WO2021034540A1 - Cyber-attack detection for networked electrical power system devices - Google Patents
Cyber-attack detection for networked electrical power system devices Download PDFInfo
- Publication number
- WO2021034540A1 WO2021034540A1 PCT/US2020/045724 US2020045724W WO2021034540A1 WO 2021034540 A1 WO2021034540 A1 WO 2021034540A1 US 2020045724 W US2020045724 W US 2020045724W WO 2021034540 A1 WO2021034540 A1 WO 2021034540A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- neps
- attack
- level
- gateway
- component
- Prior art date
Links
- 238000001514 detection method Methods 0.000 title claims abstract description 76
- 238000000034 method Methods 0.000 claims abstract description 32
- 230000004044 response Effects 0.000 claims abstract description 22
- 230000001010 compromised effect Effects 0.000 claims abstract description 10
- 230000008569 process Effects 0.000 claims abstract description 9
- 238000004891 communication Methods 0.000 claims description 28
- 238000013528 artificial neural network Methods 0.000 claims description 10
- 230000003068 static effect Effects 0.000 claims description 5
- 230000000306 recurrent effect Effects 0.000 claims description 4
- 238000012549 training Methods 0.000 description 14
- 230000006870 function Effects 0.000 description 8
- 230000004048 modification Effects 0.000 description 8
- 238000012986 modification Methods 0.000 description 8
- 238000009420 retrofitting Methods 0.000 description 5
- 238000010801 machine learning Methods 0.000 description 4
- 238000013459 approach Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 238000012544 monitoring process Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 210000002569 neuron Anatomy 0.000 description 2
- 238000004088 simulation Methods 0.000 description 2
- 230000004913 activation Effects 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 230000002457 bidirectional effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000012512 characterization method Methods 0.000 description 1
- 239000000470 constituent Substances 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 238000009413 insulation Methods 0.000 description 1
- 238000002955 isolation Methods 0.000 description 1
- 230000000116 mitigating effect Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/044—Recurrent networks, e.g. Hopfield networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/08—Learning methods
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Definitions
- the present application relates generally to cybersecurity apparatuses, methods, systems, and techniques for networked electrical power system (NEPS) devices and, more particularly, but not exclusively, to real-time cyber-attack detection for NEPS devices via combined profiling of device computation and physics.
- NEPS networked electrical power system
- a multitude of cyber-attack detection and mitigation techniques have been proposed to protect computing and communication network systems.
- a number of such techniques have also been proposed in connection with electrical power systems and devices thereof; however, these efforts face a number of unmet technical challenges and suffer from a number of shortcomings.
- NEPS devices may have limited computing resources which limits the efficacy of conventional approaches.
- NEPS devices may also have limited communication bandwidth and less reliable communication capability that that relied upon by conventional approaches.
- NEPS devices also have unique physical and operational conditions which differ from those assumed by conventional approaches.
- NEPS devices may also require cyber-attack retrofitting or upgrades which exacerbate some of the aforementioned difficulties and pose further difficulties in their own right. There remains a significant need for the unique apparatuses, methods
- a NEPS device includes a tmsted cyber-attack detection (TC D) component comprising pre-trained cyber-attack detection logic which receives a first input indicating a physical state of a NEPS device and a second input indicating a computational state of a computer system of the NEPS device, and determines an attack metric in response to the plurality of inputs.
- the attack metric can indicate whether the NEPS device is in the process of being attacked or whether the NEPS device has been successfully attacked and has been compromised.
- Fig. 1 is a schematic diagram illustrating certain aspects of an example networked electrical power system (NEPS) device.
- NEPS networked electrical power system
- Fig. 2 is a schematic diagram illustrating certain aspects of an example trusted cyber-attack detection (TCAD) component.
- TCAD trusted cyber-attack detection
- FIG. 3 is a schematic diagram illustrating certain aspects of an example system including a multi-layer hierarchy of TCAD components.
- the NEPS device is an inverter 100 comprising inverter circuitry 110 which is operatively coupled with and configured to receive DC power (P dc ) at a DC power input 112, and an operatively coupled with and configured to output AC power (P ac ) at an AC power output 114.
- DC power input 112 is operatively coupled with a first node of an electrical power system (EPS Na) 92.
- EPS Na electrical power system
- DC power input 114 is operatively coupled with a second node of an electrical power system (EPS Nb) 94.
- Inverter circuitry 110 may include a variety of circuit topologies including, for example, H-bridge topologies, single-phase topologies, three-phase topologies, buck-boost topologies, and multilevel topologies among other topologies.
- the inverter 100 is but one example of a NEPS device according to the present disclosure and that a variety of other NEPS devices may be utilized including, for example, converters (e.g ., AC -AC converters, AC -DC converters, bidirectional converters, DC-AC converters or active rectifiers, DC-DC converters, frequency converters, and other types of converters), circuit breakers, switches, drives (e.g., fixed frequency drives, variable frequency drives, and other types of drives), switches, switchgear, and relays, among other examples.
- converters e.g ., AC -AC converters, AC -DC converters, bidirectional converters, DC-AC converters or active rectifiers, DC-DC converters, frequency converters, and other types of converters
- circuit breakers e.g., switches, drives (e.g., fixed frequency drives, variable frequency drives, and other types of drives), switches, switchgear, and relays, among other examples.
- Inverter 100 includes a computer system which is configured to execute a plurality of programs stored in one or more non-transitory computer-readable memory media.
- the computer system comprises an inverter control board 115 which comprises a microprocessor 116, a network interface component 118, and a non-transitory computer-readable memory medium 120 which are operatively coupled with and configured to communicate with one another via a bus 117.
- the computer system may further comprise additional elements which are not depicted to preserve clarity of illustration including, for example, additional digital circuitry, analog circuitry, sensors, signal conditioners, modulators, demodulators, arithmetic logic units (ALUs), central processing units (CPUs), limiters, oscillators, control clocks, amplifiers, signal conditioners, filters, format converters, communication ports, clamps, delay devices, memory devices, analog to digital (A/D) converters, digital to analog (D/A) converters, multiplexers, demultiplexers, modems, and/or different circuitry or components.
- additional digital circuitry analog circuitry, sensors, signal conditioners, modulators, demodulators, arithmetic logic units (ALUs), central processing units (CPUs), limiters, oscillators, control clocks, amplifiers, signal conditioners, filters, format converters, communication ports, clamps, delay devices, memory devices, analog to digital (A/D) converters, digital to analog (D/A) converters, multiplexers, demultiplex
- Microprocessor 116 is configured to access and execute one or more programs stored in non-transitory computer-readable memory medium 120.
- microprocessor 116 is depicted as a single integrated circuit component. It shall be appreciated that the functionality of microprocessor 116 may be provided in multiple integrated circuit components.
- Network interface component 118 is operatively coupled with communication network 109 which may include a local-area network (LAN), one or more gateways, a wide-area network (WAN) up to and including a cloud-based network accessible over the Internet or over one or more private networks.
- LAN local-area network
- WAN wide-area network
- Non-transitory computer-readable memory medium 120 is configured to store a plurality of computer-executable programs.
- the plurality of computer-executable programs include one or more inverter control programs 122 (e.g., a maximum power point tracking (MPPT) control program, or other types of control programs), one or more communication programs 124 which are configured to control communication between the inverter control board and communication network 109 via network interface component 118, one or more security programs 126 which provide security services such as the encryption functions for the secure shell protocol (SSH) and secure copy protocol (SCP), and one or more operating system or kernel programs 128 configured to support operation of other programs.
- the plurality of computer-executable programs may also include a variety of additional or alternate programs 129.
- the plurality of computer-executable programs further includes one or more trusted programs 130 which are configured to provide cyber-attack security capabilities including prediction of, detection of, and protection against cyber-attacks on inverter 100.
- the one or more trusted programs include trusted physical parameter monitoring (TPM) component 132, trusted event monitoring (TEM) component 134, trusted computing monitoring (TCM) component 136, trusted cyber-attack detection (TCAD) component 138 which comprises pre-trained cyber-attack detection logic, and trusted cyber attack countermeasure (TCAC) component 140.
- the one or more trusted programs may also include a variety of additional or alternate trusted components 139.
- TPM component 132 TEM componentl34, TCM component 136, TCAD component 138 TCAC
- trusted components 139 are provided in a single or common structural or logical component.
- a number of different techniques may be utilized to secure the components of trusted programs 130 including, for example, use of encryption, secure or hidden memory locations, secure architectures, secure coding, and other types of hardware-based or software-based security measures.
- TPM component 132 is configured to monitor and provide a trusted output P(t) which quantifies one or more physical parameters of inverter 100 or, in other embodiments, another type of NEPS device.
- physical parameter refers to a physical or operational condition or state of a NEPS device, for example, current, voltage, power, resistance, temperature, and a variety of other physical or operational conditions or states which may be dynamically measured, estimated, or otherwise dynamically determined as well as to rated or nominal characteristics of a NEPS device, for example, rated maximum power, rated temperature, or other rated or nominal physical or operational characteristics which may be static.
- trusted output P(t) may also be considered a trusted input from the point of reference of TCAD 138.
- Output P(t) may be structured as a vector which represents the physical parameters of the inverter 110 at time t.
- physical parameters may include dynamically measured or estimated information such as electrical input information 101 (e.g.,
- electrical output information 102 e.g., AC output power (P ac ), AC output voltage (Vac ), AC output current (I ac ), or other electrical output information
- internal electrical or physical characteristics of the inverter e.g., inverter power consumption (Psei f ) information 103, inverter temperature information (T seif ) information 104 or other internal electrical or physical characteristics of invert
- Such physical parameters may also include static nominal or rated information (sometimes referred to as nameplate information) such as rated efficiency information 106, rated operating voltage information 107, as well as other static parameters 108 pertaining nominal or rated characteristics of the inverter.
- the parameters quantified by P(t) may comprise a set of pre-existing parameters communicated by a telemetry function of inverter 100, in other embodiments, another type of NEPS device.
- the parameters quantified by P(t) may consist essentially of a set of pre-existing parameters communicated by a telemetry function of inverter 100.
- Such forms may be utilized in connection with an upgrade or retrofitting of a cyber- security functionality whereby the extent of hardware addition or replacement, as well as software addition or replacement, may be mitigated or minimized by leveraging previously implemented information capability in the parameters quantified by P(t).
- TEM component 134 is configured to monitor and provide a trusted output E(t) which quantifies one or more alarm events of inverter 100 or, in other embodiments, another type of NEPS device.
- Inverter alarm events may represent undesirable inverter states, warnings, errors, or other conditions warranting a notification of a condition of the inverter or, in other embodiments, another type of NEPS device.
- alarm event E025 is an inverter alarm event that indicates that the isolation resistance of the inverter dipped below a predetermined threshold.
- trusted output E(t) may also be considered a trusted input from the point of reference of TCAD 138.
- Trusted output E(t) may be structured as a vector which represents a set of all events that activated in the last k time units between times (t-k) and t.
- Inverter events may have a duration between an activation time and return to normal time. The duration of inverter events may be accounted for by using a recurrent neural network (RNN) in connection with the pretrained cyber-attack detection logic of TCAD component 138 which will allow early detection, advanced notice, or forecasting of an attack on inverter 100.
- RNN recurrent neural network
- the parameters quantified by E(t) may comprise a set of pre-existing parameters communicated by a telemetry function of inverter 100, in other embodiments, another type of NEPS device.
- the parameters quantified by E(t) may consist essentially of a set of pre-existing parameters communicated by a telemetry function of inverter 100.
- Such forms may be utilized in connection with an upgrade or retrofitting of a cyber- security functionality whereby the extent of hardware addition or replacement as well as software addition or replacement may be mitigated or minimized by leveraging previously implemented information capability in the parameters quantified by E(t).
- TCM component 136 is configured to monitor and provide a trusted output Q(t) which quantifies one or more computing resource usage metrics of inverter control board 115 (or, in other embodiments, another computer system of inverter 100 or of another type of NEPS device). It shall be appreciated that trusted output Q(t) may also be considered a trusted input from the point of reference of TCAD 138.
- Trusted output Q(t) may be structured as a vector representing computer resource metrics such as CPU time, power consumption, RAM consumption, cache hits/misses, or other metrics of computer activity for the set of all programs (PROG) running on the inverter.
- set PROG may comprise the plurality of computer-executable programs including the one or more inverter control programs 122, the one or more communication programs 124, the one or more security programs 126, the one or more operating system or kernel programs 128, the additional or alternate programsl29, and the trusted programs 130 including TPM component 132, TEM component 134, TCM component 136, TCAD component 138, TCAC component 140, and additional or alternate trusted programs 139. It should be appreciated that at a given time t, one or more inputs to PROG may come from P(t).
- the parameters quantified by Q(t) may comprise a set of pre-existing parameters utilized by or available in the operating system, utilities or other programs of inverter 100, in other embodiments, another type of NEPS device.
- the parameters quantified by Q(t) may consist essentially of a set of such pre-existing parameters.
- Such forms may be utilized in connection with an upgrade or retrofitting of a cybersecurity functionality whereby the extent of hardware addition or replacement as well as software addition or replacement may be mitigated or minimized by leveraging previously implemented information capability in the parameters quantified by Q(t).
- TCM component 136 is also configured to monitor and provide a trusted output
- R(t) which quantifies an execution time for one or more execution paths of the plurality of programs provided in inverter control board 115 (or, in other embodiments, another computer system of inverter 100 or of another type of NEPS device).
- a number of execution paths (n) may be defined in PROG whose execution times are monitored.
- a statistical characterization of execution times for each path such as moving average may be maintained and updated over time.
- trusted output R(t) may also be considered a trusted input from the point of reference of TCAD 138.
- Trusted output R(t) may be structured as a vector representing the n moving averages at time t.
- the designation of execution paths n may account for the particulars of a given program.
- one or more critical execution paths for a program may be defined based on knowledge of the structure and function of the program and the expected vulnerability to cyber-attacks.
- critical paths for security programs 126 may be defined for known or potential attacks on the encryption functions for the secure shell protocol (SSH) and secure copy protocol (SCP).
- SSH secure shell protocol
- SCP secure copy protocol
- the parameters quantified by R(t) may comprise a set of pre-existing parameters utilized by or available in the operating system, utilities or other programs of inverter 100, in other embodiments, another type of NEPS device.
- the parameters quantified by R(t) may consist essentially of a set of such pre-existing parameters.
- Such forms may be utilized in connection with an upgrade or retrofitting of a cyber security functionality whereby the extent of hardware addition or replacement as well as software addition or replacement may be mitigated or minimized by leveraging previously implemented information capability in the parameters quantified by R(t).
- TCAD component 138 receives inputs P(t), E(t), Q(t), and R(t), and processes these inputs with pre-trained cyber-attack detection logic to determine and output an attack metric 0(t) which is provided to and evaluated by TCAC component 140 as indicating one of three conditions: (a) the NEPS device is not under attack, (b) the NEPS device is in the process of being attacked, and (c) the NEPS device has been successfully attacked or compromised.
- the values of the attack metric 0(t) indicating conditions (a), (b), and (c) may be predetermined by pre-training the attack detection logic of TCAD component 138 and TCAC component 140 and, in certain embodiments, may be dynamically adapted during operation of TCAD component 138 and TCAC component 140.
- attack metric O(t) indicates either condition (b) or condition (c) the NEPS device has been successfully attacked or compromised, disconnecting the NEPS device from at least one of the electrical power system and the communication network with which it is operatively coupled.
- TCAC component 140 may execute, initiate or trigger a cyber-attack countermeasure. In certain forms, TCAC component 140 may disconnect the NEPS device from the electrical power system with which it operatively coupled, the communication network with which it is operatively coupled, or from both the electrical power system and the communication network.
- the disconnection may be based entirely upon the state of the attack metric of the NEPS device. In certain forms, the disconnection may be partially based upon the state of the attack metric of the NEPS device. In such forms, the disconnection may be further based upon one or more other network attack metrics, for example, one or more gateway-level attack metrics, a cloud-level attack metric, or both. In such forms, the TCAC component 140 may be considered to trigger or initiate a disconnection contingent on the values or states of one or more other network attack metrics. It shall be appreciated references to disconnecting, disconnection or grammatical variations thereof include and encompass such triggering or initiation unless expressly indicated to the contrary.
- Detection logic 200 is one example of attack detection logic that may be provided in or implemented in a TCAD component such as TCAD component 138 of inverter 100 or another TCAD component of a NEPS device.
- Detection logic 200 is one example of a trusted cyber-attack detection logic component that may be trained in an offline ( e.g ., laboratory) environment and thereafter implemented in a computer system of an in-filed, online NEPS device such as inverter 100. After undergoing training, detection logic 200 may be referred to as a pre-trained cyber-attack detection logic.
- Detection logic 200 may be provided in a number of forms.
- detection logic 200 is provided in the form of a neural network 205 including an input layer 210, a neuron layer 220 which may be hidden, and an output layer 230.
- the neural network may be a recurrent neural network (RNN) which facilitates a predictive or prognostic functionality whereby an attack is identified substantially ab initio ⁇ e.g., at the beginning of an attack, shortly after an attack attempt has been initiated, or after an attack has been initiated but in advance of success of the attack).
- RNN recurrent neural network
- detection logic may be provided with alternate supervised machine learning techniques.
- detection logic 200 may be trained by operating a NEPS device, a proxy device, or a simulation of aNEPS device in a controlled environment such as a laboratory under conditions emulating service conditions, for example, a range of ambient temperatures, power levels, etc. During such operation, one or more training programs, either autonomous or human-assisted, will initiate a plurality of different cyber-attack attempts.
- detection logic 200 is provided with inputs P(t), E(t), Q(t), and R(t) as well as with a training feedback input which indicates whether an attack is occurring and which may also indicate the degree of completion or success of the attack.
- detection 200 logic will autonomously or quasi- autonomously develop, establish, modify and organize connections in neuron layer 220 which provide an attack metric 0(t) whose value indicates one of several conditions.
- a first value or set or range of values of attack metric 0(t) may indicate that the NEPS device is not under attack.
- a second value or set or range of values of attack metric 0(t) may indicate that the NEPS device is under attack but not yet compromised including, forecast, predicted, substantially ab initio , and early-stage states of attack.
- a third value or set or range of values of attack metric O(t) may indicate NEPS device has been successfully attacked and is compromised.
- attack metric 0(t) at a given time may be evaluated by one or more logic components 240 which determine whether to initiate a countermeasure or, in some configurations, whether to pass a layer-specific attack metric which may be considered a countermeasure request to another networked device.
- training of detection logic 200 differs from programming in a number of aspects.
- training may include an autonomous or quasi-autonomous development, establishment, modification, and/or organization of the structure and functionality of detection logic 200 which is not known by or readily visible to an autonomous training program or a human-assisted training program.
- detection logic 200 may be implemented in a TCAD component of a field-installed NEPS device such as inverter 100 or another type of NEPS device. This may occur by placing the actual NEPS device which was trained in the field or by providing an instance of pre-trained detection logic in another NEPS device with characteristics that are the same as or similar to those of the training device or simulation. In-service training and adaptation may occur after the NEPS device is installed in the field. For example, values of attack metric O(t) may be compared with other information regarding an in-service attack and detection logic may be updated in response thereto.
- Device layer 310 includes a plurality NEPS devices 310a through 310h, 31 la through 31 In, and potentially additional NEPS devices.
- Each NEPS device of device layer 310 includes a computer system configured with a trusted device-layer program component.
- NEPS devices 310a through 310h are inverters including control boards and device-layer trusted program components which are the same as or similar to inverter control board 115 of inverter 100 and its constituent elements and components.
- computer system and trusted program component may be provided in other forms including one or more of a TPM component, a TEM component, a TCM component, a TCAD component, and a TCAC component.
- Each device-layer trusted program component of the NEPS devices of device layer 310 includes a detection logic, such as a pre-trained neural network or other pre-trained machine learning component, for example, detection logic 200 or the modifications and variants thereof described above.
- NEPS devices 310a through 310h are provided as inverters including inverter control boards B 1 through B ln , respectively.
- the device-layer trusted program component of inverter control boards utilizes trusted outputs P, i (t), . It shall be appreciated that these inputs may have the same or similar attributes as the above-described outputs P(t), E(t), Q(t), and R(t), respectively. It shall be further appreciated that these parameters may be considered outputs or inputs depending on which element of the device-layer trusted program component is utilized as a point of reference.
- device-layer trusted program component of inverter control board / ⁇ determines and outputs an attack metric 0 Bii (t ), which is provided to gateway 320a.
- attack metric 0 Bii (t) may serve as a partial basis for disconnection of inverter control board B tl and/or disconnection of other devices of system 300 contingent on other attack metrics.
- the device-layer trusted program components of other inverter control boards comprise similar characteristics, elements, functions, and operations.
- inverter control board B tl utilizes trusted outputs and determines and outputs an attack metric 0 Bln (t ), which is provided to gateway 320a.
- control board B ln utilizes trusted outputs P /ln (t), R 0G (t), and Q 0G (t) and determines and outputs an attack metric 0 Bln (t ), which is provided to gateway 320n.
- attack metric 0 Bll (t ) may serve as a partial basis for disconnection of inverter control board B and/or disconnection of other devices of system 300 contingent on other attack metrics.
- substantially the same description applies, mutatis mutandis , to device-layer trusted program components of the computer systems of other NEPS devices of NEPS device layer 320.
- Gateway layer 320 includes a plurality gateway devices 310a through 31 On and potentially additional gateway devices.
- Each of the gateway devices of gateway layer 320 includes a control board or other computer system configured with a trusted gateway-layer program component.
- the trusted gateway-layer program components may include a number of components which are the same as or similar to the device-layer trusted program components, for example, a TCM component, a TCAD component, and a TCAC component.
- the trusted gateway-layer program components may include may omit certain aspects of the device-layer trusted program components, for example, one or both of a TPM component and a TEM component.
- the computing devices of gateway devices 320a through 320n are provided as control boards B t through B n. respectively and each include a gateway-level trusted program component comprising a gateway-layer detection logic, such as a pre-trained neural network or other pre-trained machine-learning component.
- the gateway-layer attack detection logic may be structured, trained, and operated in a manner similar to that described in connection with detection logic 200 or the modifications and variants thereof described above, but with modifications accounting for the difference in training between gateway devices and NEPS devices.
- gateway-layer attack detection logic of gateway control board 320a receives and uses as inputs, attack metrics 0 Bll (t) through 0 Bin (t) which are received from NEPS devices 310a through 310h, as well as trusted outputs R B p « 0G (t) and Q ⁇ 0G (t) which are determined and utilized by gateway control board 320a in a manner analogous to the trusted outputs Q(t) and R(t) described above.
- gateway-layer attack detection logic of gateway control board 320a determines and outputs a gateway-layer attack metric 0 Bi (t ), which is provided to cloud detection unit 330.
- gateway-layer attack metric 0 Bl (t) may serve as a partial basis for disconnection of one or more inverter control boards, gateway control boards or other computer systems of system 300 contingent on other attack metrics.
- gateway-layer attack detection logic of gateway control board 320n receives and uses as inputs, attack metrics 0 Bin (t) through 0 Bln (t) which are received from NEPS devices 31 la through 31 In, as well as trusted outputs (t) which are determined and utilized by gateway control board 320n in a manner analogous to the trusted outputs Q(t) and R(t) described above.
- gateway-layer attack detection logic of gateway control board 320n determines and outputs a gateway-layer attack metric 0 Bn (t ), which is provided to cloud detection unit 331.
- gateway-layer attack metric 0 Bn (t ) may serve as a partial basis for disconnection of one or more inverter control boards, gateway control boards or other computer systems of system 300 contingent on other attack metrics.
- Can layer 330 comprises a cloud-based computer system including cloud detection unit 331 which is configured with a trusted cloud-layer program component.
- the trusted cloud-layer program components may include a number of components which are the same as or similar to the device-layer trusted program components, for example, a TCAD component and a TCAC component.
- the trusted cloud-layer program components may include may omit certain aspects of the device-layer trusted program components, for example, one or more of a TCM component, of a TPM component and a TEM component.
- Cloud detection unit includes a cloud-level trusted program component comprising a gateway-layer detection logic, such as a pre-trained neural network or other pre trained machine-learning component.
- the cloud -layer attack detection logic may be structured, trained, and operated in a manner similar to that described in connection with detection logic 200 or the modifications and variants thereof described above, but with modifications accounting for the difference between cloud devices and NEPS devices.
- the ultimate decision on disconnection of NEPS devices and/or gateways may be vested in the cloud-layer attack detection logic.
- the cloud- layer attack detection logic may exercise supervisory or override authority over the gateway- layer attack detection logic and/or the device-layer attack detection logic providing a system which may initiate and execute disconnection from any of multiple attack detection logic implementations which may be provided at different hierarchical layers of system 300.
- the disconnection may be partially based upon the output of the device-layer attack detection logic of one or more NEPS devices, the gateway-layer attack detection logic of one or more gateway devices, and the cloud-layer attack detection logic.
- the distributed architecture of system 300 can detect isolated attacks on single inverters or a plant as well as coordinated attacks across plants, portfolios, or regions. Trusted attack detection logic at each layer, such as layer-specific neural networks, are trained using simulated attacks in the laboratory and operated in combination when installed in the field. Additionally, from the foregoing description, the hierarchical aspects of system 300 may be understood. In one aspect, different control boards deployed on different levels will get inputs from different entities. For example, network-layer trusted program component control board B 1 will receive and utilize the outputs (t) . The gateway-layer trusted program component of gateway control board B 1 will receive and utilize the outputs 0 Bll (t), Q B 0G (t).
- the cloud-layer trusted program component of cloud detection unit 340 will receive and utilize the outputs 0 Bl (t), ... , 0 Bn (t) .
- This hierarchical or tree-type architecture may be configured unidirectionally so that only the higher level gateway nodes can access the model data or system parameters of lower-level gateways or inverters.
- a first example embodiment is a method comprising: providing a networked electrical power system (NEPS) device operatively coupled with an electrical power system and a communication network and including an electrical input, an electrical output, and a computer system configured to execute a plurality of programs stored in one or more non-transitory computer-readable memory media, the plurality of programs including a trusted cyber-attack detection (TCAD) component including pre-trained cyber-attack detection logic; receiving with the TCAD component a plurality of inputs including at least a first input indicating a physical parameter of the NEPS device and a second input indicating a computational state of the computer system; determining with the pre trained cyber-attack detection logic of the TCAD component an attack metric in response to the plurality of inputs, the attack metric indicating one of: (a) the NEPS device is not under attack,
- TCAD trusted cyber-attack detection
- the plurality of inputs received with the TCAD component comprise one or more of: a first input quantifying one or more physical parameters of the NEPS device, a second input quantifying one or more computing resource usage metrics of the computer system, a third input quantifying an execution time for one or more execution paths of the plurality of programs, and a fourth input quantifying one or more alarm events for the NEPS device.
- the first input comprises a vector P(t) representing a plurality of physical parameters of the NEPS device at a time t.
- the plurality of physical parameters of the NEPS device include dynamically determined information about at least one physical or operational state of the NEPS device and static information about at least one nominal or rated characteristic of the NEPS device.
- the second input comprises a vector Q(t) representing the one or more net computing resource usage metrics utilized at a time t by a set of programs comprising all of the executable programs of the computer system.
- the third input comprises a vector R(t) representing a moving average of execution time for a plurality of predetermined execution paths of the plurality of programs.
- the fourth input comprises a vector E(t) representing a set of all alarm events of the NEPS device activated over a range of a past time to a current time.
- the TCAD component includes a recurrent neural network configured to provide an advance prediction of a cyberattack.
- Certain forms of the first example embodiment comprise: providing a plurality of network gateways each operatively coupled with a plurality of NEPS devices, the plurality of NEPS devices including said NEPS device, providing a device-level attack metric from each of the plurality of NEPS devices to at least one of the plurality of network gateways, the device level attack metric including said attack metric, and determining with a gateway-level TCAD component of each of the plurality of network gateways a gateway-level attack metric in response to the plurality of device-level attack metrics and at least a gateway-level input indicating a computational state of the gateway; wherein the act of triggering disconnection of the NEPS device is further based upon one or more of the gateway-level attack metrics.
- Certain further forms comprise providing a cloud-level TCAD component operatively coupled with the plurality of network gateways, wherein the cloud-level TCAD component is configured to: receive a plurality of the gateway-level attack metrics, and determine and output a cloud-level attack metric in response to the plurality gateway-level attack metrics; wherein the act of triggering disconnection of the NEPS device is further based upon the cloud-level attack metric.
- a second example embodiment is a system comprising: a networked electrical power system (NEPS) device including an electrical input and an electrical output structured to be coupled with an electrical power system and a computer system structured to be coupled with a communication network and configured to execute a plurality of programs stored in one or more non-transitory computer-readable memory media, the plurality of programs including a tmsted cyber-attack detection (TCAD) component including pre-trained cyber-attack detection logic configured to: receive a plurality of inputs including at least a first input indicating a physical parameter of the NEPS device and a second input indicating a computational state of the computer system; determine an attack metric in response to the plurality of inputs; and initiate disconnection of the NEPS device from at least one of the electrical power system and the communication network at least partially based upon the attack metric indicating that the NEPS device is in the process of being attacked or that the NEPS device has been successfully attacked.
- TCAD tmsted cyber-attack detection
- the plurality of inputs comprise one or more of: a first input indicating one or more physical parameters of the NEPS device, a second input indicating one or more computing resource usage metrics of the computer system, a third input indicating an execution time for one or more execution paths of the plurality of programs, and a fourth input indicating one or more alarm events for the NEPS device.
- Certain forms of the second example embodiment comprise a plurality of network gateways each operatively coupled with one or more of a plurality of NEPS devices, wherein [0050] each of the plurality of NEPS devices is configured to provide a device-level attack metric to at least one of the plurality of gateways, and each of the plurality of gateways includes a respective gateway-level TCAD component including gateway-level pre-trained cyber-attack detection logic configured to: receive one or more of the device-level attack metrics, and determine a gateway-level attack metric in response to the plurality of the respective device-level attack metrics and at least a gateway-level input indicating a computational state of the gateway; wherein disconnection of the NEPS device from at least one of the electrical power system and the communication network is further initiated by the gateway-level attack metric.
- Certain further forms comprise a cloud-level TCAD component operatively coupled with the plurality of network gateways, wherein the cloud-level TCAD component is configured to: receive a plurality of the gateway-level attack metrics, and determine and output a cloud-level attack metric in response to the plurality gateway-level attack metrics; wherein disconnection of the NEPS device from at least one of the electrical power system and the communication network is further initiated by the cloud-level attack metric.
- a third example embodiment is a networked electrical power system (NEPS) device comprising: an electrical input and an electrical output structured to be coupled with an electrical power system; and a computer system structured to be coupled with a communication network and configured to execute a plurality of programs stored in one or more non-transitory computer-readable memory media, the plurality of programs including a trusted cyber-attack detection (TCAD) component including pre-trained cyber-attack detection logic configured to: receive a plurality of inputs including at least a first input indicating a physical parameter of the NEPS device and a second input indicating a computational state of the computer system; determine an attack metric in response to the plurality of inputs and attack metric; and disconnect the NEPS device from at least one of the electrical power system and the communication network with which it is operatively coupled at least partially based upon the attack metric indicating that the NEPS device is in the process of being attacked or that the NEPS device has been successfully attacked.
- TCAD trusted cyber-attack detection
- the plurality of inputs received with the TCAD component comprise one or more of a first input indicating one or more physical parameters of the NEPS device, a second input indicating one or more computing resource usage metrics of the computer system, a third input indicating an of execution time for one or more execution paths of the plurality of programs, and a fourth input indicating one or more alarm events for the NEPS device.
- the second input comprises a vector Q(t) representing the or more net computing resource usage metrics utilized at the time t by a set of programs of the executable programs of the computer system.
- the third input comprises a vector R(t) representing a moving average as of the time t of execution time for a plurality of predetermined execution paths of the plurality of programs.
- the fourth input comprises a vector E(t) representing a set of all alarm events as of the time t of the NEPS device activated over a range of time.
- the NEPS device comprises an inverter. In certain forms of the second example embodiment, the NEPS device comprises an inverter. In certain forms of the third example embodiment, the NEPS device comprises an inverter.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Molecular Biology (AREA)
- Data Mining & Analysis (AREA)
- Computational Linguistics (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Evolutionary Computation (AREA)
- Biophysics (AREA)
- Biomedical Technology (AREA)
- Artificial Intelligence (AREA)
- Life Sciences & Earth Sciences (AREA)
- Health & Medical Sciences (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Apparatuses, methods, systems, and techniques for detecting and effecting countermeasures against cyber-attacks on networked electrical power system (NEPS) devices include a trusted cyber-attack detection (TCAD) component including pre-trained cyber-attack detection logic which receives a first input indicating a physical parameter of a NEPS device and a second input indicating a computational state of a computer system of the NEPS device, determines an attack metric in response to the plurality of inputs. The attack metric can indicate whether the NEPS device is in the process of being attacked or whether the NEPS device has been successfully attacked and has been compromised.
Description
CYBER-ATTACK DETECTION FOR NETWORKED ELECTRICAL POWER SYSTEM
DEVICES
BACKGROUND
[0001] The present application relates generally to cybersecurity apparatuses, methods, systems, and techniques for networked electrical power system (NEPS) devices and, more particularly, but not exclusively, to real-time cyber-attack detection for NEPS devices via combined profiling of device computation and physics. A multitude of cyber-attack detection and mitigation techniques have been proposed to protect computing and communication network systems. A number of such techniques have also been proposed in connection with electrical power systems and devices thereof; however, these efforts face a number of unmet technical challenges and suffer from a number of shortcomings. For example, NEPS devices may have limited computing resources which limits the efficacy of conventional approaches. NEPS devices may also have limited communication bandwidth and less reliable communication capability that that relied upon by conventional approaches. NEPS devices also have unique physical and operational conditions which differ from those assumed by conventional approaches. NEPS devices may also require cyber-attack retrofitting or upgrades which exacerbate some of the aforementioned difficulties and pose further difficulties in their own right. There remains a significant need for the unique apparatuses, methods, systems, and techniques disclosed herein.
DISCLOSURE OF ILLUSTRATIVE EMBODIMENTS [0002] For the purposes of clearly, concisely and exactly describing illustrative embodiments of the present disclosure, the manner, and process of making and using the same, and to enable the practice, making and use of the same, reference will now be made to certain exemplary embodiments, including those illustrated in the figures, and specific language will be used to describe the same. It shall nevertheless be understood that no limitation of the scope of the invention is thereby created and that the invention includes and protects such alterations, modifications, and further applications of the exemplary embodiments as would occur to one skilled in the art.
SUMMARY OF THE DISCLOSURE
[0003] Apparatuses, methods, systems, and techniques for detecting and effecting countermeasures against cyber-attacks on networked electrical power system (NEPS) devices are disclosed. In certain forms, a NEPS device includes a tmsted cyber-attack detection (TC D) component comprising pre-trained cyber-attack detection logic which receives a first input indicating a physical state of a NEPS device and a second input indicating a computational state of a computer system of the NEPS device, and determines an attack metric in response to the plurality of inputs. The attack metric can indicate whether the NEPS device is in the process of being attacked or whether the NEPS device has been successfully attacked and has been compromised. Further embodiments, forms, objects, features, advantages, aspects, and benefits shall become apparent from the following description and drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
[0004] Fig. 1 is a schematic diagram illustrating certain aspects of an example networked electrical power system (NEPS) device.
[0005] Fig. 2 is a schematic diagram illustrating certain aspects of an example trusted cyber-attack detection (TCAD) component.
[0006] Fig. 3 is a schematic diagram illustrating certain aspects of an example system including a multi-layer hierarchy of TCAD components.
DETAILED DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS
[0007] With reference to Fig. 1, there is illustrated an example networked electrical power system (NEPS) device which may be any of a number of types of power electronics devices utilized in transmission, distribution, control, and/or provision of electrical power on the scale of a power grid, industrial facility, commercial building, or residential building. In the illustrated example, the NEPS device is an inverter 100 comprising inverter circuitry 110 which is operatively coupled with and configured to receive DC power (Pdc) at a DC power input 112, and an operatively coupled with and configured to output AC power (Pac) at an AC power output 114. DC power input 112 is operatively coupled with a first node of an electrical power system (EPS Na) 92. DC power input 114 is operatively coupled with a second node of an electrical power system (EPS Nb) 94. Inverter circuitry 110 may include a variety of circuit topologies including, for example, H-bridge topologies, single-phase topologies, three-phase topologies, buck-boost topologies, and multilevel topologies among other topologies.
[0008] It shall be appreciated that the inverter 100 is but one example of a NEPS device according to the present disclosure and that a variety of other NEPS devices may be utilized including, for example, converters ( e.g ., AC -AC converters, AC -DC converters, bidirectional converters, DC-AC converters or active rectifiers, DC-DC converters, frequency converters, and other types of converters), circuit breakers, switches, drives (e.g., fixed frequency drives, variable frequency drives, and other types of drives), switches, switchgear, and relays, among other examples.
[0009] Inverter 100 includes a computer system which is configured to execute a plurality of programs stored in one or more non-transitory computer-readable memory media. In the illustrated embodiment, the computer system comprises an inverter control board 115 which comprises a microprocessor 116, a network interface component 118, and a non-transitory computer-readable memory medium 120 which are operatively coupled with and configured to communicate with one another via a bus 117. The computer system may further comprise additional elements which are not depicted to preserve clarity of illustration including, for example, additional digital circuitry, analog circuitry, sensors, signal conditioners, modulators, demodulators, arithmetic logic units (ALUs), central processing units (CPUs), limiters, oscillators, control clocks, amplifiers, signal conditioners, filters, format converters,
communication ports, clamps, delay devices, memory devices, analog to digital (A/D) converters, digital to analog (D/A) converters, multiplexers, demultiplexers, modems, and/or different circuitry or components.
[0010] Microprocessor 116 is configured to access and execute one or more programs stored in non-transitory computer-readable memory medium 120. In the illustrated embodiment, microprocessor 116 is depicted as a single integrated circuit component. It shall be appreciated that the functionality of microprocessor 116 may be provided in multiple integrated circuit components. Network interface component 118 is operatively coupled with communication network 109 which may include a local-area network (LAN), one or more gateways, a wide-area network (WAN) up to and including a cloud-based network accessible over the Internet or over one or more private networks.
[0011] Non-transitory computer-readable memory medium 120 is configured to store a plurality of computer-executable programs. In the illustrated embodiment, the plurality of computer-executable programs include one or more inverter control programs 122 (e.g., a maximum power point tracking (MPPT) control program, or other types of control programs), one or more communication programs 124 which are configured to control communication between the inverter control board and communication network 109 via network interface component 118, one or more security programs 126 which provide security services such as the encryption functions for the secure shell protocol (SSH) and secure copy protocol (SCP), and one or more operating system or kernel programs 128 configured to support operation of other programs. The plurality of computer-executable programs may also include a variety of additional or alternate programs 129.
[0012] The plurality of computer-executable programs further includes one or more trusted programs 130 which are configured to provide cyber-attack security capabilities including prediction of, detection of, and protection against cyber-attacks on inverter 100. In the illustrated embodiment the one or more trusted programs include trusted physical parameter monitoring (TPM) component 132, trusted event monitoring (TEM) component 134, trusted computing monitoring (TCM) component 136, trusted cyber-attack detection (TCAD) component 138 which comprises pre-trained cyber-attack detection logic, and trusted cyber attack countermeasure (TCAC) component 140. The one or more trusted programs may also
include a variety of additional or alternate trusted components 139. It shall be appreciated that the foregoing components may be provided in combined implementations in which combinations of one or more of TPM component 132, TEM componentl34, TCM component 136, TCAD component 138 TCAC) component 140 or other trusted components 139 are provided in a single or common structural or logical component. It shall be further appreciated that a number of different techniques may be utilized to secure the components of trusted programs 130 including, for example, use of encryption, secure or hidden memory locations, secure architectures, secure coding, and other types of hardware-based or software-based security measures.
[0013] TPM component 132 is configured to monitor and provide a trusted output P(t) which quantifies one or more physical parameters of inverter 100 or, in other embodiments, another type of NEPS device. It shall be appreciated that the term physical parameter refers to a physical or operational condition or state of a NEPS device, for example, current, voltage, power, resistance, temperature, and a variety of other physical or operational conditions or states which may be dynamically measured, estimated, or otherwise dynamically determined as well as to rated or nominal characteristics of a NEPS device, for example, rated maximum power, rated temperature, or other rated or nominal physical or operational characteristics which may be static. It shall be further appreciated that trusted output P(t) may also be considered a trusted input from the point of reference of TCAD 138.
[0014] Output P(t) may be structured as a vector which represents the physical parameters of the inverter 110 at time t. As noted above, such physical parameters may include dynamically measured or estimated information such as electrical input information 101 (e.g.,
DC input power (Pdc), DC input voltage (Vdc ), DC input current (Idc), or other electrical input information), electrical output information 102 (e.g., AC output power (Pac), AC output voltage (Vac ), AC output current (Iac), or other electrical output information), and internal electrical or physical characteristics of the inverter (e.g., inverter power consumption (Pseif) information 103, inverter temperature information (Tseif) information 104 or other internal electrical or physical characteristics of inverter 100 or its environment such as inverter insulation resistance or ambient temperature). Such physical parameters may also include static nominal or rated information (sometimes referred to as nameplate information) such as rated efficiency information 106, rated operating voltage information 107, as well as other static parameters 108 pertaining nominal or rated characteristics of the inverter.
[0015] In certain embodiments, the parameters quantified by P(t) may comprise a set of pre-existing parameters communicated by a telemetry function of inverter 100, in other embodiments, another type of NEPS device. In certain such forms, the parameters quantified by P(t) may consist essentially of a set of pre-existing parameters communicated by a telemetry function of inverter 100. Such forms may be utilized in connection with an upgrade or retrofitting of a cyber- security functionality whereby the extent of hardware addition or replacement, as well as software addition or replacement, may be mitigated or minimized by leveraging previously implemented information capability in the parameters quantified by P(t).
[0016] TEM component 134 is configured to monitor and provide a trusted output E(t) which quantifies one or more alarm events of inverter 100 or, in other embodiments, another type of NEPS device. Inverter alarm events may represent undesirable inverter states, warnings, errors, or other conditions warranting a notification of a condition of the inverter or, in other embodiments, another type of NEPS device. For example, alarm event E025 is an inverter alarm event that indicates that the isolation resistance of the inverter dipped below a predetermined threshold. It shall be appreciated that trusted output E(t) may also be considered a trusted input from the point of reference of TCAD 138.
[0017] Trusted output E(t) may be structured as a vector which represents a set of all events that activated in the last k time units between times (t-k) and t. Inverter events may have a duration between an activation time and return to normal time. The duration of inverter events may be accounted for by using a recurrent neural network (RNN) in connection with the pretrained cyber-attack detection logic of TCAD component 138 which will allow early detection, advanced notice, or forecasting of an attack on inverter 100.
[0018] In certain embodiments, the parameters quantified by E(t) may comprise a set of pre-existing parameters communicated by a telemetry function of inverter 100, in other embodiments, another type of NEPS device. In certain such forms, the parameters quantified by E(t) may consist essentially of a set of pre-existing parameters communicated by a telemetry function of inverter 100. Such forms may be utilized in connection with an upgrade or retrofitting of a cyber- security functionality whereby the extent of hardware addition or replacement as well as software addition or replacement may be mitigated or minimized by leveraging previously implemented information capability in the parameters quantified by E(t).
[0019] TCM component 136 is configured to monitor and provide a trusted output Q(t) which quantifies one or more computing resource usage metrics of inverter control board 115 (or, in other embodiments, another computer system of inverter 100 or of another type of NEPS device). It shall be appreciated that trusted output Q(t) may also be considered a trusted input from the point of reference of TCAD 138.
[0020] Trusted output Q(t) may be structured as a vector representing computer resource metrics such as CPU time, power consumption, RAM consumption, cache hits/misses, or other metrics of computer activity for the set of all programs (PROG) running on the inverter. In the illustrated embodiment set PROG may comprise the plurality of computer-executable programs including the one or more inverter control programs 122, the one or more communication programs 124, the one or more security programs 126, the one or more operating system or kernel programs 128, the additional or alternate programsl29, and the trusted programs 130 including TPM component 132, TEM component 134, TCM component 136, TCAD component 138, TCAC component 140, and additional or alternate trusted programs 139. It should be appreciated that at a given time t, one or more inputs to PROG may come from P(t).
[0021] In certain embodiments, the parameters quantified by Q(t) may comprise a set of pre-existing parameters utilized by or available in the operating system, utilities or other programs of inverter 100, in other embodiments, another type of NEPS device. In certain such forms, the parameters quantified by Q(t) may consist essentially of a set of such pre-existing parameters. Such forms may be utilized in connection with an upgrade or retrofitting of a cybersecurity functionality whereby the extent of hardware addition or replacement as well as software addition or replacement may be mitigated or minimized by leveraging previously implemented information capability in the parameters quantified by Q(t).
[0022] TCM component 136 is also configured to monitor and provide a trusted output
R(t) which quantifies an execution time for one or more execution paths of the plurality of programs provided in inverter control board 115 (or, in other embodiments, another computer system of inverter 100 or of another type of NEPS device). A number of execution paths (n) may be defined in PROG whose execution times are monitored. A statistical characterization of execution times for each path such as moving average may be maintained and updated over time.
It shall be appreciated that trusted output R(t) may also be considered a trusted input from the point of reference of TCAD 138.
[0023] Trusted output R(t) may be structured as a vector representing the n moving averages at time t. The designation of execution paths n may account for the particulars of a given program. For a given program, one or more critical execution paths for a program may be defined based on knowledge of the structure and function of the program and the expected vulnerability to cyber-attacks. For example, critical paths for security programs 126 may be defined for known or potential attacks on the encryption functions for the secure shell protocol (SSH) and secure copy protocol (SCP).
[0024] In certain embodiments, the parameters quantified by R(t) may comprise a set of pre-existing parameters utilized by or available in the operating system, utilities or other programs of inverter 100, in other embodiments, another type of NEPS device. In certain such forms, the parameters quantified by R(t) may consist essentially of a set of such pre-existing parameters. Such forms may be utilized in connection with an upgrade or retrofitting of a cyber security functionality whereby the extent of hardware addition or replacement as well as software addition or replacement may be mitigated or minimized by leveraging previously implemented information capability in the parameters quantified by R(t).
[0025] TCAD component 138 receives inputs P(t), E(t), Q(t), and R(t), and processes these inputs with pre-trained cyber-attack detection logic to determine and output an attack metric 0(t) which is provided to and evaluated by TCAC component 140 as indicating one of three conditions: (a) the NEPS device is not under attack, (b) the NEPS device is in the process of being attacked, and (c) the NEPS device has been successfully attacked or compromised. The values of the attack metric 0(t) indicating conditions (a), (b), and (c) may be predetermined by pre-training the attack detection logic of TCAD component 138 and TCAC component 140 and, in certain embodiments, may be dynamically adapted during operation of TCAD component 138 and TCAC component 140.
[0026] If the attack metric O(t) indicates either condition (b) or condition (c) the NEPS device has been successfully attacked or compromised, disconnecting the NEPS device from at least one of the electrical power system and the communication network with which it is operatively coupled. In response to attack metric O(t) indicating either condition (b) or condition
(c), TCAC component 140 may execute, initiate or trigger a cyber-attack countermeasure. In certain forms, TCAC component 140 may disconnect the NEPS device from the electrical power system with which it operatively coupled, the communication network with which it is operatively coupled, or from both the electrical power system and the communication network.
In certain forms, the disconnection may be based entirely upon the state of the attack metric of the NEPS device. In certain forms, the disconnection may be partially based upon the state of the attack metric of the NEPS device. In such forms, the disconnection may be further based upon one or more other network attack metrics, for example, one or more gateway-level attack metrics, a cloud-level attack metric, or both. In such forms, the TCAC component 140 may be considered to trigger or initiate a disconnection contingent on the values or states of one or more other network attack metrics. It shall be appreciated references to disconnecting, disconnection or grammatical variations thereof include and encompass such triggering or initiation unless expressly indicated to the contrary.
[0027] With reference to Fig. 2, there is illustrated trusted cyber-attack detection logic
200 (sometimes referred to as “detection logic”) which is one example of attack detection logic that may be provided in or implemented in a TCAD component such as TCAD component 138 of inverter 100 or another TCAD component of a NEPS device. Detection logic 200 is one example of a trusted cyber-attack detection logic component that may be trained in an offline ( e.g ., laboratory) environment and thereafter implemented in a computer system of an in-filed, online NEPS device such as inverter 100. After undergoing training, detection logic 200 may be referred to as a pre-trained cyber-attack detection logic.
[0028] Detection logic 200 may be provided in a number of forms. In the illustrated embodiment, detection logic 200 is provided in the form of a neural network 205 including an input layer 210, a neuron layer 220 which may be hidden, and an output layer 230. In certain forms, the neural network may be a recurrent neural network (RNN) which facilitates a predictive or prognostic functionality whereby an attack is identified substantially ab initio {e.g., at the beginning of an attack, shortly after an attack attempt has been initiated, or after an attack has been initiated but in advance of success of the attack). In other embodiments, detection logic may be provided with alternate supervised machine learning techniques.
[0029] With continuing reference to Fig. 2, during a training operation, detection logic
200 may be trained by operating a NEPS device, a proxy device, or a simulation of aNEPS device in a controlled environment such as a laboratory under conditions emulating service conditions, for example, a range of ambient temperatures, power levels, etc. During such operation, one or more training programs, either autonomous or human-assisted, will initiate a plurality of different cyber-attack attempts. During training, detection logic 200 is provided with inputs P(t), E(t), Q(t), and R(t) as well as with a training feedback input which indicates whether an attack is occurring and which may also indicate the degree of completion or success of the attack.
[0030] In response to the received inputs, detection 200 logic will autonomously or quasi- autonomously develop, establish, modify and organize connections in neuron layer 220 which provide an attack metric 0(t) whose value indicates one of several conditions. A first value or set or range of values of attack metric 0(t) may indicate that the NEPS device is not under attack. A second value or set or range of values of attack metric 0(t) may indicate that the NEPS device is under attack but not yet compromised including, forecast, predicted, substantially ab initio , and early-stage states of attack. A third value or set or range of values of attack metric O(t) may indicate NEPS device has been successfully attacked and is compromised. The value of attack metric 0(t) at a given time may be evaluated by one or more logic components 240 which determine whether to initiate a countermeasure or, in some configurations, whether to pass a layer-specific attack metric which may be considered a countermeasure request to another networked device.
[0031] It shall be appreciated that the training of detection logic 200 differs from programming in a number of aspects. For example, training may include an autonomous or quasi-autonomous development, establishment, modification, and/or organization of the structure and functionality of detection logic 200 which is not known by or readily visible to an autonomous training program or a human-assisted training program.
[0032] Once training has occurred, detection logic 200 may be implemented in a TCAD component of a field-installed NEPS device such as inverter 100 or another type of NEPS device. This may occur by placing the actual NEPS device which was trained in the field or by providing an instance of pre-trained detection logic in another NEPS device with characteristics
that are the same as or similar to those of the training device or simulation. In-service training and adaptation may occur after the NEPS device is installed in the field. For example, values of attack metric O(t) may be compared with other information regarding an in-service attack and detection logic may be updated in response thereto.
[0033] With reference to Fig. 3, there is illustrated an example system 300 including a device layer 310, a gateway layer 320 and a could layer 330. Device layer 310 includes a plurality NEPS devices 310a through 310h, 31 la through 31 In, and potentially additional NEPS devices. Each NEPS device of device layer 310 includes a computer system configured with a trusted device-layer program component. In the illustrated embodiment, NEPS devices 310a through 310h are inverters including control boards and device-layer trusted program components which are the same as or similar to inverter control board 115 of inverter 100 and its constituent elements and components. In other embodiments computer system and trusted program component may be provided in other forms including one or more of a TPM component, a TEM component, a TCM component, a TCAD component, and a TCAC component. Each device-layer trusted program component of the NEPS devices of device layer 310 includes a detection logic, such as a pre-trained neural network or other pre-trained machine learning component, for example, detection logic 200 or the modifications and variants thereof described above.
[0034] In the illustrated embodiment, NEPS devices 310a through 310h are provided as inverters including inverter control boards B1 through Bln, respectively. The device-layer trusted program component of inverter control boards
utilizes trusted outputs P,i (t),
. It shall be appreciated that these inputs may have the same or similar attributes as the above-described outputs P(t), E(t), Q(t), and R(t), respectively. It shall be further appreciated that these parameters may be considered outputs or inputs depending on which element of the device-layer trusted program component is utilized as a point of reference. In response to these outputs, device-layer trusted program component of inverter control board /^determines and outputs an attack metric 0Bii(t ), which is provided to gateway 320a. As noted above, attack metric 0Bii(t) may serve as a partial basis for disconnection of inverter control board Btl and/or disconnection of other devices of system 300 contingent on other attack metrics.
[0035] The device-layer trusted program components of other inverter control boards comprise similar characteristics, elements, functions, and operations. Thus, for example, inverter control board Btl utilizes trusted outputs
and determines and outputs an attack metric 0Bln(t ), which is provided to gateway 320a. Similarly, control board Bln utilizes trusted outputs P/ln(t),
R 0G(t), and Q 0G(t) and determines and outputs an attack metric 0Bln(t ), which is provided to gateway 320n. As noted above, attack metric 0Bll(t ) may serve as a partial basis for disconnection of inverter control board B and/or disconnection of other devices of system 300 contingent on other attack metrics. Furthermore, it shall be appreciated that substantially the same description applies, mutatis mutandis , to device-layer trusted program components of the computer systems of other NEPS devices of NEPS device layer 320.
[0036] Gateway layer 320 includes a plurality gateway devices 310a through 31 On and potentially additional gateway devices. Each of the gateway devices of gateway layer 320 includes a control board or other computer system configured with a trusted gateway-layer program component. The trusted gateway-layer program components may include a number of components which are the same as or similar to the device-layer trusted program components, for example, a TCM component, a TCAD component, and a TCAC component. In some forms, the trusted gateway-layer program components may include may omit certain aspects of the device-layer trusted program components, for example, one or both of a TPM component and a TEM component.
[0037] In the illustrated embodiment, the computing devices of gateway devices 320a through 320n are provided as control boards Bt through Bn. respectively and each include a gateway-level trusted program component comprising a gateway-layer detection logic, such as a pre-trained neural network or other pre-trained machine-learning component. The gateway-layer attack detection logic may be structured, trained, and operated in a manner similar to that described in connection with detection logic 200 or the modifications and variants thereof described above, but with modifications accounting for the difference in training between gateway devices and NEPS devices.
[0038] The structure, training, and operation of the gateway-layer attack detection logic of gateway control board 320a receives and uses as inputs, attack metrics 0Bll(t) through
0Bin(t) which are received from NEPS devices 310a through 310h, as well as trusted outputs RB p«0G(t) and Q^0G(t) which are determined and utilized by gateway control board 320a in a manner analogous to the trusted outputs Q(t) and R(t) described above. In response to the aforementioned attack metrics and trusted outputs, gateway-layer attack detection logic of gateway control board 320a determines and outputs a gateway-layer attack metric 0Bi(t ), which is provided to cloud detection unit 330. As noted above, gateway-layer attack metric 0Bl(t) may serve as a partial basis for disconnection of one or more inverter control boards, gateway control boards or other computer systems of system 300 contingent on other attack metrics.
[0039] The structure, training, and operation of the gateway-layer attack detection logic of gateway control board 320n receives and uses as inputs, attack metrics 0Bin(t) through 0Bln(t) which are received from NEPS devices 31 la through 31 In, as well as trusted outputs
(t) which are determined and utilized by gateway control board 320n in a manner analogous to the trusted outputs Q(t) and R(t) described above. In response to the aforementioned attack metrics and trusted outputs, gateway-layer attack detection logic of gateway control board 320n determines and outputs a gateway-layer attack metric 0Bn(t ), which is provided to cloud detection unit 331. As noted above, gateway-layer attack metric 0Bn(t ) may serve as a partial basis for disconnection of one or more inverter control boards, gateway control boards or other computer systems of system 300 contingent on other attack metrics.
[0040] Could layer 330 comprises a cloud-based computer system including cloud detection unit 331 which is configured with a trusted cloud-layer program component. The trusted cloud-layer program components may include a number of components which are the same as or similar to the device-layer trusted program components, for example, a TCAD component and a TCAC component. In some forms, the trusted cloud-layer program components may include may omit certain aspects of the device-layer trusted program components, for example, one or more of a TCM component, of a TPM component and a TEM component.
[0041] Cloud detection unit includes a cloud-level trusted program component comprising a gateway-layer detection logic, such as a pre-trained neural network or other pre trained machine-learning component. The cloud -layer attack detection logic may be structured,
trained, and operated in a manner similar to that described in connection with detection logic 200 or the modifications and variants thereof described above, but with modifications accounting for the difference between cloud devices and NEPS devices.
[0042] In certain forms, the ultimate decision on disconnection of NEPS devices and/or gateways may be vested in the cloud-layer attack detection logic. In certain forms, the cloud- layer attack detection logic may exercise supervisory or override authority over the gateway- layer attack detection logic and/or the device-layer attack detection logic providing a system which may initiate and execute disconnection from any of multiple attack detection logic implementations which may be provided at different hierarchical layers of system 300. In certain forms, the disconnection may be partially based upon the output of the device-layer attack detection logic of one or more NEPS devices, the gateway-layer attack detection logic of one or more gateway devices, and the cloud-layer attack detection logic.
[0043] The distributed architecture of system 300 can detect isolated attacks on single inverters or a plant as well as coordinated attacks across plants, portfolios, or regions. Trusted attack detection logic at each layer, such as layer-specific neural networks, are trained using simulated attacks in the laboratory and operated in combination when installed in the field. Additionally, from the foregoing description, the hierarchical aspects of system 300 may be understood. In one aspect, different control boards deployed on different levels will get inputs from different entities. For example, network-layer trusted program component control board B 1 will receive and utilize the outputs
(t) . The gateway-layer trusted program component of gateway control board B1 will receive and utilize the outputs 0Bll(t),
QB 0G(t). The cloud-layer trusted program component of cloud detection unit 340 will receive and utilize the outputs 0Bl (t), ... , 0Bn (t) . This hierarchical or tree-type architecture may be configured unidirectionally so that only the higher level gateway nodes can access the model data or system parameters of lower-level gateways or inverters.
[0044] A number of embodiments shall now be further described. A first example embodiment is a method comprising: providing a networked electrical power system (NEPS) device operatively coupled with an electrical power system and a communication network and including an electrical input, an electrical output, and a computer system configured to execute a
plurality of programs stored in one or more non-transitory computer-readable memory media, the plurality of programs including a trusted cyber-attack detection (TCAD) component including pre-trained cyber-attack detection logic; receiving with the TCAD component a plurality of inputs including at least a first input indicating a physical parameter of the NEPS device and a second input indicating a computational state of the computer system; determining with the pre trained cyber-attack detection logic of the TCAD component an attack metric in response to the plurality of inputs, the attack metric indicating one of: (a) the NEPS device is not under attack,
(b) the NEPS device is under attack but not yet compromised, and (c) the NEPS device has been successfully attacked; and triggering disconnection of the NEPS device from at least one of the electrical power system and the communication network based at least in part upon the attack metric indicating either (b) the NEPS device is under attack but not yet compromised or (c) the NEPS device has been successfully attacked.
[0045] In certain forms of the first example embodiment the plurality of inputs received with the TCAD component comprise one or more of: a first input quantifying one or more physical parameters of the NEPS device, a second input quantifying one or more computing resource usage metrics of the computer system, a third input quantifying an execution time for one or more execution paths of the plurality of programs, and a fourth input quantifying one or more alarm events for the NEPS device. In certain further forms, the first input comprises a vector P(t) representing a plurality of physical parameters of the NEPS device at a time t. In certain further forms, the plurality of physical parameters of the NEPS device include dynamically determined information about at least one physical or operational state of the NEPS device and static information about at least one nominal or rated characteristic of the NEPS device. In certain further forms, the second input comprises a vector Q(t) representing the one or more net computing resource usage metrics utilized at a time t by a set of programs comprising all of the executable programs of the computer system. In certain further forms, the third input comprises a vector R(t) representing a moving average of execution time for a plurality of predetermined execution paths of the plurality of programs. In certain further forms, the fourth input comprises a vector E(t) representing a set of all alarm events of the NEPS device activated over a range of a past time to a current time. In certain further forms, the TCAD component includes a recurrent neural network configured to provide an advance prediction of a cyberattack.
[0046] Certain forms of the first example embodiment comprise: providing a plurality of network gateways each operatively coupled with a plurality of NEPS devices, the plurality of NEPS devices including said NEPS device, providing a device-level attack metric from each of the plurality of NEPS devices to at least one of the plurality of network gateways, the device level attack metric including said attack metric, and determining with a gateway-level TCAD component of each of the plurality of network gateways a gateway-level attack metric in response to the plurality of device-level attack metrics and at least a gateway-level input indicating a computational state of the gateway; wherein the act of triggering disconnection of the NEPS device is further based upon one or more of the gateway-level attack metrics. Certain further forms comprise providing a cloud-level TCAD component operatively coupled with the plurality of network gateways, wherein the cloud-level TCAD component is configured to: receive a plurality of the gateway-level attack metrics, and determine and output a cloud-level attack metric in response to the plurality gateway-level attack metrics; wherein the act of triggering disconnection of the NEPS device is further based upon the cloud-level attack metric. [0047] A second example embodiment is a system comprising: a networked electrical power system (NEPS) device including an electrical input and an electrical output structured to be coupled with an electrical power system and a computer system structured to be coupled with a communication network and configured to execute a plurality of programs stored in one or more non-transitory computer-readable memory media, the plurality of programs including a tmsted cyber-attack detection (TCAD) component including pre-trained cyber-attack detection logic configured to: receive a plurality of inputs including at least a first input indicating a physical parameter of the NEPS device and a second input indicating a computational state of the computer system; determine an attack metric in response to the plurality of inputs; and initiate disconnection of the NEPS device from at least one of the electrical power system and the communication network at least partially based upon the attack metric indicating that the NEPS device is in the process of being attacked or that the NEPS device has been successfully attacked. [0048] In certain forms of the second example embodiment, the plurality of inputs comprise one or more of: a first input indicating one or more physical parameters of the NEPS device, a second input indicating one or more computing resource usage metrics of the computer system, a third input indicating an execution time for one or more execution paths of the
plurality of programs, and a fourth input indicating one or more alarm events for the NEPS device.
[0049] Certain forms of the second example embodiment comprise a plurality of network gateways each operatively coupled with one or more of a plurality of NEPS devices, wherein [0050] each of the plurality of NEPS devices is configured to provide a device-level attack metric to at least one of the plurality of gateways, and each of the plurality of gateways includes a respective gateway-level TCAD component including gateway-level pre-trained cyber-attack detection logic configured to: receive one or more of the device-level attack metrics, and determine a gateway-level attack metric in response to the plurality of the respective device-level attack metrics and at least a gateway-level input indicating a computational state of the gateway; wherein disconnection of the NEPS device from at least one of the electrical power system and the communication network is further initiated by the gateway-level attack metric. Certain further forms comprise a cloud-level TCAD component operatively coupled with the plurality of network gateways, wherein the cloud-level TCAD component is configured to: receive a plurality of the gateway-level attack metrics, and determine and output a cloud-level attack metric in response to the plurality gateway-level attack metrics; wherein disconnection of the NEPS device from at least one of the electrical power system and the communication network is further initiated by the cloud-level attack metric.
[0051] A third example embodiment is a networked electrical power system (NEPS) device comprising: an electrical input and an electrical output structured to be coupled with an electrical power system; and a computer system structured to be coupled with a communication network and configured to execute a plurality of programs stored in one or more non-transitory computer-readable memory media, the plurality of programs including a trusted cyber-attack detection (TCAD) component including pre-trained cyber-attack detection logic configured to: receive a plurality of inputs including at least a first input indicating a physical parameter of the NEPS device and a second input indicating a computational state of the computer system; determine an attack metric in response to the plurality of inputs and attack metric; and disconnect the NEPS device from at least one of the electrical power system and the communication network with which it is operatively coupled at least partially based upon the attack metric indicating that the NEPS device is in the process of being attacked or that the NEPS device has been successfully attacked.
[0052] In certain forms of the third example embodiment the plurality of inputs received with the TCAD component comprise one or more of a first input indicating one or more physical parameters of the NEPS device, a second input indicating one or more computing resource usage metrics of the computer system, a third input indicating an of execution time for one or more execution paths of the plurality of programs, and a fourth input indicating one or more alarm events for the NEPS device. In certain further forms, the networked electrical power system (NEPS) device of claim 17 wherein the first input comprises a vector P(t) representing a plurality of physical parameters of the NEPS device at a time t. In certain further forms, the second input comprises a vector Q(t) representing the or more net computing resource usage metrics utilized at the time t by a set of programs of the executable programs of the computer system. In certain further forms, the third input comprises a vector R(t) representing a moving average as of the time t of execution time for a plurality of predetermined execution paths of the plurality of programs. In certain further forms, the fourth input comprises a vector E(t) representing a set of all alarm events as of the time t of the NEPS device activated over a range of time.
[0053] In certain forms of the first example embodiment, the NEPS device comprises an inverter. In certain forms of the second example embodiment, the NEPS device comprises an inverter. In certain forms of the third example embodiment, the NEPS device comprises an inverter.
[0054] While illustrative embodiments of the disclosure have been illustrated and described in detail in the drawings and foregoing description, the same is to be considered as illustrative and not restrictive in character, it being understood that only certain exemplary embodiments have been shown and described and that all changes and modifications that come within the spirit of the claimed inventions are desired to be protected. It should be understood that while the use of words such as preferable, preferably, preferred or more preferred utilized in the description above indicates that the feature so described may be more desirable, it nonetheless may not be necessary and embodiments lacking the same may be contemplated as within the scope of the invention, the scope being defined by the claims that follow. In reading the claims, it is intended that when words such as “a,” “an,” “at least one,” or “at least one portion” are used there is no intention to limit the claim to only one item unless specifically stated to the contrary in the claim. When the language “at least a portion” and/or “a portion” is
used the item can include a portion and/or the entire item unless specifically stated to the contrary.
Claims
1. A method comprising: providing a networked electrical power system (NEPS) device operatively coupled with an electrical power system and a communication network and including an electrical input, an electrical output, and a computer system configured to execute a plurality of programs stored in one or more non-transitory computer-readable memory media, the plurality of programs including a trusted cyber-attack detection (TCAD) component including pre-trained cyber-attack detection logic; receiving with the TCAD component a plurality of inputs including at least a first input indicating a physical parameter of the NEPS device and a second input indicating a computational state of the computer system; determining with the pre-trained cyber-attack detection logic of the TCAD component an attack metric in response to the plurality of inputs, the attack metric indicating one of: (a) the NEPS device is not under attack, (b) the NEPS device is under attack but not yet compromised, and (c) the NEPS device has been successfully attacked; and triggering disconnection of the NEPS device from at least one of the electrical power system and the communication network based at least in part upon the attack metric indicating either (b) the NEPS device is under attack but not yet compromised or (c) the NEPS device has been successfully attacked.
2. The method of claim 1 wherein the plurality of inputs received with the TCAD component comprise: a first input quantifying one or more physical parameters of the NEPS device, a second input quantifying one or more computing resource usage metrics of the computer system, a third input quantifying an execution time for one or more execution paths of the plurality of programs, and a fourth input quantifying one or more alarm events for the NEPS device.
3. The method of claim 2 wherein the first input comprises a vector P(t) representing a plurality of physical parameters of the NEPS device at a time t.
4. The method of claim 3 wherein the plurality of physical parameters of the NEPS device include dynamically determined information about at least one physical or operational state of the NEPS device and static information about at least one nominal or rated characteristic of the NEPS device.
5. The method of claim 2 wherein the second input comprises a vector Q(t) representing the one or more net computing resource usage metrics utilized at a time t by a set of programs comprising all of the executable programs of the computer system.
6. The method of claim 2 wherein the third input comprises a vector R(t) representing a moving average of execution time for a plurality of predetermined execution paths of the plurality of programs.
7. The method of claim 2 wherein the fourth input comprises a vector E(t) representing a set of all alarm events of the NEPS device activated over a range of a past time to a current time.
8. The method of claim 7 wherein the TCAD component includes a recurrent neural network configured to provide an advance prediction of a cyber-attack.
9. The method of claim 1 comprising: providing a plurality of network gateways each operatively coupled with a plurality of NEPS devices, the plurality of NEPS devices including said NEPS device, providing a device-level attack metric from each of the plurality of NEPS devices to at least one of the plurality of network gateways, the device-level attack metric including said attack metric, and determining with a gateway-level TCAD component of each of the plurality of network gateways a gateway-level attack metric in response to the plurality of device-level attack metrics and at least a gateway-level input indicating a computational state of the gateway;
wherein the act of triggering disconnection of the NEPS device is further based upon one or more of the gateway-level attack metrics.
10. The method of claim 9 comprising: providing a cloud-level TCAD component operatively coupled with the plurality of network gateways, wherein the cloud-level TCAD component is configured to: receive a plurality of the gateway-level attack metrics, and determine and output a cloud-level attack metric in response to the plurality gateway- level attack metrics; wherein the act of triggering disconnection of the NEPS device is further based upon the cloud-level attack metric.
11. A system comprising: a networked electrical power system (NEPS) device including an electrical input and an electrical output structured to be coupled with an electrical power system and a computer system structured to be coupled with a communication network and configured to execute a plurality of programs stored in one or more non-transitory computer-readable memory' media, the plurality of programs including a trusted cyber-attack detection (TCAD) component including pre-trained cyber-attack detection logic configured to: receive a plurality of inputs including at least a first input indicating a physical parameter of the NEPS device and a second input indicating a computational state of the computer system; determine an attack metric in response to the plurality of inputs; and initiate disconnection of the NEPS device from at least one of the electrical power system and the communication network at least partially based upon the attack metric indicating that the NEPS device is in the process of being attacked or that the NEPS device has been successfully attacked.
12. The system of claim 11 wherein the plurality of inputs comprise: a first input indicating one or more physical parameters of the NEPS device, a second input indicating one or more computing resource usage metrics of the computer system,
a third input indicating an execution time for one or more execution paths of the plurality of programs, and a fourth input indicating one or more alarm events for the NEPS device.
13. The system of claim 11 comprising a plurality of network gateways each operatively coupled with one or more of a plurality of NEPS devices, wherein each of the plurality of NEPS devices is configured to provide a device-level attack metric to at least one of the plurality of gateways, and each of the plurality of gateways includes a respective gateway-level TCAD component including gateway-level pre-trained cyber-attack detection logic configured to: receive one or more of the device-level attack metrics, and determine a gateway-level attack metric in response to the plurality of the respective device-level attack metrics and at least a gateway-level input indicating a computational state of the gateway; wherein disconnection of the NEPS device from at least one of the electrical power system and the communication network is further initiated by the gateway-level attack metric.
14. The system of claim 13 comprising a cloud-level TCAD component operatively coupled with the plurality of network gateways, wherein the cloud-level TCAD component is configured to: receive a plurality of the gateway-level attack metrics, and determine and output a cloud-level attack metric in response to the plurality gateway- level attack metrics; wherein disconnection of the NEPS device from at least one of the electrical power system and the communication network is further initiated by the cloud-level attack metric.
15. The system of claim 11 wherein the NEPS device comprises an inverter.
16. A networked electrical power system (NEPS) device comprising: an electrical input and an electrical output structured to be coupled with an electrical power system; and
a computer system structured to be coupled with a communication network and configured to execute a plurality of programs stored in one or more non-transitory computer- readable memory media, the plurality of programs including a trusted cyber-attack detection (TCAD) component including pre-trained cyber-attack detection logic configured to: receive a plurality of inputs including at least a first input indicating a physical parameter of the NEPS device and a second input indicating a computational state of the computer system; determine an attack metric in response to the plurality of inputs and attack metric; and disconnect the NEPS device from at least one of the electrical power system and the communication network with which it is operatively coupled at least partially based upon the attack metric indicating that the NEPS device is in the process of being attacked or that the NEPS device has been successfully attacked.
17. The networked electrical power system (NEPS) device of claim 16 wherein the plurality of inputs received with the TCAD component comprise a first input indicating one or more physical parameters of the NEPS device, a second input indicating one or more computing resource usage metrics of the computer system, a third input indicating an of execution time for one or more execution paths of the plurality of programs, and a fourth input indicating one or more alarm events for the NEPS device.
18. The networked electrical power system (NEPS) device of claim 17 wherein the first input comprises a vector P(t) representing a plurality of physical parameters of the NEPS device at a time t.
19. The networked electrical power system (NEPS) device of claim 18 wherein the second input comprises a vector Q(t) representing the or more net computing resource usage metrics utilized at the time t by a set of programs of the executable programs of the computer system.
20. The networked electrical power system (NEPS) device of claim 19 wherein the third input comprises a vector R(t) representing a moving average as of the time t of execution time for a plurality of predetermined execution paths of the plurality of programs.
21. The networked electrical power system (NEPS) device of claim 19 wherein the fourth input comprises a vector E(t) representing a set of all alarm events as of the time t of the NEPS device activated over a range of time.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202080068487.0A CN114616743A (en) | 2019-08-16 | 2020-08-11 | Network attack detection for networked power system devices |
EP20855746.2A EP4014298A4 (en) | 2019-08-16 | 2020-08-11 | Cyber-attack detection for networked electrical power system devices |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/542,494 US12069088B2 (en) | 2019-08-16 | 2019-08-16 | Cyber-attack detection for networked electrical power system devices |
US16/542,494 | 2019-08-16 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021034540A1 true WO2021034540A1 (en) | 2021-02-25 |
Family
ID=74567942
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2020/045724 WO2021034540A1 (en) | 2019-08-16 | 2020-08-11 | Cyber-attack detection for networked electrical power system devices |
Country Status (4)
Country | Link |
---|---|
US (1) | US12069088B2 (en) |
EP (1) | EP4014298A4 (en) |
CN (1) | CN114616743A (en) |
WO (1) | WO2021034540A1 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113572660B (en) * | 2021-07-27 | 2022-06-17 | 哈尔滨工大天创电子有限公司 | Demonstration method, device, terminal and storage medium based on network attack and defense simulation |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3133793A1 (en) | 2015-08-20 | 2017-02-22 | Cyberx Israel Ltd. | Method for mitigation of cyber attacks on industrial control systems |
US20170264629A1 (en) | 2016-03-10 | 2017-09-14 | Siemens Aktiengesellschaft | Production process knowledge-based intrusion detection for industrial control systems |
WO2017201520A1 (en) | 2016-05-20 | 2017-11-23 | Georgia Tech Research Corporation | Systems and methods for detecting anomalous software on a programmable logic controller |
US20180082058A1 (en) | 2016-09-20 | 2018-03-22 | Ut Battelle, Llc | Cyber physical attack detection |
US20180157831A1 (en) | 2016-12-06 | 2018-06-07 | General Electric Company | Automated attack localization and detection |
US20190103762A1 (en) | 2017-05-18 | 2019-04-04 | Schweitzer Engineering Laboratories, Inc. | Mitigation of gratuitous conditions on electric power delivery systems |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105868629B (en) * | 2016-03-29 | 2020-06-16 | 全球能源互联网研究院 | Security threat situation assessment method suitable for electric power information physical system |
US10673871B2 (en) * | 2017-10-04 | 2020-06-02 | New Context Services, Inc. | Autonomous edge device for monitoring and threat detection |
CN109936467A (en) * | 2017-12-16 | 2019-06-25 | 陕西合度电子信息科技有限公司 | Network system safe operation maintenance supervising platform |
-
2019
- 2019-08-16 US US16/542,494 patent/US12069088B2/en active Active
-
2020
- 2020-08-11 CN CN202080068487.0A patent/CN114616743A/en active Pending
- 2020-08-11 EP EP20855746.2A patent/EP4014298A4/en active Pending
- 2020-08-11 WO PCT/US2020/045724 patent/WO2021034540A1/en unknown
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3133793A1 (en) | 2015-08-20 | 2017-02-22 | Cyberx Israel Ltd. | Method for mitigation of cyber attacks on industrial control systems |
US20170264629A1 (en) | 2016-03-10 | 2017-09-14 | Siemens Aktiengesellschaft | Production process knowledge-based intrusion detection for industrial control systems |
WO2017201520A1 (en) | 2016-05-20 | 2017-11-23 | Georgia Tech Research Corporation | Systems and methods for detecting anomalous software on a programmable logic controller |
US20180082058A1 (en) | 2016-09-20 | 2018-03-22 | Ut Battelle, Llc | Cyber physical attack detection |
US20180157831A1 (en) | 2016-12-06 | 2018-06-07 | General Electric Company | Automated attack localization and detection |
US20190103762A1 (en) | 2017-05-18 | 2019-04-04 | Schweitzer Engineering Laboratories, Inc. | Mitigation of gratuitous conditions on electric power delivery systems |
Non-Patent Citations (1)
Title |
---|
See also references of EP4014298A4 |
Also Published As
Publication number | Publication date |
---|---|
US20210051173A1 (en) | 2021-02-18 |
EP4014298A4 (en) | 2023-08-30 |
US12069088B2 (en) | 2024-08-20 |
EP4014298A1 (en) | 2022-06-22 |
CN114616743A (en) | 2022-06-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Cascading failures in internet of things: review and perspectives on reliability and resilience | ||
Beg et al. | Detection of false-data injection attacks in cyber-physical DC microgrids | |
US9075410B2 (en) | Abnormality detection for isolating a control system | |
Cai et al. | Distributionally robust microgrid formation approach for service restoration under random contingency | |
US10362056B1 (en) | Content-aware spoofed sensor measurement data detection in microgrids | |
Khan et al. | Attack detection in power distribution systems using a cyber-physical real-time reference model | |
Anwar et al. | Ensuring data integrity of OPF module and energy database by detecting changes in power flow patterns in smart grids | |
WO2011155961A2 (en) | Method for quantitative resilience estimation of industrial control systems | |
Goyel et al. | Data integrity attack detection using ensemble-based learning for cyber–physical power systems | |
Das et al. | Prediction and control of transient stability using system integrity protection schemes | |
Cassottana et al. | Resilience analysis of cyber‐physical systems: A review of models and methods | |
Deng et al. | A quantitative risk assessment model for distribution cyber-physical system under cyberattack | |
da Silva et al. | Network traffic prediction for detecting DDoS attacks in IEC 61850 communication networks | |
JP2022501994A (en) | Secure distributed state estimation for networked microgrids | |
Fadul et al. | Trust management and security in the future communication-based" smart" electric power grid | |
Ma et al. | A data-driven model predictive control for alleviating thermal overloads in the presence of possible false data | |
Akbarian et al. | A security framework in digital twins for cloud-based industrial control systems: Intrusion detection and mitigation | |
Venkataramanan et al. | Enhancing microgrid resiliency against cyber vulnerabilities | |
Wäfler et al. | Interdependency modeling in smart grid and the influence of ICT on dependability | |
Rath et al. | Behind closed doors: Process-level rootkit attacks in cyber-physical microgrid systems | |
Duman et al. | Factor of security (FoS): quantifying the security effectiveness of redundant smart grid subsystems | |
US12069088B2 (en) | Cyber-attack detection for networked electrical power system devices | |
US11941710B2 (en) | Behavioral modeling for power utility automation networks | |
Huang et al. | Vulnerability analysis of electrical cyber physical systems using a simulation platform | |
Hadayeghparast et al. | Application of machine learning in state estimation of smart cyber-physical grid |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20855746 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2020855746 Country of ref document: EP Effective date: 20220316 |