Attack Graph Model for Cyber-Physical Power Systems using Hybrid Deep Learning

Alfan Presekal, Alexandru Stefanov, Vetrivel S. Rajkumar, Peter Palensky

Research output: Contribution to journalArticlepeer-review

21 Citations (Scopus)

Abstract

Electrical power grids are vulnerable to cyber attacks, as seen in Ukraine in 2015 and 2016. However, existing attack detection methods are limited. Most of them are based on power system measurement anomalies that occur when an attack is successfully executed at the later stages of the cyber kill chain. In contrast, the attacks on the Ukrainian power grid show the importance of system-wide, early-stage attack detection through communication-based anomalies. Therefore, in this paper, we propose a novel method for online cyber attack situational awareness that enhances the power grid resilience. It supports power system operators in the identification and localization of active attack locations in Operational Technology (OT) networks in near real-time. The proposed method employs a hybrid deep learning model of Graph Convolutional Long Short-Term Memory (GC-LSTM) and a deep convolutional network for time series classification-based anomaly detection. It is implemented as a combination of software defined networking, anomaly detection in communication throughput, and a novel attack graph model. Results indicate that the proposed method can identify active attack locations, e.g., within substations, control center, and wide area network, with an accuracy above 96%. Hence, it outperforms existing state-of-the-art deep learning-based time series classification methods.

Original languageEnglish
Pages (from-to)1
Number of pages1
JournalIEEE Transactions on Smart Grid
Volume14
Issue number5
DOIs
Publication statusAccepted/In press - 2023

Keywords

  • Anomaly detection
  • anomaly detection
  • cyber-physical system
  • Cyberattack
  • graph neural network
  • Long short term memory
  • network security
  • Power grids
  • Power systems
  • software defined networking
  • Telecommunication traffic
  • Throughput
  • throughput
  • time series analysis

Fingerprint

Dive into the research topics of 'Attack Graph Model for Cyber-Physical Power Systems using Hybrid Deep Learning'. Together they form a unique fingerprint.

Cite this