摘要(英) |
With the advancement of technology and network transmission techniques, the power transmission and supply model has evolved from the traditional method of power plants supplying electricity to users via power lines to the adoption of the IEC 61850 international standard for smart power grids. This standard unifies the transmission specifications of electricity meters from various manufacturers and supports real-time communication and data exchange between protection devices in key substations and digital substations.
Since 2011, Taiwan Power Company (Tai power) has been actively promoting the preliminary construction, dissemination, and widespread application of smart power grids to enhance efficiency in power generation, dispatching, transmission, and distribution. However, during the transition from traditional power systems to smart power grids, security has been a significant concern. The IEC 61850 standard, although incorporating the independent transmission protocol IEC 62439-3, does not particularly emphasize security, resulting in a lack of robust network security mechanisms. Consequently, smart power grids still face numerous network attacks and security issues.
In smart power grids, the response time of Intelligent Electronic Devices (IEDs) is critical. To minimize latency, the IEC 61850 standard employs unencrypted plaintext transmission. This allows any attacker who infiltrates the smart power grid to use network packet analyzers to intercept the data in real-time, leading to various network attacks such as denial-of-service, spoofing, and substitution. Therefore, there is an urgent need to research detection and protection methods for smart power grid security.
This thesis first simulates the Generic Object-Oriented Substation Event (GOOSE) as specified in the IEC 61850 standard and the High Availability Seamless Redundancy (HSR) in the IEC 62439-3 standard within a physical transmission power grid environment. It then emulates attackers to perform network packet interception, duplication, modification, and spoofing. Subsequently, it conducts network attacks such as Denial-of-Service (DoS) and Man-in-the-Middle (MITM), extracts features from the data, and uses Long Short-Term Memory (LSTM) and Support Vector Machine (SVM) for training and learning. The accuracy of the two algorithms is then compared.
This thesis explores the accuracy and advantages and disadvantages of using deep learning algorithms for intrusion detection in a smart power grid attack environment. Based on the implementation results, it proposes intrusion detection methods to improve power grid security issues. |
參考文獻 |
[1]Collection IEC Fieldbus Standards: https://felser.ch/download/index.html.
[2]International Standard:. https://webstore.iec.ch/publication/64423
[3]R. Borgohain, M. J. Roy, P. Paul Choudhury and R. Das, "A brief introduction to High Availability Seamless Redundancy (HSR) and some of its drawbacks : An insight into the functioning of HSR Protocol," 2018 3rd International Conference on Communication and Electronics Systems (ICCES), Coimbatore, India, 2018, pp. 523-527, doi: 10.1109/CESYS.2018.8724055.
[4]J. T. Yu, "A Scalable Architecture for High Availability Seamless Redundancy (HSR)," 2017 IEEE 19th International Conference on High Performance Computing and Communications; IEEE 15th International Conference on Smart City; IEEE 3rd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), Bangkok, Thailand, 2017, pp. 292-298, doi: 10.1109/HPCC-SmartCity-DSS.2017.38.
[5]Wikimedia Commons [Online].Available: https://commons.wikimedia.org/wiki/File:IEC_62439-3.5_HSR_Nodes_20170204_Kirrmann.jpg.
[6]Wikimedia Commons [Online].Available: https://commons.wikimedia.org/wiki/File:IEC_62439-3.5_HSR_Multicast_Ring_20170204_Kirrmann.jpg.
[7]Taiwan Power Research Institute [Online].Available: https://www.bsmi.gov.tw/wSite/public/Data/f1706757555893.pdf.
[8]Moscovits, Yanny & Torres, Eliseu & Martins, Joberto. (2020). Managing IEC 61850 Message Exchange for SDN-Controlled Cognitive Communication Resource Allocation in the Smart Grid. 10.5281/zenodo.3581404.
[9]A. Elgargouri and M. Elmusrati, "Analysis of Cyber-Attacks on IEC 61850 Networks," 2017 IEEE 11th International Conference on Application of Information and Communication Technologies (AICT), Moscow, Russia, 2017, pp. 1-4, doi: 10.1109/ICAICT.2017.8686894.
[10]Z. Li, R. Ma, Y. Xie and L. Lu, "Overview of Intrusion Detection in Smart Substation," 2022 IEEE 10th Joint International Information Technology and Artificial Intelligence Conference (ITAIC), Chongqing, China, 2022, pp. 2377-2384, doi: 10.1109/ITAIC54216.2022.9836858.
[11]T. S. Ustun, S. M. Farooq and S. M. S. Hussain, "A Novel Approach for Mitigation of Replay and Masquerade Attacks in Smartgrids Using IEC 61850 Standard," in IEEE Access, vol. 7, pp. 156044-156053, 2019, doi: 10.1109/ACCESS.2019.2948117.
[12]M. T. A. Rashid, S. Yussof, Y. Yusoff and R. Ismail, "A review of security attacks on IEC61850 substation automation system network," Proceedings of the 6th International Conference on Information Technology and Multimedia, Putrajaya, Malaysia, 2014, pp. 5-10, doi: 10.1109/ICIMU.2014.7066594.
[13]X. Wang, C. Fidge, G. Nourbakhsh, E. Foo, Z. Jadidi and C. Li, "Feature Selection for Precise Anomaly Detection in Substation Automation Systems," 2021 13th IEEE PES Asia Pacific Power & Energy Engineering Conference (APPEEC), Thiruvananthapuram, India, 2021, pp. 1-6, doi: 10.1109/APPEEC50844.2021.9687629.
[14]Y. Kwon, H. K. Kim, Y. H. Lim and J. I. Lim, "A behavior-based intrusion detection technique for smart grid infrastructure," 2015 IEEE Eindhoven PowerTech, Eindhoven, Netherlands, 2015, pp. 1-6, doi: 10.1109/PTC.2015.7232339.
[15]X. Wang, C. Fidge, G. Nourbakhsh, E. Foo, Z. Jadidi and C. Li, "Anomaly Detection for Insider Attacks From Untrusted Intelligent Electronic Devices in Substation Automation Systems," in IEEE Access, vol. 10, pp. 6629-6649, 2022, doi: 10.1109/ACCESS.2022.3142022.
[16]TMDSICE3359 AM3359 Industrial Communications Engine [Online].https://www.ti.com/tool/TMDSICE3359
[17]open source libraries [Online]. Availablehttps://libiec61850.com/
[18]Processor SDK Linux AM3359[Online]. Availablehttps://libiec61850.com/
[19]LSTM 內部結構介紹[Online]. https://ithelp.ithome.com.tw/articles/10188818?sc=rss.iron
[20]Support Vector Machine (SVM)支援向量機[Online]. https://ithelp.ithome.com.tw/articles/10302332
[21]TEXAS INSTRUMENTS[Online]. https://software-dl.ti.com/processor-sdk-linux/esd/docs/latest/linux/Foundational_Components/PRU-ICSS/Linux_Drivers/PRU-ICSS_Ethernet.html |