scispace - formally typeset
Open AccessJournal ArticleDOI

The 2015 Ukraine Blackout: Implications for False Data Injection Attacks

TLDR
In this paper, the authors consider some implications for FDIAs arising from the late 2015 Ukraine Blackout event, and propose a false data injection attack (FDIA) framework.
Abstract
In a false data injection attack (FDIA), an adversary stealthily compromises measurements from electricity grid sensors in a coordinated fashion, with a view to evading detection by the power system bad data detection module. A successful FDIA can cause the system operator to perform control actions that compromise either the physical or economic operation of the power system. In this letter, we consider some implications for FDIAs arising from the late 2015 Ukraine Blackout event.

read more

Content maybe subject to copyright    Report

NOVA
University of Newcastle Research Online
nova.newcastle.edu.au
Liang, Gaoqi, Weller, Steven R, Zhao, Junhua, Luo, Fengji, Dong, Zhao Yang. The 2015
Ukraine blackout: implications for false data injection attacks.Published IEEE
Transactions on Power Systems Vol. 32, Issue 4, p. 3317-3318 (2017)
Available from: http://dx.doi.org/10.1109/TPWRS.2016.2631891
© 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be
obtained for all other uses, in any current or future media, including reprinting/republishing
this material for advertising or promotional purposes, creating new collective works, for
resale or redistribution to servers or lists, or reuse of any copyrighted component of this
work in other works.
Accessed from: http://hdl.handle.net/1959.13/1352421

PES Letter
1
AbstractIn a false data injection attack (FDIA), an adversary
stealthily compromises measurements from electricity grid sen-
sors in a coordinated fashion, with a view to evading detection by
the power system bad data detection module. A successful FDIA
can cause the system operator to perform control actions which
compromise either the physical or economic operation of the
power system. In this letter, we consider some implications for
FDIAs arising from the late 2015 Ukraine Blackout event.
Index Terms Cyber-attacks, Ukraine Blackout, False Data
Injection Attacks
I. B
ACKGROUND ON THE 2015 UKRAINE BLACKOUT
On 23 December 2015, a synchronized and coordinated
cyber-attack compromised three Ukrainian regional electric
power distribution companies, resulting in power outages af-
fecting approximately 225,000 customers for several hours [1].
This cyber-attack entailed several technical components,
probably requiring extensive reconnaissance of the victim
networks by adversaries [2]: variants of the BlackEnergy 3
malware were reportedly delivered via spear phishing emails
and may have been used as an initial access vector for the theft
of authorized users’ virtual private network (VPN) credentials;
a telephonic denial-of-service attack was executed to frustrate
reports of outages to call centers; and a modified KillDisk
firmware attack erased master boot records on workstations,
thereby delaying restoration efforts.
These security compromises enabled the primary attack,
namely a hijack of the Supervisory Control and Data Acquisi-
tion (SCADA) network, including the targeting of field devices
with malicious firmware, thereby facilitating the remote
opening of substation breakers. Manual operations were ulti-
mately required to restore electrical service to customers [2].
G. Liang is with the Center for Intelligent Electricity Networks (CIEN),
University of Newcastle, Callaghan, NSW, 2308, Australia (e-mail:
gaoqi.liang@uon.edu.au).
S.R. Weller is with the School of Electrical Engineering and Computer
Science, University of Newcastle, Callaghan, NSW, 2308, Australia (e-mail:
steven.weller@newcastle.edu.au).
J. Zhao is with Chinese University of Hong Kong (Shenzhen), Shenzhen,
Guangdong, China (e-mail: junhua.zhao@outlook.com).
F. Luo is with the School of Civil Engineering, The University of Sydney,
Australia, Sydney, NSW, 2006, Australia (e-mail: fengji.luo@sydney.edu.au).
Z.Y. Dong is with the School of Electrical and Information Engineering, the
University of Sydney, Sydney, NSW, 2006, Australia (e-mail:
joe.dong@sydney.edu.au).
II. I
MPLICATIONS
A. Assumptions for FDIAs
The FDIA, first proposed by Liu et al. [3], is a cyber-attack
in which power system state estimation outputs are corrupted
by injecting false data into meter measurements in a carefully
coordinated fashion. The defining feature of a successful FDIA
is that the state estimation residual falls below a hypothesis test
threshold despite the presence of corrupted measurements, the
attack thereby evading detection.
Research on FDIAs has been extensive [3]
–[7], typically
relying on three key assumptions [3][4], namely that the at-
tackers:
(A1) have knowledge of power system operations and fea-
tures of the target system;
(A2) are capable of manipulating meter measurements; and
(A3) have knowledge of important control and operation
information, such as the network topology, system electrical
parameters, specifics of the SCADA network devices and bad
data detection scheme, etc.
Considered jointly, (A1)(A3) are strong assumptions, po-
tentially calling into question the practical feasibility of
mounting a successful FDIA. Nevertheless, we contend that the
Ukraine blackout underscores the plausibility of assumptions
(A1)(A3), shown in Fig. 1, and that the “strongest capability
of the [Ukraine blackout] attackers was […] their capability to
perform long-term reconnaissance operations required to learn
the environment and execute a highly synchronized, multistage,
multisite attack” [2].
B. Aspects Contributing to Feasibility of FDIAs
1) Ready Access to Information Sources
The 2015 Ukraine Blackout: Implications for
False Data Injection Attacks
Gaoqi Liang, Student Member, IEEE, Steven R. Weller, Member, IEEE, Junhua Zhao, Member, IEEE,
Fengji Luo, Member, IEEE, and Zhao Yang Dong, Senior Member, IEEE
IMPLICATIONS
Ukraine Blackout
Cyber-Attacks
Capabilities
VPNs Access
Reconnaissance
ICS Network
Steal Credential
Control of Workstation
Spear Phish
BlackEnergy
3
KillDisk
DoS Phonecall
FDIA
Assumptions
(A1)
(A2) (A3)
Cyber-attackers’ Capabilities towards Power Systems

PES Letter
2
In the Ukraine blackout, adversaries showed expertise. Be-
sides the intrusion of the Information Technology (IT) net-
works, they could even wrest control from substation control
centers and operate the Human Machine Interface (HMI) in the
supervisory control system to switch on breakers remotely.
The Internet provides potential adversaries with ready access
to substantial quantities of high-quality, power system and
vendor specific information: textbooks introduce the founda-
tions of generation, transmission, and distribution systems;
research publications update scholars’ knowledge and power
system innovations; industrial control system (ICS) vendors
readily share basic functionality and system architectures on
web portals; and industrial control standards and network
protocols are freely distributed on the Internet. Collectively,
these resources provide determined adversaries with consid-
erable knowledgebase with which to inform a cyber-attack.
2) Utilization of Vulnerabilities
Vulnerabilities in firewall, network protocols, encryption,
and VPN connections serve as “half-open-doors” to informed
adversaries. There are three approaches to manipulating meter
measurements for FDIAs: (i) compromising meters locally; (ii)
intercepting and forging data packets when transferring to the
control center; and (iii) modifying control center database [4].
In the Ukraine blackout, adversaries loaded malicious
firmware into SCADA network field gateway devices to ensure
that even when operator workstations were recovered, remote
commands could not be issued to bring the substations back
online [2]. Based on this, it can be foreseen that there would be
high probabilistic for the adversaries to locally manipulate
device parameters and gathered measurements by building
direct access to field devices.
Furthermore, intercepting and forging communication mes-
sages is easy to achieve, since the SCADA layer communica-
tion network architecture has no cryptographically secure
communication protocol.
In the Ukraine blackout, password-protected access to sub-
station control center workstations was likely gained by ad-
versaries via keystroke loggers [2]. The adversaries could ex-
ploit stolen credentials via VPNs to enter ICS network. Infor-
mation stored on SCADA servers can be then readily stolen.
Database manipulation is therefore possible after successfully
gaining credentialed access.
3) Reconnaissance
The Ukraine cyber-attack likely followed long-term power
system reconnaissance over six months or more without being
noticed [2]. According to E-ISAC and SANS, long-term re-
connaissance is considered as the strongest capability of the
attackers to launch this highly synchronized, multistage, mul-
tisite cyber-attack.
For FDIAs, identifying network topology and parameters
can not only be gained via on-off observation of components,
but also estimated from market data or measured power flows
over extended periods. Additionally, working staffs may also
be proactively or passively tracked, decoyed, and deceived to
tattle important configuration or operation information to ad-
versaries. Moreover, existing researches on FDIAs based on
incomplete topology information and limited meter manipula-
tion capability have been demonstrated to be valid. Therefore,
assumption (A2) and (A3) are flexible for attackers as long as
necessary information and competence for launching FDIAs
are collected and gained during reconnaissance.
It is also clearly seen from the Ukrainian blackout that the
adversaries hold the initiative to pose themselves as scheduled.
Before launching this attack, they concealed their motivations
for a long time. While, it is also a feasible motivation for at-
tackers to launch successful FDIAs for the purpose of gaining
economic profits by concealing themselves over an extended
period.
C. Recommendations
Both ICS-CERT [1] and SANS [2] have provided recom-
mendations and defense strategies regarding the Ukraine
blackout incident. We further recommend that regular staff
cyber-security training should be regarded as fundamental to
power system security. Such training would strengthen de-
fenses against FDIAs and coordinated cyber-attacks alike.
Moreover, we recommend that components such as remote
terminal units (RTUs), switches, breakers etc. should support
both automatic and manual modes, in the event of failures in
automatic restoration.
III. C
ONCLUSIONS
The Ukraine blackout is the first publicly acknowledged in-
cident which is caused by cyber-attacks. This event highlights
the vulnerability of highly automated, cyber information-based
smart grid environments to coordinated cyber-attacks. In par-
ticular, this letter argues that the circumstances of the Ukraine
blackout underscores the plausibility of common assumptions
regarding the knowledge and capabilities required by an ad-
versary in order to mount a successful false data injection attack
on a power system.
REFERENCES
[1] NCCIC/ICS-CERT, “Cyber-attack against Ukrainian critical infrastruc-
ture,” released 25 February 2016. [Online]. Available:
https://ics-cert.us-cert.gov/alerts/IR-ALERT-H-16-056-01 [Accessed: 20
June 2016].
[2] E-ISAC and SANS, “Analysis of the cyber attack on the Ukrainian power
grid: Defense use case,” released 18 March 2016. [Online]. Available:
https://ics.sans.org/duc5 [Accessed: 20 June 2016].
[3] Y. Liu, P. Ning, and M. K. Reiter, False data injection attacks against
state estimation in electric power grids,” ACM Transactions on Infor-
mation and System Security (TISSEC), vol. 14, no.1, May. 2011.
[4] G. Liang, J. Zhao, F. Luo, S. R. Weller and Z. Dong, “A review of false
data injection attacks against modern power systems,” IEEE Trans. Smart
Grid, 2016, in press.
[5] Y. Yuan, Z. Li, and K. Ren, Modeling load redistribution attacks in
power systems,” IEEE Trans. Smart Grid, vol. 2, no.2, pp. 382390, Jun.
2011.
[6] X. Liu, Z. Bao, D. Lu, and Z. Li, Modeling of local false data injection
attacks with reduced network information,” IEEE Trans. Smart Grid, vol.
6, no.4, pp. 16861696, July. 2015.
[7] L. Jia, J. Kim, R.J. Thomas and L. Tong, “Impact of data quality on
real-time locational marginal price,” IEEE Trans. Power Syst., vol. 29, no.
2, pp. 627636, Mar. 2014.
Citations
More filters
Journal ArticleDOI

A Survey on Power System Blackout and Cascading Events: Research Motivations and Challenges

TL;DR: A comprehensive review on the major blackouts and cascading events that have occurred in the last decade is introduced in this article, where a particular focus is given on the US power system outages and their causes since it is one of the leading power producers in the world.
Journal ArticleDOI

Distributed Blockchain-Based Data Protection Framework for Modern Power Systems Against Cyber Attacks

TL;DR: This paper presents a comprehensive discussion on how blockchain technology can be used to enhance the robustness and security of the power grid, by using meters as nodes in a distributed network which encapsulates meter measurements as blocks.
Journal ArticleDOI

Security and privacy in the internet of things

TL;DR: The evolution of the IoT, its various definitions, and some of its key application areas are discussed, both generally and in the context of these applications.
Journal ArticleDOI

Deep Learning-Based Interval State Estimation of AC Smart Grids Against Sparse Cyber Attacks

TL;DR: In this article, a scenario-based two-stage sparse cyber-attack models for smart grid with complete and incomplete network information are proposed, and an interval state estimation-based defense mechanism is developed innovatively in order to effectively detect the established cyber-attacks.
Journal ArticleDOI

A Survey on Metaverse: Fundamentals, Security, and Privacy

TL;DR: A comprehensive survey of the fundamentals, security, and privacy of metaverse is presented, including a novel distributed metaverse architecture and its key characteristics with ternary-world interactions, and open research directions for building future metaverse systems are drawn.
References
More filters
Journal ArticleDOI

False data injection attacks against state estimation in electric power grids

TL;DR: In this article, a new class of attacks, called false data injection attacks, against state estimation in electric power grids is presented and analyzed, under the assumption that the attacker can access the current power system configuration information and manipulate the measurements of meters at physically protected locations such as substations.
Journal ArticleDOI

A Review of False Data Injection Attacks Against Modern Power Systems

TL;DR: A comprehensive review of state-of-the-art in FDIAs against modern power systems is given and some potential future research directions in this field are discussed.
Journal ArticleDOI

Modeling Load Redistribution Attacks in Power Systems

TL;DR: This is the first work of its kind, which quantitatively analyzes the damage of the false data injection attacks to power system operation and security, and provides an in-depth insight on effective attack prevention with limited protection resource budget.
Proceedings ArticleDOI

False data injection attacks with incomplete information against smart power grids

TL;DR: This paper mathematically characterize false data injection attacks with incomplete information from both the attacker's and grid operator's viewpoints and introduces a novel vulnerability measure that can compare and rank different power grid topologies against such attacks.
Journal ArticleDOI

Modeling of Local False Data Injection Attacks With Reduced Network Information

TL;DR: An efficient strategy for determining the optimal attacking region that requires reduced network information is proposed for smart grid cyber security: determination of a feasible attacking region by obtaining less network information.
Related Papers (5)
Frequently Asked Questions (7)
Q1. What are the contributions in this paper?

In this letter, the authors consider some implications for FDIAs arising from the late 2015 Ukraine Blackout event. 

The defining feature of a successful FDIA is that the state estimation residual falls below a hypothesis test threshold despite the presence of corrupted measurements, the attack thereby evading detection. 

According to E-ISAC and SANS, long-term reconnaissance is considered as the strongest capability of the attackers to launch this highly synchronized, multistage, multisite cyber-attack. 

There are three approaches to manipulating meter measurements for FDIAs: (i) compromising meters locally; (ii) intercepting and forging data packets when transferring to the control center; and (iii) modifying control center database [4]. 

Vulnerabilities in firewall, network protocols, encryption, and VPN connections serve as “half-open-doors” to informed adversaries. 

the authors recommend that components such as remote terminal units (RTUs), switches, breakers etc. should support both automatic and manual modes, in the event of failures in automatic restoration. 

The Ukraine cyber-attack likely followed long-term power system reconnaissance over six months or more without being noticed [2].