Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
126 tokens/sec
GPT-4o
47 tokens/sec
Gemini 2.5 Pro Pro
43 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Towards Automated Generation of Smart Grid Cyber Range for Cybersecurity Experiments and Training (2404.00869v1)

Published 1 Apr 2024 in cs.CR

Abstract: Assurance of cybersecurity is crucial to ensure dependability and resilience of smart power grid systems. In order to evaluate the impact of potential cyber attacks, to assess deployability and effectiveness of cybersecurity measures, and to enable hands-on exercise and training of personals, an interactive, virtual environment that emulates the behaviour of a smart grid system, namely smart grid cyber range, has been demanded by industry players as well as academia. A smart grid cyber range is typically implemented as a combination of cyber system emulation, which allows interactivity, and physical system (i.e., power grid) simulation that are tightly coupled for consistent cyber and physical behaviours. However, its design and implementation require intensive expertise and efforts in cyber and physical aspects of smart power systems as well as software/system engineering. While many industry players, including power grid operators, device vendors, research and education sectors are interested, availability of the smart grid cyber range is limited to a small number of research labs. To address this challenge, we have developed a framework for modelling a smart grid cyber range using an XML-based language, called SG-ML, and for "compiling" the model into an operational cyber range with minimal engineering efforts. The modelling language includes standardized schema from IEC 61850 and IEC 61131, which allows industry players to utilize their existing configurations. The SG-ML framework aims at making a smart grid cyber range available to broader user bases to facilitate cybersecurity R&D and hands-on exercises.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (36)
  1. R. Langner, “Stuxnet: Dissecting a cyberwarfare weapon,” IEEE Security & Privacy, vol. 9, no. 3, pp. 49–51, 2011.
  2. D. U. Case, “Analysis of the cyber attack on the ukrainian power grid,” Electricity Information Sharing and Analysis Center (E-ISAC), vol. 388, pp. 1–29, 2016.
  3. “Venezuela’s maduro: Blackout due to cyber-attack, infiltrators,” [Online]. Available at https://www.aljazeera.com/news/2019/3/10/venezuelas-maduro-blackout-due-to-cyber-attack-infiltrators.
  4. “Hackers leak files stolen in pakistan’s k-electric ransomware attack,” [Online]. Available at https://www.bleepingcomputer.com/news/security/hackers-leak-files-stolen-in-pakistans-k-electric-ransomware-attack/.
  5. iTrust, Available at https://itrust.sutd.edu.sg/testbeds/electric-power-intelligent-control-epic/.
  6. J. Weiss, “Aurora generator test,” Handbook of SCADA/Control Systems Security, vol. 107, 2016.
  7. P. Gunathilaka, D. Mashima, and B. Chen, “Softgrid: A software-based smart grid testbed for evaluating substation cybersecurity solutions,” in Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, ser. CPS-SPC ’16.   New York, NY, USA: Association for Computing Machinery, 2016, p. 113–124.
  8. M. Annor-Asante and B. Pranggono, “Development of smart grid testbed with low-cost hardware and software for cybersecurity research and education,” Wireless Pers Commun, vol. 101, p. 1357–1377, 2018.
  9. M. Mallouhi, Y. Al-Nashif, D. Cox, T. Chadaga, and S. Hariri, “A testbed for analyzing security of scada control systems (tasscs),” in ISGT 2011, 2011, pp. 1–7.
  10. E. Hammad, M. Ezeme, and A. Farraj, “Implementation and development of an offline co-simulation testbed for studies of power systems cyber security and control verification,” International Journal of Electrical Power & Energy Systems, vol. 104, pp. 817–826, 2019.
  11. R. Liu, C. Vellaithurai, S. S. Biswas, T. T. Gamage, and A. K. Srivastava, “Analyzing the cyber-physical impact of cyber events on the power grid,” IEEE Transactions on Smart Grid, vol. 6, no. 5, pp. 2444–2453, 2015.
  12. G. Elbez, H. B. Keller, and V. Hagenmeyer, “A Cost-efficient Software Testbed for Cyber-Physical Security in IEC 61850-based Substations,” in IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), 2018.
  13. D. Mashima, D. Kok, W. Lin, M. Hazwan, and A. Cheng, “On design and enhancement of smart grid honeypot system for practical collection of threat intelligence,” in 13th USENIX Workshop on Cyber Security Experimentation and Test (CSET 20), 2020.
  14. M. M. Roomi, P. P. Biswas, D. Mashima, Y. Fan, and E.-C. Chang, “False data injection cyber range of modernized substation system,” in 2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm).   IEEE, 2020, pp. 1–7.
  15. N. K. Kandasamy, S. Venugopalan, T. K. Wong, and L. J. Nicholas, “Epictwin: an electric power digital twin for cyber security testing, research and education,” arXiv preprint arXiv:2105.04260, 2021.
  16. M. M. Roomi, S. S. Hussain, D. Mashima, E.-C. Chang, and D. Nicol, “SG-ML: SMART GRID CYBER RANGE MODELLING FRAMEWORK SPECIFICATION (Version 0.9),” [Online]. Available at https://github.com/smartgridadsc/CyberRange.
  17. R. E. Mackiewicz, “Overview of iec 61850 and benefits,” in 2006 IEEE Power Engineering Society General Meeting.   IEEE, 2006, pp. 8–pp.
  18. I. TC57, “Iec 61850: Communication networks and systems for power utility automation,” International Electrotechnical Commission Std, vol. 53, p. 54, 2010.
  19. A. A. Smadi, B. T. Ajao, B. K. Johnson, H. Lei, Y. Chakhchoukh, and Q. Abu Al-Haija, “A comprehensive survey on cyber-physical smart grid testbed architectures: Requirements and challenges,” Electronics, vol. 10, no. 9, p. 1043, 2021.
  20. I. N. Fovino, M. Masera, L. Guidi, and G. Carpi, “An experimental platform for assessing scada vulnerabilities and countermeasures in power plants,” in 3rd International Conference on Human System Interaction.   IEEE, 2010, pp. 679–686.
  21. K. Barnes and B. Johnson, “National scada test bed substation automation evaluation report,” Idaho National Lab.(INL), Idaho Falls, ID (United States), Tech. Rep., 2009.
  22. M. McDonald, J. Mulder, B. Richardson, R. Cassidy, A. Chavez, N. Pattengale, G. Pollock, J. Urrea, M. Schwartz, W. Atkins et al., “Modeling and simulation for cyber-physical system security research, development and applications,” Sandia National Laboratories, Tech. Rep. Sandia Report SAND2010-0568, 2010.
  23. M. M. Roomi, S. S. Hussain, D. Mashima, E.-C. Chang, and T. S. Ustun, “Analysis of false data injection attacks against automated control for parallel generators in iec 61850-based smart grid systems,” IEEE Systems Journal, 2023.
  24. A. Otto and K. Hellmann, “Iec 61131: A general overview and emerging trends,” IEEE Industrial Electronics Magazine, vol. 3, no. 4, pp. 27–31, 2009.
  25. L. Thurner, A. Scheidler, F. Schäfer, J.-H. Menke, J. Dollichon, F. Meier, S. Meinecke, and M. Braun, “pandapower—an open-source python tool for convenient modeling, analysis, and optimization of electric power systems,” IEEE Transactions on Power Systems, vol. 33, no. 6, pp. 6510–6521, 2018.
  26. “Mininet,” Available at http://mininet.org/.
  27. “Open source libraries for iec 61850 and iec 60870-5-101/104,” [Online]. Available at https://libiec61850.com/.
  28. “OPENPLC,” [Online]. Available at https://openplcproject.com/.
  29. “OpenPLC61850,” [Online]. Available: https://github.com/smartgridadsc/OpenPLC61850.
  30. “ScadaBR,” Available at https://www.scadabr.com.br/.
  31. M. M. Roomi, W. S. Ong, D. Mashima, and S. S. M. Hussain, “OpenPLC61850: An IEC 61850 MMS compatible open source PLC for smart grid research,” SoftwareX, vol. 17, p. 100917, 2022.
  32. A. Siddiqi, N. O. Tippenhauer, D. Mashima, and B. Chen, “On practical threat scenario testing in an electric power ics testbed,” in Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, 2018, pp. 15–21.
  33. “Open Network Operating System (ONOS),” [Online]. Available at https://github.com/opennetworkinglab/onos.
  34. K. Zetter, “Inside the cunning, unprecedented hack of ukraine’s power grid,” http://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/, 2016.
  35. “Crashoverride malware,” [Online]. Available: https://www.us-cert.gov/ncas/alerts/TA17-163A, (Date last accessed on Aug. 18, 2017).
  36. “Iec61850bean,” [Online]. Available: https://www.beanit.com/iec-61850/, (Date last accessed on Nov. 28, 2022).
Citations (5)

Summary

We haven't generated a summary for this paper yet.