CASeS Concurrent Contingency Analysis-Based Security Metric Deployment For The Smart Grid
CASeS Concurrent Contingency Analysis-Based Security Metric Deployment For The Smart Grid
3, MAY 2020
Abstract—Security metric deployment is of immense impor- dynamic changes in the electricity demand. Moreover, the
tance for power utilities especially in future smart grids, which grid’s cyber component is responsible for communicating cor-
are being actively pursued in smart cities initiatives around the rective actions in case of any emergency to relevant devices
world. Through these metrics, utilities attain real-time aware-
ness of the grid’s security posture. In this paper, we propose of the physical component. However, along with the advan-
a contingency analysis based security evaluation framework for tages induced from cyber-physical coupling, the integration of
smart grid systems - CASeS. Based on the power flow equations the cyber infrastructure in the power grid augments the threats
of the grid, communication network characteristics, and concur- facing the system [4]. Indeed, the impact of compromises in
rent power contingencies, CASeS leverages Markovian Decison either component is a candidate to expand and initiate the
Processes (MDP) to quantify the smart grid security. The secu-
rity index delivered through CASeS emerges as a novel solution well-known phenomenon of cascading failures [5], [6].
for concurrent power contingency consideration, and allows for On the other hand, the availability of the cyber components
the preparation of corrective actions to address the quantified augments the operational technology (OT) data generated by
grid criticality level. We evaluate CASeS on the standard IEEE the physical processes with essential information technol-
14-Bus and 39-Bus systems. The collected results demonstrate ogy (IT) data that reports on the system health. This enables
the usefulness of CASeS in quantifying the security of those
systems. the collection of reports and alerts from various cyber com-
ponents dispersed across the grid, along with the sampled
Index Terms—Smart grids, security, cyber-physical systems, measurements and received control commands. However, the
power system simulation, power system measurements, observ-
ability, power system protection. need to gain intelligence and insights on the system secu-
rity status from the collected data persists. Indeed, the smart
grid lacks the definition of metrics that reflect the cyber-
I. I NTRODUCTION physical system security, and provide operators with full
ODAY, our power grid is witnessing a major evolution system awareness on the cyber and physical levels.
T to a smarter and more capable grid. The idea of Smart
Grid has been introduced with a goal of enhancing the current
While the security evaluation techniques have been exten-
sively deployed in IT domains over the past decade, those
state of the electric grid by providing more reliable, available, solutions fall short in interpreting the system dynamics and
and efficient power generation, transmission, and distribution addressing the smart grid security and functional real-time
networks [1]. The smart grid could be defined as a Cyber- requirements. Security metrics tailored for the smart grid are
Physical network with tight coupling between the cyber and expected to infer knowledge from the system operations, along
physical components. Power network components (generation with on-the-fly alerts from deployed security monitoring solu-
units, protection relays, circuit breakers, transformers, etc) tions to expose threats targeting the grid, and quantify the
are highly dependent on the availability of a communication overall system security. The significance of such metrics has
network infrastructure and vice versa [2], [3]. motivated researchers to develop and deploy security evalua-
The cyber side of the grid works closely with the power tion techniques for the smart grid [7]–[10]. However, none of
network to provide real time monitoring, and respond to the those techniques considered the impact of Concurrent Power
Contingencies while evaluating the grid’s security.
Manuscript received March 12, 2019; revised July 15, 2019 and In this paper, we define a security metric (CASeS) based
November 7, 2019; accepted December 11, 2019. Date of publication
December 16, 2019; date of current version April 21, 2020. This work was on concurrent contingency analysis for the smart grid. Our
supported in part by Concordia University and in part by the NSERC/Hydro- metric combines cyber security analysis with Hardware-in-
Québec Thales Senior Industrial Research Chair in Smart Grid Security. the-Loop (HIL) simulation of the smart grid, and leverages
The work of Bassam Moussa was supported by FRQNT Postdoctoral
Research Scholarship. Paper no. TSG-00371-2019. (Corresponding author: concurrent contingencies, to evaluate the system criticality
Bassam Moussa.) level, based on power system dynamics and alerts generated by
P. Akaber, B. Moussa, M. Ghafouri, C. Assi, and M. Debbabi are with intrusion detection systems deployed at different grid levels.
the Concordia Security Research Centre, Concordia University, Montreal,
QC H3G 1M8, Canada (e-mail: [email protected]). The presented framework associates cyber alerts received by
R. Atallah and B. L. Agba are with Hydro-Québec Research Institute, utility operators with potential physical impact on the system
Varennes, QC J3X 1S1, Canada. operations. CASeS captures direct physical impact of cyber-
Color versions of one or more of the figures in this article are available
online at http://ieeexplore.ieee.org. based attacks in the form of load and/or generation loss, along
Digital Object Identifier 10.1109/TSG.2019.2959937 with the implicit impact by bringing the system closer to its
1949-3053 c 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Institute of Aeronautical Engineering. Downloaded on October 16,2024 at 11:21:00 UTC from IEEE Xplore. Restrictions apply.
AKABER et al.: CASeS: CONCURRENT CONTINGENCY ANALYSIS-BASED SECURITY METRIC DEPLOYMENT FOR SMART GRID 2677
Authorized licensed use limited to: Institute of Aeronautical Engineering. Downloaded on October 16,2024 at 11:21:00 UTC from IEEE Xplore. Restrictions apply.
2678 IEEE TRANSACTIONS ON SMART GRID, VOL. 11, NO. 3, MAY 2020
B. Threat Model
We consider an attacker who is knowledgeable about the we define two primitives <c, h, h >, <c, h > is the exis-
cyber-physical nature of the smart grid, and is interested in tence of a service h on c, and <h, h > is the connectivity
exploiting the cyber-physical inter-dependency to induce phys- allowing the access to service h from a component running
ical damage through compromising cyber components. The the service h. This procedure results in the identification and
attacker has the expertise to perform reconnaissance and intel- formulation of accessibility between network components in
ligence gathering operations to locate vulnerabilities in the the form of a matrix. The resulting matrix is presented as
cyber components deployed in the smart grid, and leverage C[D×D], where D is the total number of network components.
their link with the physical components. Our attacker quan- An entry Cij ∈ C is 1 if the network component j has a ser-
tifies his success in the form of physical disturbances in the vice h that is accessible through service h running on network
power grid, and he will execute his attacks to fulfill this goal. component i, and 0 otherwise. The ability of an attacker to
To successfully compromise a component, the attacker can compromise a component c running a service h is later cap-
leverage several possible attack vectors including but not lim- tured by linking a privilege ph to the service h appearing in the
ited to: distributed denial of service (DDoS), alter and hide c primitives (<c,h,h >). This privilege is awarded the attacker
(AaH), and data integrity. The attacker can make use of known upon successful compromise of the service h. Moreover, the
vulnerabilities in systems, which are identified through ICS- compromise of service h will result in a new privilege ph
CERT [15], or exploit zero-day vulnerabilities in the available attained by the attacker and thus granting him with the ability
system components. On the other hand, the attacker can gain to gain further accessibility to the network.
control over the cyber components of the grid through infil- Considering the system model presented in Fig. 2, and the
trating into the control center LAN, or the substation LAN as potential attack points, the connectivity matrix builder estab-
detailed in [16]. Thus, the attacker view of the system topol- lishes logical links that associate possible compromises of the
ogy is that of services running on the available devices and attack points with the power components that an attacker can
vulnerabilities associated with those services. For example, a control. For example, through an initial compromise of in the
relay as shown in Fig. 2 resembles a service present in the wide area network, the attacker can gain a privilege that grants
system, or a privilege gained by the attacker allowing him him access to a service in the network gateway. Eventually, the
to eventually control the physical circuit breakers. Here, it attacker gains access to the LAN in the substation, and later
is important to mention that generation stations are assumed through another compromise, manages to control the protec-
to be well-protected or disconnected from the cyber-network, tion relays present in the substation. The connectivity matrix
and attackers can not gain control over components of such builder prepares such associations for later use in the security
stations [12]. Thus, the attacker will direct his interest to metric evaluation.
coordinated attacks on IP-based substation components only.
D. MDP State Tree Generator
C. Connectivity Matrix Builder Given the connectivity matrix C generated in the previous
The connectivity matrix builder takes as input the com- block, an MDP Tree Generator enumerates all the possible
munication network topology including the network elements system states and transitions among them. An MDP provides
associated with the power grid, firewall rules and access con- a mathematical framework for modeling decision-making sit-
trol policies. Then, the connectivity matrix builder formulates uations where outcomes are partly random and partly under
this input as services associated with the network components, the control of the decision maker. To deploy any MDP, the
and connectivity among those services. For each component c, below elements should be defined.
Authorized licensed use limited to: Institute of Aeronautical Engineering. Downloaded on October 16,2024 at 11:21:00 UTC from IEEE Xplore. Restrictions apply.
AKABER et al.: CASeS: CONCURRENT CONTINGENCY ANALYSIS-BASED SECURITY METRIC DEPLOYMENT FOR SMART GRID 2679
• S a finite set of states probabilities to the transitions between states, we use the
• A a finite set of actions Common Vulnerability Scoring System [17], [18]. Using
• Pa (s, s ) transition probability CVSS, we input parameters (base, temporal, environmen-
• Ra (s, s ) reward function tal, etc) for a specific condition to receive a 0-10 score
• γ ∈ [0, 1] discount factor. of the risk posed by a particular vulnerability. We divide
From which S, A, and Pa (s, s ) are mandatory components to the score provided by CVSS by 10 to transform it into
build the MDP tree. In its basic setting, the attacker takes an a probability following a similar approach to that in [9],
action, and gets a reward from the system, and the system [19]–[21]. For example, a score of 10 results in a proba-
changes its state. Then the attacker senses the state of the bility equals to 1. We use different examples of possible
system, takes an action, gets a reward, and so on, so forth. vulnerabilities from CVSS to assign transition probabil-
The state transitions are probabilistic and depend solely on the ities, and reflect the possibility of compromises in the
actual state and the action taken by the attacker. The reward system under study. For the initial transit of the system
obtained by the attacker depends on the action taken, and on from state s0 , we consider known and unknown software
both the original and the new state of the system. All those vulnerabilities that can be exploited from distance. We
characteristics of the MDP make it most suitable to model assume that the attacker is capable of remotely exploit-
the system behavior, and the interaction with the attacker. We ing these vulnerabilities to execute his attack, and thus we
present these components next, while Ra (s, s ) and γ will be randomly add those vulnerabilities along with the conse-
presented in Section III-H: quent transition probabilities to the system components.
• S is a finite set of system states. Any attack scenario could Those exploits constitute the set of actions A0 associated
be divided into a finite number of actions followed by an with the initial system state. On the other hand, to account
attacker or a group of attackers with pre-defined objec- for zero-day attacks exploiting unknown vulnerabilities,
tives. In this research, we define a “security state” for the we have assigned a small probability of 0.01 to the system
system as a set of compromised power-communication security states that enables transitions representing zero
network components. A security state reflects the attack day exploits. This allows the attacker to exploit such vul-
propagation in the system, and the privileges the attacker nerabilities and advance in his attack. On the other hand,
has attained through those compromises. The system it allows for a better quantification of the system security
starts from an initial security state where no components in the presence of zero-day vulnerabilities.
are compromised. Upon receiving intrusion detection Furthermore, it is worth noting that the presented tran-
alerts about ongoing attacks, the system moves to a new sition model does not address availability/confidentiality
state which highlights the attack progress and identifies attacks, nor does it address attacks that exploit shared cre-
the potentially compromised components. The critical- dentials/trusts or an insider. The modeling of those attacks
ity of a security state increases as the attack advances pertains as a need for more accurate cyber threat models
and the attacker is closer to imposing physical impact on for the smart grid.
the system operations. It is worth mentioning that high- To generate the MDP tree, we start from an initial
tech power components used in smart grid such as circuit state ∅ where no components are compromised. Next, using
breakers and switches have a cyber part (e.g., application Algorithm 1 and the connectivity matrix as input, the MDP
running on them) which could be compromised through state tree generator creates the MDP states and transitions.
a cyber attack. Starting from the initial state, Algorithm 1 creates entry
• A is a finite set of actions: For each state s, we asso- points corresponding to states accessible from the initial state
ciate a set of actions As an attacker might initiate. Each (lines 6-9), along with an associated transition. The reach-
action in As represents exploiting a known or zero-day able states represent components that are connected to the
vulnerability in a system component (i.e., SQL injec- Internet. Then, based on those new states, and starting with
tion, ssh vulnerability, etc). By taking action Ai from As , an entry point i, we add a new reachable state sij whenever
the attacker leverages the system inter-dependency and component j is connected to component i. This connectiv-
connectivity, and gains access to an additional compo- ity is implied through the use of the connectivity matrix
nent that augments his reward and brings him closer to builder. It is worth noting that, createReachableStates(s)
his target. In our implementation of actions associated function is a recursive function which returns all the pos-
with a state, we assigned random known software vul- sible states reachable from state s considering all the
nerabilities to the communication network components. components in this state and their connectivity to other
Moreover, to improve the system realism, we randomly components.
assigned actions that represent zero-day attacks exploit- Applying Algorithm 1 on the network topology in 2 while
ing unknown vulnerabilities to various Information and considering attack points at the control center (CC), WAN
Communication Technology (ICT) components available SCADA Network (W), gateway (G), and relays (R) results in
in our system model. the MDP shown in Fig. 3. This MDP is obtained through the
• Pa (s, s ) represents the probability to successfully transit following steps:
from state s to a reachable state s by taking action a. • Create the initial state ∅. Lines (3,4)
In our case, this probability is defined as the attacker’s • Create new states as states reachable from the initial state.
success rate for a specific attack scenario. To assign Lines (6-8)
Authorized licensed use limited to: Institute of Aeronautical Engineering. Downloaded on October 16,2024 at 11:21:00 UTC from IEEE Xplore. Restrictions apply.
2680 IEEE TRANSACTIONS ON SMART GRID, VOL. 11, NO. 3, MAY 2020
Algorithm 1 MDPGenerator(int[][] ComponentsConnectivity) concurrent contingency identifier reconfigures the grid topol-
1: Output: Array<State> states; ogy into a set of k clusters (k ∈ {2, 3, 4, . . .}). Each cluster
2: Array<Transition> transitions;
3: State emptyState = new State() contains a set of transmission lines whose concurrent failure
4: states.add(emptyState); results in a higher reward function compared to individual
5: for (i:componentsConnectivity) do failures. For the case of a cluster formed of two transmission
6: if (i is an attacker’s entrypoint) then
7: State initial =new State(i); lines, we can mathematically represent this relation in Eq. (1):
8:
9:
states.add(initial);
transitions.add(emptyState, initial);
RF uns ({ti }, P) + RF uns tj , P < RF uns ti , tj , P (1)
10: end if where RF uns (T,P) denotes the value of attacker reward func-
11: for (j:componentsConnectivity[i]) do
12: if (i is not connected to j) then tion due to the failure of the set T of transmission lines given
13: continue; the power network topology P. This function is part of our
14: end if smart grid testbed presented in Section III-G. Considering the
15: if (i and j mutually connected) then
16: if (sij does not exist) then example in Fig. 1, the individual failure of R6 or R8 does not
17: State sij = new State(i, j); impact the system. However, an attack that brings down both
18: states.add(sij ) relays would cause a blackout in the residential area. Hence,
19: transitions.add(initial, sij );
20: createReachableStates(sij ); the concurrent contingency identifier would place R6 and R8
21: else in a cluster.
22: transitions.add(initial,getState(i,j)); On the other hand, our concurrent contingency extensively
23: end if
24: else looks for contingencies that divide the grid into clusters of
25: State sij = new State(i, j); size k ∈ {2,3,4}. This can be changed to consider clusters of
26: states.add(sij ) larger sizes. However, based on the outcome of the analysis
27: transitions.add(initial, sij );
28: createReachableStates(sij ); presented in [12], we can see that it is enough to target a
29: end if relatively small number of the links available in a large power
30: end for system to induce a significant loss in the load served by this
31: end for
system. Hence, for each subset of relays of size k, if Eq. 1
is satisfied, we create a cluster representing this subset. Thus,
the concurrent contingency identifier outputs a set of clusters
representing the concurrent contingencies in the system.
Authorized licensed use limited to: Institute of Aeronautical Engineering. Downloaded on October 16,2024 at 11:21:00 UTC from IEEE Xplore. Restrictions apply.
AKABER et al.: CASeS: CONCURRENT CONTINGENCY ANALYSIS-BASED SECURITY METRIC DEPLOYMENT FOR SMART GRID 2681
Authorized licensed use limited to: Institute of Aeronautical Engineering. Downloaded on October 16,2024 at 11:21:00 UTC from IEEE Xplore. Restrictions apply.
AKABER et al.: CASeS: CONCURRENT CONTINGENCY ANALYSIS-BASED SECURITY METRIC DEPLOYMENT FOR SMART GRID 2683
Authorized licensed use limited to: Institute of Aeronautical Engineering. Downloaded on October 16,2024 at 11:21:00 UTC from IEEE Xplore. Restrictions apply.
2684 IEEE TRANSACTIONS ON SMART GRID, VOL. 11, NO. 3, MAY 2020
TABLE II
CAS E S S ECURITY I NDEX BASED ON M ULTIPLE C ONTINGENCIES
FOR IEEE 14-B US S YSTEM
TABLE I
CAS E S S ECURITY I NDEX BASED ON S INGLE -C ONTINGENCY
FOR IEEE 14-B US S YSTEM
Authorized licensed use limited to: Institute of Aeronautical Engineering. Downloaded on October 16,2024 at 11:21:00 UTC from IEEE Xplore. Restrictions apply.
AKABER et al.: CASeS: CONCURRENT CONTINGENCY ANALYSIS-BASED SECURITY METRIC DEPLOYMENT FOR SMART GRID 2685
Authorized licensed use limited to: Institute of Aeronautical Engineering. Downloaded on October 16,2024 at 11:21:00 UTC from IEEE Xplore. Restrictions apply.
2686 IEEE TRANSACTIONS ON SMART GRID, VOL. 11, NO. 3, MAY 2020
TABLE V
A PPROACH RUNTIME R ESULTS (S ECONDS ) concurrent power contingencies. The presented framework,
CASeS, quantifies the system security level, and assigns a
security index to system states based on the dynamic changes
in the system served load and the success chances of cyber-
attacks. CASeS security index quantifies the grid criticality
level, and reflects the system security posture. Results col-
the IEEE 39-Bus system. This indicates that CASeS quantifies lected through CASeS can be utilized to define corrective
in a timely manner the system security posture. actions for system protection in the presence of cyber-attacks.
Based on the collected and presented results, CASeS is We have demonstrated CASeS capabilities on different IEEE
capable of identifying the system security posture according test systems. The collected results through experimentation
to threats received or identified during the system operations. reveal CASeS capabilities, and manifest the need of such a
Moreover, through CASeS security metric, operators can rank framework for power system protection and control.
different system components based on their criticality level As a future work, we aim at extending the defined metric
and allocate protection resources accordingly. to cover other components of the smart grid. We are mainly
interested in the security quantification of wide area monitor-
V. R ELATED W ORK ing systems (WAMS), and we believe that we can build on
There have been several research efforts for propos- top of CASeS to design a security metric tailored for WAMS.
ing security evaluation techniques to quantify the criticality
level of systems from a security point of view in the IT
domain [28]–[30]. However, those solutions can not be easily R EFERENCES
adapted to cyber-physical systems such as smart grid, since [1] H. Farhangi, “The path of the smart grid,” IEEE Power Energy Mag.,
those techniques are not tailored to meet the characteristics vol. 8, no. 1, pp. 18–28, Jan./Feb. 2010.
[2] R. Baheti and H. Gill, “Cyber-physical systems,” Impact Control
and dynamics of cyber-physical systems. Technol., vol. 12, no. 1, pp. 161–166, 2011.
Recently, the security assessment of the smart grid gained [3] H. Georg, S. C. Müller, C. Rehtanz, and C. Wietfeld, “Analyzing cyber-
much interest from the research community [4], [7]–[10], [13], physical energy systems: The INSPIRE cosimulation of power and
ICT systems using HLA,” IEEE Trans. Ind. Informat., vol. 10, no. 4,
[16], [31]. Indeed, Zonouz et al. [9] introduced SOCCA as pp. 2364–2373, Nov. 2014.
a cyber-physical contingency analysis framework to quantify [4] B. Moussa, M. Debbabi, and C. Assi, “Security assessment of time
the physical impact of cyber-attacks. Through SOCCA, the synchronization mechanisms for the smart grid,” IEEE Commun. Surveys
Tuts., vol. 18, no. 3, pp. 1952–1973, 3rd Quart., 2016.
authors use cyber and physical network typologies to define a [5] Y. Mo et al., “Cyber–physical security of a smart grid infrastructure,”
security metric representing overloaded transmission lines in Proc. IEEE, vol. 100, no. 1, pp. 195–209, Jan. 2012.
the presence of cyber attacks. Nevertheless, this metric does [6] S. Sridhar, A. Hahn, and M. Govindarasu, “Cyber–physical system
security for the electric power grid,” Proc. IEEE, vol. 100, no. 1,
not consider concurrent contingencies, and fails to capture pp. 210–224, Jan. 2012.
other physical impact at the power system level. Another work [7] Z. Lu, X. Lu,W. Wang, and C. Wang, “Review and evaluation of secu-
from the literature that is close to ours is presented in [13] rity threats on the communication networks in the smart grid,” in Proc.
Military Commun. Conf. (MILCOM), 2010, pp. 1830–1835.
where the authors devise a combinatorial impact evaluation
[8] A. Hahn and M. Govindarasu, “Cyber attack exposure evaluation frame-
in the power grid based on cyber-physical relations between work for the smart grid,” IEEE Trans. Smart Grid, vol. 2, no. 4,
the grid components. This evaluation establishes a metric to pp. 835–843, Dec. 2011.
quantify cyber-attacks impact on IP-based substations, and [9] S. Zonouz, C. M. Davis, K. R. Davis, R. Berthier, R. B. Bobba, and
W. H. Sanders, “SOCCA: A security-oriented cyber-physical contin-
identifies critical substations which may present a significant gency analysis in power infrastructures,” IEEE Trans. Smart Grid, vol. 5,
risk on the system when compromised. However, the authors no. 1, pp. 3–13, Jan. 2014.
consider a single substation outage as the worst case scenario [10] S. Zonouz, C. M. Davis, K. R. Davis, R. Berthier, R. B. Bobba, and
W. H. Sanders, “SCPSE: Security-oriented cyber-physical state estima-
and do not use any real power system testbed for the evalua- tion for power grid critical infrastructures,” IEEE Trans. Smart Grid,
tion of the impact. Our work can be mainly distinguished from vol. 3, no. 4, pp. 1790–1799, Dec. 2012.
the literature by the consideration of concurrent power con- [11] R. Kinney, P. Crucitti, R. Albert, and V. Latora, “Modeling cascading
failures in the North American power grid,” Eur. Phys. J. B, Condens.
tingencies (multiple coordinated cyber-physical compromises) Matter Complex Syst., vol. 46, no. 1, pp. 101–107, 2005.
stemming from a cyber origin, and evaluating the physical [12] B. Moussa, P. Akaber, M. Debbabi, and C. Assi, “Critical links identi-
impact of those compromises using a realistic HIL smart grid fication for selective outages in interdependent power-communication
networks,” IEEE Trans. Ind. Informat., vol. 14, no. 2, pp. 472–483,
testbed. Through CASeS, we leverage cyber-physical depen- Feb. 2018.
dencies, the communication network architecture, intrusion [13] C.-W. Ten, A. Ginter, and R. Bulbul, “Cyber-based contingency
detection system reports, firewall rules and access control poli- analysis,” IEEE Trans. Power Syst., vol. 31, no. 4, pp. 3040–3050,
Jul. 2016.
cies, and power system dynamics to provide a quantification [14] R. M. Lee, M. J. Assante, and T. Conway, Analysis of the Cyber Attack
of the system security based on explicit and implicit physical on the Ukrainian Power Grid SANS Ind. Control Syst., Bethesda, MD,
impact of cyber attacks. This quantification allows the antici- USA, 2016.
pation of the impact of cyber compromises, and the preparation [15] Industrial Control Systems Cyber Emergency Response Team. Accessed
Sep. 10, 2018. [Online]. Available: https://ics-cert.us-cert.gov/
of real-time corrective actions. [16] Y. Zhang, L. Wang, Y. Xiang, and C.-W. Ten “Inclusion of SCADA
cyber vulnerability in power system reliability assessment considering
VI. C ONCLUSION optimal resources allocation,” IEEE Trans. Power Syst., vol. 31, no. 6,
pp. 4379–4394, Nov. 2016.
In this paper, we presented a contingency analysis-based [17] P. Mell, K. Scarfone, and S. Romanosky, “Common vulnerability scoring
security evaluation framework with a special emphasis on system,” IEEE Security Privacy, vol. 4, no. 6, pp. 85–89, Nov. 2006.
Authorized licensed use limited to: Institute of Aeronautical Engineering. Downloaded on October 16,2024 at 11:21:00 UTC from IEEE Xplore. Restrictions apply.
AKABER et al.: CASeS: CONCURRENT CONTINGENCY ANALYSIS-BASED SECURITY METRIC DEPLOYMENT FOR SMART GRID 2687
[18] P. Mell, K. Scarfone, and S. Romanosky, A Complete Guide to the Ribal Atallah received the B.E. degree in com-
Common Vulnerability Scoring System Version 2.0, vol. 1. Cary, NC, puter engineering from the Notre Dame University
USA: FIRST, 2007, p. 23. of Louaize, Lebanon, in 2009, the M.Sc.E.
[19] P. Cheng, L. Wang, S. Jajodia, and A. Singhal, “Aggregating CVSS base degree in computer engineering from Lebanese
scores for semantics-rich network security metrics,” in Proc. IEEE 31st American University in 2012, and the Ph.D.
Symp. Reliable Distrib. Syst., 2012, pp. 31–40. degree in information and systems engineering from
[20] M. Zhang, L. Wang, S. Jajodia, and A. Singhal, “Network attack surface: Concordia University, Montreal, Canada, in 2017.
Lifting the concept of attack surface to the network level for evaluating He is currently a Cybersecurity Research Scientist
networks’ resilience against zero-day attacks,” IEEE Trans. Dependable with Hydro-Québec working on various machine
Secure Comput., to be published. learning algorithms to protect the smart grid against
[21] L. Wang, T. Islam, T. Long, A. Singhal, and S. Jajodia, “An attack cyber attacks. His research interests include deep
graph-based probabilistic security metric,” in Proc. IFIP Annu. Conf. learning, deep reinforcement learning, cyber security of the smart grid, and
Data Appl. Security Privacy, 2008, pp. 283–296. intelligent transportation systems and queuing theory.
[22] Defense Use Case, Analysis of the Cyber Attack on the Ukrainian Power
Grid. Elect. Inf. Sharing Anal. Center, Mar. 2016.
[23] A. Albarakati, B. Moussa, M. Debbabi, A. Youssef, B. L. Agba, and
M. Kassouf, “Openstack-based evaluation framework for smart grid Basile L. Agba received the M.Sc. and Ph.D. degrees in electronics and
cyber security,” in Proc. IEEE Int. Conf. Commun. Control Comput. optoelectronics from the University of Limoges, France. He is the Vision
Technol. Smart Grids (SmartGridComm), 2018, pp. 1–6. and Partnerships Manager and the Senior Scientist with the Hydro-Quebec
[24] B. Russell, Power System Control and Protection. Amsterdam, Research Institute. Since 2009, he has been an Adjunct Professor with the
Netherlands: Elsevier Sci., 2012. [Online]. Available: École de technologie supérieure, Montreal. He has coauthored many scien-
https://books.google.ca/books?id=zMqybMj5LjMC tific publications and the Springer book Wireless Communications for Power
[25] F.-Y. Wang, H. Zhang, and D. Liu, “Adaptive dynamic programming: Substations: RF Characterization and Modeling.
An introduction,” IEEE Comput. Intell. Mag., vol. 4, no. 2, pp. 39–47,
May 2009.
[26] J. Filar and K. Vrieze, Competitive Markov Decision Processes. Chadi Assi (Fellow, IEEE) received the B.Eng. degree from the Lebanese
Heidelberg, Germany: Springer, 2012. University, Beirut, in 1997, and the Ph.D. degree from the Graduate Center,
[27] “Network engineering guideline for communication networks and City University of New York, NY, USA, in April 2003. He was a Visiting
systems in substations,” IEC-TW57, Geneva, Switzerland, Rep. IEC Scientist with Nokia Research Center, Boston, from 2002 to 2003 for one year,
61850–90-4, 2013. working on quality-of-service in optical access networks. He is currently a
[28] J. Pamula, S. Jajodia, P. Ammann, and V. Swarup, “A weakest-adversary Professor with Concordia University, where he holds the Tier I University
security metric for network configuration security analysis,” in Proc. 2nd Research Chair. He is currently supervising a group of 14 Ph.D. students
ACM Workshop Quality Prot., 2006, pp. 31–38. and 4 M.A.Sc. students and has successfully supervised 18 Ph.D. students
[29] M. Frigault, L. Wang, A. Singhal, and S. Jajodia, “Measuring network and 25 M.A.Sc. students. His students received very prestigious awards from
security using dynamic Bayesian network,” in Proc. 4th ACM Workshop NSERC and FQRNT. His current research interests are in the general areas of
Quality Prot., 2008, pp. 23–30. networks, network design and modeling, network optimization, resource vir-
[30] I. Kotenko and M. Stepashkin, “Attack graph based evaluation of tualization and network, and cyber security. He received the Prestigious Mina
network security,” in Proc. IFIP Int. Conf. Commun. Multimedia Rees Dissertation Award from the City University of New York in August
Security, 2006, pp. 216–227. 2002 for his research on wavelength-division-multiplexing optical networks
[31] C.-W. Ten, K. Yamashita, Z. Yang, A. V. Vasilakos, and A. Ginter, and lightpath provisioning. He held a Tier II University Chair with Concordia
“Impact assessment of hypothesized cyberattacks on interconnected bulk from 2012 to 2017 in the area of wireless networks. He is on the Editorial
power systems,” IEEE Trans. Smart Grid, vol. 9, no. 5, pp. 4405–4425, Board of the IEEE C OMMUNICATIONS S URVEYS AND T UTORIALS, and
Sep. 2018. serves as an Associate Editor for the IEEE T RANSACTIONS ON V EHICULAR
T ECHNOLOGY, the IEEE T RANSACTION ON COMMUNICATIONS, the IEEE
Parisa Akaber, photograph and biography not available at the time of T RANSACTIONS ON M OBILE C OMPUTING, and the IEEE T RANSACTIONS
publication. ON N ETWORK AND S ERVICE M ANAGEMENT .
Authorized licensed use limited to: Institute of Aeronautical Engineering. Downloaded on October 16,2024 at 11:21:00 UTC from IEEE Xplore. Restrictions apply.