Table of Links
- ABSTRACT
- INTRODUCTION
- PROPOSED EPIDEMIC CYBER-PHYSICAL SYSTEM MODEL
- PROPOSED INSURANCE PREMIUM PRINCIPLE
- SIMULATION RESULTS
- CONCLUDING REMARKS AND REFERENCES
PROPOSED EPIDEMIC CYBER-PHYSICAL SYSTEM MODEL
A goal of this study is to gauge the risk of cyberattacks on the individual TGs to determine economical insurance pricing strategies. Fig. 1 conveys the proposed mutual insurance framework as multiple steps: (a) The power system configuration under study should be segmented according to the TGs ownership. (b) Within respective TG substations, smart monitoring and server job assignment are enforced to enhance the substation reliability subject to cyberattacks. (c) Accounting for the cyber connection across the TGs, an ENM is established to stochastically evaluate the long-term impact of cyberattacks. (d) Reliability-based optimal power flow is conducted to estimate the load loss profiles of respective TGs. (e) The insurance premium of each TG is computed based on the corresponding marginal distribution of the loss. A. Epidemic Network Model Fig. 2 illustrates the attack graph of the proposed ENM. The vulnerability ๐ฃโ is denoted as a colored oval VUL.

Each node represents a vulnerability. In the proposed ENM, two types of anomalies, ROB and DoS, are considered. ROB attack decrypts the control centerโs server privilege by iterating queries to a control server. DoS attack on the substation server is triggered by unauthenticated clients issuing specially crafted messages. The successful exploitation condition of vulnerability ๐ฃโ occurs Fig. 1. The major steps in developing the proposed cybersecurity mutual insurance model. Fig. 2. Attack graph of the proposed Epidemic Network Model. when the server privilege is obtained by the attacker, denoted as ๐โ. Vulnerability scores are determined by CVSS comprising the base score, temporal score, and environmental score that take a wide range of attack-related factors into account, including confidentiality, integrity, availability, attack complexity, privileges required, and exploit code maturity [24].
In Fig. 2, the attacker may compromise the substation ๐๐,1 to start the attack on the q-th TG. Specifically, the attacker deploys anomaly DoS(1) to gain access to the server privilege user(1) of ๐๐,1 by exploiting <0, 1>. Once ๐๐,1 is compromised, adjacent <1, 2> of the control center ๐ถ๐ถ๐ can be exploited in a similar manner. Vulnerabilities in cascade are exploited sequentially. In ๐๐บ๐, the substations and the control center are laid out according to cyber connections in the attack graph. Power dispatching action is feasible along the good routes connecting healthy nodes. Then the good routes are obtained using a routing algorithm such as Depth-First Search [25].
The substations outside of the good routes indicate disconnection from power generation capacity, resulting in load curtailment in the TG. More details can be referred to [26] for cyber network modeling. Physically, exploiting the vulnerability means the attacker breaches the server firewall to gain the server privilege to manipulatively command the substation. According to the attack graph, all preceding and current vulnerabilities should be exploited to compromise a substation server. However, since the substations located at any point of the attack graph may be compromised, an external infection term is established in the Cyber Epidemic Model to include such a possibility. After the substation server is compromised, the attacker may send counterfeit commands to the protective relays to disconnect the major substation IED from grid operations.
The reliability-driven approach adopted in this study is different from contingency analysis on cascading failures. A graphical S-k contingency analysis based on extended enumeration considers the cascading failure by gradually removing the overloaded lines [27]. Worst cases with divergent load flow results are recorded to estimate the substation risk indices. Differently, in the MCS based reliability evaluation procedure, each component status is determined by comparing the random number generated and the FOR of that component. Then, a reliability-based OPF is performed for the sampled state to decide if there is load loss after re-dispatching the power to minimize the overall load loss based on the current system state. Finally, the overall reliability indices can be calculated by sampling enough system states with varying failure scenarios.

A security metric used extensively in reliability assessment is the SCT ๐๐ . In Definition 1, ๐๐ quantifies the time taken by the attacker to bring the substation down. Considering the attack graph, ๐๐ is logically synthesized with a Bayesian Network [13]. The SCT ๐๐ is synthesized based on the individual sojourn times ๐ก๐ of the vulnerabilities ๐ฃโ. ๐ก๐ is positively correlated to ๐๐ and the overall system reliability. The smart technologies considered in this work including smart monitoring [14] and job thread assignment [15]. In the job assignment, ๐ก๐ corresponds to the memory thread resource in the cyber-physical elements assigned to the operational task. In smart monitoring, the CPS elements deploy preventive and corrective measures to boost substation security. The probability of exploiting vulnerability ๐ฃโ depends on its score ๐(๐ฃโ). The conditional probability ๐(๐โ |๐ฃโ ) can be determined by the vulnerability ๐ฃโ and all the preceding vulnerabilities. The total probability of successful exploitation ๐(๐โ ) is the summation of ๐(๐ฃโ โง ๐โ ).

The cyber epidemic model is initiated by a malicious attack described in Definition 2. The cyber epidemic model that infects a vulnerability node may stochastically spread to an adjacent vulnerability node set ฮถ. State sequence of a specific substation is determined by the infection time vector ๐โ ๐๐๐ and recovery time vector ๐โ ๐๐๐ based on the SCTs of ฮถ and binomially distributed recovery times of ฮถ. To consider the cyber risks spreading in the large-scale network, external epidemic infection time ๐๐๐๐ and recovery time ๐ ๐๐๐ are respectively included in augmented ๐โ ๐๐๐ and ๐โ ๐๐๐. The intensity of the epidemic attack can be adjusted by the basic reproduction number ๐ and graphical edge coupling number ๐.
The substation infection time ๐๐๐๐ and recovery time ๐๐๐๐ are estimated by the maximum and expected values of the respective vectors. The probability of cyberattack infection ๐๐๐ก๐ is calculated using ๐๐๐๐ and ๐๐๐๐. Then ๐๐๐ก๐ is compared with a uniform variate to determine whether the substation server is compromised by the cyberattack. The proposed Epidemic Network Model concerns a software-based cyberattack whose impacts would be reflected in the physical power system. When the substations become infected, their operations are compromised. Specifically, the physical loss due to the cyberattack is measured by load curtailment in the reliability analysis. The economic implication of the load loss on TGs is then evaluated in the insurance premium design.

The substation state sequence ๐ธ๐(๐บ๐) is sampled subject to cyber epidemic described in Definition 2, with binary values 1 and 0 indicating the generation capacity ๐ฎ๐๐๐ connected to the specific substations to be either available or offline. If the substation server is infected by the cyberattack, the attacker could breach the server root privilege and send false tripping commands to the substation relays that cause generation offline. In Optimization 1, ๐ธ๐(๐บ๐) โ ๐ฎ๐๐๐ determines the upper bounds of online capacity ๐ฎ at each time step ๐. Together with the load capacity ๐ซ๐๐๐ and thermal limit constraints ๐ญ๐๐๐, the aggregate substation load loss โ๐ฅ ๐ฒ๐ is minimized at each time step ๐. The energy balance between the online generation supply and online load demand should always be maintained with load curtailment ๐ฒ๐ being further bounded by the load capacity ๐ซ๐๐๐.

Fig. 3 depicts a typical process of epidemic propagation on a substation. The malicious attacker infiltrates the firewall of the control center through remote access network connected via a modem. If the Ethernet in the control center is breached, the attacker can gain access to the data storage, application server and operation of the workstation. Since WAP controls the substation operation via RTUs, the attacker may directly compromise the substation through the WAP without going through control center. Through infecting the network switch with malware, the attacker may further compromise the substation Intranet. That is, the attacker obtains the privilege of the SCADA server, Human-Machine Interface and the WAP. If the WAP is hacked, false commands can be sent to RTUs to modify the trip settings in different relays. The breaker operating units connected to RTUs coordinate the relays to provide overcurrent protection, overvoltage protection and differential protection. By intentionally reducing the threshold value of the overcurrent relay, the circuit breakers can be falsely tripped when no physical fault condition is presented. A detailed survey further analyzed the impacts of various cyberattack scenarios in the power systems [28]. In the following subsection, the cyber-physical enhancement strategies on the substations will be presented.
C. Substation Cyber-Physical Enhancement
To enhance power system reliability, substation-oriented smart monitoring including SCADA systems and EMU may be worth investments. To highlight the merit of the cyber-physical smart grid with sensing and remedial equipment, reliability modeling of the smart monitoring devices performed in Fig. 4(a) shows a base case of two-state reliability model with failure rate and repair rate (๐๐, ๐๐ ) . In Fig. 4(a), the smart monitoring reliability model has M+1 up states ( ๐๐0~๐๐๐ ) and N+1 (๐ท๐0~๐ท๐๐ ) down states, with failure rate and repair rates (๐๐ , ๐๐ ) among respective states.

The smart monitoring model can be reduced to an equivalent composite two-state model with the composite failure rate and repair rate (๐๐ , ๐๐ ) [14]. For the substation servers, it is crucial to ensure IEDs within the substations with computing capability function normally. In typical operations of computing systems, portions of the memory are dynamically allocated to process-specific tasks. The scheduling strategies in [15] can be adapted to enable improved job thread assignment for our problem. Multiple server threads are scheduled to carry out the same task command of IEDs to heighten the computing dependability against uncertainties. Fig. 4(b) shows a basic 2-thread (๐ฝ2 ) fault-tolerant job thread assignment procedure assigned with a critical server task in the substation SCADA server. The procedure includes total 4 states: both threads T1T2 carrying out single task, either thread (T1, T2) executing the same task, and the task is terminated when both threads fail F to perform the task.
Similarly, Fig. 4(b) also shows a 3-thread (๐ฝ3 ) fault-tolerant job thread assignment procedure with 11 states: all 3 threads T1T2T3 conducting single task, 2 of the threads (T1T2, T1T3, T2T3) carrying out the same task, within 2 selected threads one of the threads further fails (C1~C6), and the task is terminated when all 3 threads fail F to perform the task. The sojourn time of ๐ฝ2 and ๐ฝ3 are ๐ก๐ (๐ฝ2 , ๐, ๐) and ๐ก๐ (๐ฝ3 , ๐, ๐) , determined by the probabilities of state transition, duration of task operation, expected thread recruitment rate ๐ and thread residence rate ๐. In this study, duration of the task operation and residual time of the job thread executing the task are assumed to be exponentially distributed for simplicity. It will be shown in the case studies the combined application of job thread assignment and smart monitoring can achieve improved grid reliability.
D. Strength of Interdependence
The SCT ๐๐ is the hypothetical effort where the individual substation privilege access would be obtained by the malicious attacker. Typically, SCTs of the target substations are considered mutually independent in reliability assessment. In this study, all TGs are assumed participants of the proposed mutual insurance to study SoI across the TGs. The sampled SCT vector ๐ปฬ๐ incorporates a standard uniform variate set ๐ฐ into the SCT vector ๐ป๐ to produce the correlated loss pattern. ๐ปฬ๐ = ๐ป๐ โ ๐ฐ (4) Indirect approach is necessary to embed the correlation factor into the uniform variate. Multivariate normal variate ๐๐~๐(๐, ๐บ) is handy to allow specification of the correlation ๐ in the covariance matrix ๐บ: ๐บ = (1 + ๐)๐ฅ๐ฆ โ๐ผ๐ฆ (5) where ๐ฆ is the number of TGs, ๐ฅ๐ฆ is the all-one matrix, and ๐ผ๐ฆ is the identity matrix. Substituting ๐๐ = {๐๐1 , . . . , ๐๐๐ฆ} into the cumulative distribution function of the standard normal distribution ฮฆ, a set of uniform variates can be obtained: ๐ฐ = ฮฆ(๐๐) (6) where ๐ฐ = {๐ฐ๐1 , . . . , ๐ฐ๐๐ฆ} is the copula of the uniform distribution with correlation coefficient ๐. In the next section, a cyber-insurance principle for estimating the premiums of individual TGs will be introduced.
Authors:
Pikkin Lau, Student Member, IEEE, Lingfeng Wang, Senior Member, IEEE, Wei Wei, Zhaoxi Liu, Member, IEEE, and Chee-Wooi Ten, Senior Member, IEEE
This paper is
