associated with uniquely identifying a transformer tTt\in T in the case of anomalous spikes indicative of failure (to occur). We assume that a transformer supplying power to an important building (eg. the White House or the Pentagon) is considered to be more important than one supplying power to a residential area. Second, the attacker’s cost for attacking a particular sensor needs to be considered. While some sensors may be placed in high-security areas, others may be easier to access. We conduct randomized trials with both these values [0,10]\in[0,10], with 1010 indicating the HVT/sensor most important to protect/difficult to attack.

In the bottom right corner of Figure 4, the defender, owing to the attacker attacking a sensor, is only able to uniquely identify t3t_{3} and thus, only gets reward proportional to it. Contrarily, the attacker, due to attacking a sensor, can make failures of t1t_{1} and t2t_{2} (and t4t_{4} and t5t_{5}) indistinguishable and receives the corresponding utilities, minus the cost of attacking the sensor denoted by the light blue node (S\in S, Figure 3). Similarly, if the attacker selects the attack represented by the first attack column (sensor denoted by the dark brown node), the defender cannot identify any HVT and thus, gets a utility of zero.

Table 1: Game parameters and defender’s reward for playing the different CCs and MMs for the various power-grid networks.
CC Movement Function MM
Graph |S|+|T||S|+|T| |A𝒟||A^{\mathcal{D}}| (K/Kmax)(K/K_{\max}) |A𝒜||A^{\mathcal{A}}| (K/Kmax)(K/K_{\max}) URS (K)~{}~{}~{}(K)~{}~{} URS (Kmax)(K_{\max}) SSE (K)~{}~{}~{}(K)~{}~{} SSE (Kmax)(K_{\max})
14 Bus 45 4/4 12/12 18.5±\pm4.7 18.65±\pm4.7 20.62±\pm4.6 20.72±\pm4.6
30 Bus 89 4/4 16/16 26.45±\pm5.7 27.25±\pm5.6 29.44±\pm6 29.9±\pm5.8
39 Bus 96 7/9 28/36 18.7±\pm5 19.24±\pm5.2 19.8±\pm5.3 19.73±\pm5.3
57 Bus 170 6/6 60/60 70.76±\pm10.8 70.88±\pm11.1 73.5±\pm10.6 73.07±\pm10.7
89 Bus 422 16/21 96/126 50.67±\pm8.9 51±\pm9 52.2±\pm9.2 52.2±\pm9.2
118 Bus 367 2/2 10/10 31.35 ±\pm6 31.6 ±\pm 6 32.45±\pm6.4 32.61±\pm6.1
2383 Bus 5927 2/3 212/318 832.7±\pm38.7 836.16±\pm36.7 835.34±\pm39 842.34±\pm39.4

5 Experimental Simulation

In this section, we conduct simulation studies on seven IEEE test graphs popular in the power domain [29]. Characteristics of these graphs such as the total number of nodes (i.e. |S|+|T||S|+|T|) are shown in Table 1. The table further lists the KK values for the KK-δ\deltaMDCS found by the greedy and the optimal algorithm 1, and is denoted by KK and KmaxK_{max} respectively. The number of attacker strategies is listed in the fourth column. This value can be obtained by multiplying the corresponding KK value with the size of an MDCS for graph GG, since none of the KK-δ\deltaMDCS share a common node. We now discuss two results– (1) the effectiveness of the game-theoretic equilibrium compared to the Uniform Random Strategy baseline (which chooses to activate a particular MDCS with equal probability) and (2) the time is taken by the greedy and the optimal algorithm and their respective solution quality. 333The code for the experiments can be found at https://github.com/kaustav-basu/Robust-MICS

Effectiveness of Game-Theoretic Equilibrium

In Table 1, we show that in all test cases, the optimal movement strategy at the Strong Stackelberg Equilibrium (SSE) gives the defender a higher reward than choosing URS. When using URS or SSE, in most cases we see higher gains when the construction of the MTD configuration set CC is optimal (URS(Kmax)URS(K_{\max}) obtained from algorithm 1) as opposed to using a greedy algorithm (URS(K)URS(K)). We expected this as the higher number of differentially immune options (as Kmax>KK_{\max}>K) chosen with equal probability reduces the probability of picking the weakest strategy. When the value of Kmax=KK_{\max}=K, such as for 14, 30, 57 and 118 buses, we see that the difference between the two versions of URS (or two versions of SSE) are negligible. A reason for the non-zero difference between the rewards values arises because of the MDCS sets chosen, although the total number of sets chosen are the same. We also see that the difference in defender rewards can be large even when the difference between KK and KmaxK_{\max} is small in the case of larger networks (eg. 2383 bus). Thus, without finding the KmaxK_{\max} and the SSE for the optimal CC, it is hard to establish the loss in rewards. Given that these strategies are pre-computed, the power grid utility operator should not consider the greedy strategy unless the time required becomes prohibitive.

Refer to caption
Figure 5: Time taken by the optimal (algorithm 1) vs. the greedy approach for finding KmaxδK_{\max}-\deltaMDCS and KK-δ\deltaMDCS (the KK values are shown above the plot points).

5.0.1 Computational Time for finding CC

In Figure 5, we compare the time taken for finding the configuration set CC using the optimal vs.vs. the greedy approach. We choose the logarithmic scale for the y-axis because the computational time of the optimal and greedy approaches for the 14, 30, 39, 57, and 118 buses was less than a second, and thus difficult to distinguish between on a linear scale. The largest disparity occurs when the size of the optimal set KmaxK_{\max} is greater than the KK-sized set found by the greedy approach (39/89/2383 Bus). In other cases, while the optimal approach is slower, it provides the guarantee that no solution with a greater KK exists, which is absent in the greedy case. A case where the logarithmic scale, from a visualization perspective, does not do justice is the 2383-Bus. The time taken by the greedy approach is 15s15s compared to 291s291s taken by the optimal approach. While the KK value differs by a factor of one, the resultant gain in defender’s game value, as shown in Table 1, is relatively large. Thus, the added time in generating the optimal configuration set needs to be criticized based on the gain obtained in the underlying game.

We also consider the pragmatic scenario when the KK value is fixed by the defender up-front owing to budget restrictions of sensors that can be placed in the power network. In this case, the greedy approach has to iteratively find one solution at a time, adding them to the constraint set of future iterations until the desired kk is reached. On the other hand, the iterative procedure in algorithm 1 can be altogether ignored and one can simply return the solution found by the optimization problem in Equation 1.

6 Related Works

Adversarial attacks on power grids comprise of false-data injection, jamming, DoS and packet-dropping attacks [9, 10, 15]. While researchers have proposed a multitude of defense mechanisms [27], including Moving Target Defense (MTDs) [7, 20], they do not consider the problem of sensor placement to monitor HVTs. On the other hand, works that leverage the formalism of Discriminating Code Sets [6] to optimize sensor placement [4], have focused on scalability issues and provided theoretical bounds in these settings [3]; completely ignore the issue of robustness to adversarial intent. In this work, we attempted to fill in this gap.

While an array of research work has formally investigated the notion of finding an optimal movement function MM for MTDs, the configuration set CC is pre-decided based on heuristic guidance from security experts [24]. While some works consider the aspect of differential immunity by analyzing code overlap for cyber systems [5] or Jacobians of gradients for deep neural networks [2], these measures have no way of ensuring differential immunity. The notion of k-set diverse solutions in Constraint Satisfaction Programming (CSP) [11], although conceptually similar to our notion of differential immunity, does not have the added constraint of finding a minimum sized solution (as in the case of MDCS). In adversarial scenarios, our work is the first to formalize the notion of diversity in graphs and propose linear programming methods to find them.

7 Conclusion

We considered the problem of monitoring the behavior of HVTs in adversarial settings and proposed an approach based on MTD, formulating it as a game between the power utility company (the defender) and an adversary. We showed that finding the configuration set for the defender is NP-Complete and presented two algorithms– an optimal QC-ILP and a greedy iterative-ILP. Optimal movement strategies at Stackelberg Equilibrium enabled the defender to activate kk sensors at a time and uniquely identify failure points in the face of adversarial attacks. Results obtained on several IEEE test cases showed that the proposed methods yields the highest expected reward for the defender.

Acknowledgements

The research is supported in part by ONR grants N00014-16-1-2892, N00014-18-1-2442, N00014-18-1-2840, N00014-19-1-2119, AFOSR grant FA9550-18-1-0067, DARPA SAIL-ON grant W911NF-19-2-0006, and DARPA CHASE under Grant W912CG19-C-0003 (via IBM).

References

  • [1] Southwest blackout. https://tinyurl.com/y6xxjsm5, accessed: 2020-06-30
  • [2] Adam, G.A., Smirnov, P., Goldenberg, A., Duvenaud, D., Haibe-Kains, B.: Stochastic combinatorial ensembles for defending against adversarial examples. arXiv:1808.06645 (2018)
  • [3] Basu, K., Dey, S., Nandy, S., Sen, A.: Sensor networks for structural health monitoring of critical infrastructures using identifying codes. In: DRCN. IEEE (2019)
  • [4] Basu, K., Padhee, M., Roy, S., Pal, A., Sen, A., Rhodes, M., Keel, B.: Health monitoring of critical power system equipments using identifying codes. In: CRITIS. pp. 29–41. Springer (2018)
  • [5] Carter, K.M., Riordan, J.F., Okhravi, H.: A game theoretic approach to strategy determination for dynamic platform defenses. In: Proceedings of the first ACM workshop on moving target defense. pp. 21–30 (2014)
  • [6] Charbit, E., Charon, I., Cohen, G., Hudry, O.: Discriminating codes in bipartite graphs. Electronic Notes in Discrete Mathematics 26, 29–35 (2006)
  • [7] Chatfield, B., Haddad, R.J.: Moving target defense intrusion detection system for ipv6 based smart grid advanced metering infrastructure. In: SoutheastCon 2017
  • [8] Conitzer, V., Sandholm, T.: Computing the optimal strategy to commit to. In: Proceedings of the 7th ACM conference on Electronic commerce (2006)
  • [9] Deka, D., Baldick, R., Vishwanath, S.: Optimal data attacks on power grids: Leveraging detection & measurement jamming. In: 2015 IEEE International Conference on Smart Grid Communications. IEEE (2015)
  • [10] Deng, R., Xiao, G., Lu, R., Liang, H., Vasilakos, A.V.: False data injection on state estimation in power systems—attacks, impacts, and defense: A survey. IEEE Transactions on Industrial Informatics 13(2), 411–423 (2016)
  • [11] Hebrard, E., Hnich, B., O’Sullivan, B., Walsh, T.: Finding diverse and similar solutions in constraint programming. In: AAAI. vol. 5, pp. 372–377 (2005)
  • [12] Jajodia, S., Ghosh, A.K., Swarup, V., Wang, C., Wang, X.S.: Moving target defense: creating asymmetric uncertainty for cyber threats, vol. 54. Springer Science & Business Media (2011)
  • [13] Karnouskos, S.: Stuxnet worm impact on industrial cyber-physical system security. In: Annual Conference of the IEEE Industrial Electronics Society (2011)
  • [14] Karpovsky, M.G., Chakrabarty, K., Levitin, L.B.: On a new class of codes for identifying vertices in graphs. IEEE Transactions on Information Theory (1998)
  • [15] Nandanoori, S.P., Kundu, S., Pal, S., Agarwal, K., Choudhury, S.: Model-agnostic algorithm for real-time attack identification in power grid using koopman modes. Arxiv 2007.11717 (2020)
  • [16] Niu, L., Clark, A.: A framework for joint attack detection and control under false data injection. In: International Conference on Decision and Game Theory for Security. pp. 352–363. Springer (2019)
  • [17] Padhee, M., Biswas, R.S., Pal, A., Basu, K., Sen, A.: Identifying unique power system signatures for determining vulnerability of critical power system assets. ACM SIGMETRICS Performance Evaluation Review 47(4), 8–11 (2020)
  • [18] Pal, A., Vullikanti, A.K.S., Ravi, S.S.: A pmu placement scheme considering realistic costs and modern trends in relaying. IEEE Transactions on Power Systems 32(1), 552–561 (2016)
  • [19] Paruchuri, P., Pearce, J.P., Marecki, J., Tambe, M., Ordonez, F., Kraus, S.: Playing games for security: An efficient exact algorithm for solving bayesian stackelberg games. In: AAMAS. vol. 2, pp. 895–902 (2008)
  • [20] Potteiger, B., Cai, F., Dubey, A., Koutsoukos, X., Zhang, Z.: Security in mixed time and event triggered cyber-physical systems using moving target defense. In: IEEE International Symposium on Real-Time Distributed Computing. IEEE (2020)
  • [21] Salehi, V., Mohamed, A., Mazloomzadeh, A., Mohammed, O.A.: Laboratory-based smart power system, part ii: Control, monitoring, and protection. IEEE Transactions on Smart Grid 3(3), 1405–1417 (2012)
  • [22] Sengupta, S., Chakraborti, T., Kambhampati, S.: Mtdeep: Moving target defense to boost the security of deep neural nets against adversarial attacks. International Conference on Decision and Game Theory for Security (2019)
  • [23] Sengupta, S., Chowdhary, A., Huang, D., Kambhampati, S.: Moving target defense for the placement of intrusion detection systems in the cloud. In: International Conference on Decision and Game Theory for Security. pp. 326–345. Springer (2018)
  • [24] Sengupta, S., Chowdhary, A., Sabur, A., Alshamrani, A., Huang, D., Kambhampati, S.: A survey of moving target defenses for network security. IEEE Communications Surveys & Tutorials (2020)
  • [25] Sengupta, S., Vadlamudi, S.G., Kambhampati, S., Doupé, A., Zhao, Z., Taguinod, M., Ahn, G.J.: A game theoretic approach to strategy generation for moving target defense in web applications. In: AAMAS. pp. 178–186 (2017)
  • [26] Sinha, A., Nguyen, T.H., Kar, D., Brown, M., Tambe, M., Jiang, A.X.: From physical security to cybersecurity. Journal of Cybersecurity 1(1), 19–35 (2015)
  • [27] Tan, S., De, D., Song, W.Z., Yang, J., Das, S.K.: Survey of security advances in smart grid: A data driven approach. IEEE Communications S&T (2017)
  • [28] Team, S.: Dragonfly: Western energy sector targeted by sophisticated attack group (2017)
  • [29] Zimmerman, R.D., Murillo-Sánchez, C.E., Thomas, R.J.: Matpower: Steady-state operations, planning, and analysis tools for power systems research and education. IEEE Transactions on power systems 26(1), 12–19 (2010)