Smart Grid & Cyber Security - Georgetown Digital Commons

advertisement
Jayant Gandhi
Smarter Grid, Smarter Attacks
Cyber threats to a US smart grid and what can be done
Electricity is one of the most fundamental necessities for modern life. It is something we
all use every day and whose absence causes great distress. This holds true especially in the US.
However, since 1982, growth in peak demand for the US has grown more than transmission
growth by almost 25% every year.1 Combine this with the fact that US electrical utility industry
spends less than 2% of its revenues on R&D (much less than any other innovation based
industry) and you end up with an electrical grid in dire need of modernization.2 The original grid
was designed with only one goal: reliability (keeping the lights on). Of course, now we have
developed other concerns such as energy efficiency, environmental impacts, and even customer
choice. Reliability, too, has become an issue as the past decade saw three major blackouts in the
US including the most massive blackout in US history, the Northeast blackout of 2003, resulting
in an estimated $6 billion economic loss.3 The proposed solution to bring the grid into the 21st
century is to use information technology to allow for better communication across the grid that
would increase efficiency and reliability; this is known as a smart grid.
The financial benefits of a smart grid were the first to draw attention to the technology.
Even though the initial investment is very high the rewards are even higher. The Electric Power
Research Institute estimates that in order to modernize the US grid a total investment of about
$476 billion is required over the next 20 years, but would lead to about $2 trillion in savings.4
“The Smart Grid: An Introduction. How a smarter grid acts as an enabling engine for our economy, the
environment, and our future.”; DOE; p. 6
2
“2012 Global R & D Funding Forecast: Industrial R & D—Energy”; Martin Grueber;
3
“The Smart Grid: An Introduction. How a smarter grid acts as an enabling engine for our economy, the
environment, and our future.”; DOE; p. 12
4
“U.S. smart grid to cost billions, save trillions”; Scott DiSavino;
1
This has proven incentive enough for the major technology firms (Google, Toshiba, etc…) to
begin investing in smart grid technologies that will provide the foundation for the US
modernization of the grid.
The benefits of having a smart grid system implemented across the US are quite
remarkable. The Department of Energy (DOE) lists eight main qualities that a smart grid will
bring. The smart grid is intelligent; it can autonomously prevent or mitigate potential outages. It
is efficient and quality focused; communication between consumer and producer enables
advanced routing of energy that can meet increasing demand without the need for increasing
production and provide it in a consistent manner required by modern electronics. It is
accommodating of all input energy sources, which, when savings from efficiency are added,
creates a greener grid. It motivates consumers to make choices based on price or environmental
concerns. It can lead to new economic opportunities by allowing increased computerization. And
its decentralized nature makes it more resilient to attacks and natural disasters.5 These are all
highly desirable traits, but they do not tell the full story of the smart grid.
A smart grid would indeed increase the reliability of the grid. In fact, a smarter grid could
have been instrumental in preventing the cascading effect that led to the 2003 blackout which
originated from a computer bug in Ohio. However, while the decentralized nature of a smart grid
with its plethora of nodes the reroute power works wonders in the event of a natural disaster or
physical attack, it opens up the grid to a new kind of attack: cyber-attacks. In the event of a
cyber-attack, that same decentralized nature that allows a smart grid to quickly and efficiently
respond to surges or sags in the grid and the two-way communications used to create an efficient
distribution of power become the enemies of the grid. The increase in the number of access
“The Smart Grid: An Introduction. How a smarter grid acts as an enabling engine for our economy, the
environment, and our future.”; DOE; p. 17
5
points and routes for an attack to travel on makes a smart grid very susceptible to an attack from
cyberspace.
Cyber-attacks can often seem benign since they exist on a separate plane from us,6 but
they present a real threat to US national security. As the grid currently stands, an enterprising
terrorist organization could theoretically cause immense damage by creating blackouts worse
than the one seen in 2003. An aggressive nation could do the same and even use it as a prelude to
war. Smart grids give more access and thus more opportunities for these attacks and can even
amplify the effects. Of course a smart grid would not be sitting there unprotected waiting for any
evildoer to press a button and cause chaos. But what exactly would be needed to ensure a
protected grid? Because of the large assortment of technologies used to make a smart grid there
is no silver bullet solution. Instead, a safe smart grid requires not only heavy investment in the
infrastructure to provide the services, but also a huge investment in the information security
industry that will have to grow alongside the smart grid and is guided by both private industry
and the government.
Cyber threats are not new to smart grid systems, they present a real threat to regular
grids.7 The US grid has already suffered several intrusions into its electrical grid by foreign
entities in the past few years. The chief antagonists thus far have been Russia and China, who,
according to US intelligence, have attempted mapped the US electrical grid in order to probe for
weaknesses and in some cases going so far as to leave behind pieces of malware (malicious
computer code with the intent of causing damage) that could be activated to disrupt the grid.8
While none of this code has been activated nor is it evident that either country successfully
6
We inhabit the physical realm, cyber-weapons the cyber realm, but the interconnectivity of these two realms has
been increasing with the spread of computerized technologies.
7
I draw a line here between a true smart grid, which features widespread usage and dependence on information
technologies, and our current grid which contains some information technologies, but not in the integrated and
comprehensive manner of a true smart grid.
8
“Electricity Grid in U.S. Penetrated By Spies”; Siobhan Gorman;
completed their maps, the fact that two countries with which US relations can be somewhat
tumultuous have made it so far into our critical infrastructure is startling.
The cyber security of the current grid is such that it does not even require the resources of
a state to cause damage. Joe Weiss of Applied Control Solutions LLC, a security consulting
company based in California, estimates that a terrorist organization could potentially use cyberattacks to disable transformers resulting in a blackout that could last 9-18 months.9 For
comparison, the August 2003 blackout that caused over $6 billion in economic loss and at least
eleven fatalities only lasted four days, with power being restored incrementally throughout that
time. Now, the 9-18 months figure may be a bit exaggerated (a security firm has an interest in
making situations seem more dire than they are), but if a terrorist attack could even manage to
disrupt service for a month, that damage would be incredible.
The situation becomes even gloomier when one examines the current price to efficiency
relationship of cyber-security for US energy companies. A Bloomberg survey of 21 US energy
companies found that the average spending on cyber security for US companies was $45.8
million a year and were able to defend against 69% of known cyber-attacks on their systems.
Estimates provided by these companies state that an increase of about $25 million in annual
spending on cyber-security could improve their defense to 88%, but in order to get to 95% they
would have to spend a total of $344.6 million per year, which is way too much for any one
company to spend. The reason for this sharp increase in spending is due to the even sharper
increase in the complexity of attacks. Most of the attacks deflected are simple in design and
usually carried out by bots (automated computers), so the percentages can be misleading. It is
also this upper echelon of complex attacks that poses the greatest risks to the grid. To make
matters worse, if an attack were to occur and damage critical hardware there is an issue of
9
“Power-Grid Cyber Attack Seen Leaving Millions in Dark for Months”; Brian Wingfield;
whether or not we have enough replacement parts in supply to quickly repair the system. 10 So far
we have been lucky and a large scale attack has been avoided, but it seems like only a matter of
time before that luck runs out.
The cyber-security issues prevalent in the current grid are not resolved by the
introduction of smart grid
technologies, instead new
vulnerabilities are added to the grid.
Of these new vulnerabilities, perhaps
the most salient is the aforementioned
increase of entry points for a wouldbe attacker. In order for a smart grid
to function efficiently it needs to be
Figure 1
able to facilitate communication
between sectors. As this interconnectivity increases the options for point of entr for an attack
increase as well. The network described in figure 1 is the proposed model for what the US smart
grid would look like according to the National Institute of Standards and Technology (NIST).11
The most striking feature of the model is the number of connections between different domains
of the smart grid. Each of these domains, or nodes, serve as a possible entry point for a cyber
attack. By gaining entry to one of these nodes an attacker can move from one to another,
spreading malicious code on the way.
For example, consider an attack originating from the customer node. This is perhaps one
of the most troubling entry points because it would make every household and business on the
10
ibid
“Introduction to NISTIR 7628 Guidelines for Smart Grid Cyber Security: The Smart Grid Interoperability Panel
Cyber Security Working Group”; NIST; p. 11
11
grid a potential threat. According to IOActive, a cyber-security firm, it would only take about
$500 worth of equipment in the right hands to manipulate the smart meters in a household to
gain access to the grid and cause disruptions from there.12 Depending on the level of complexity
of the group perpetrating the attack, the effects could range from mild fluctuations in grid service
to regional blackouts. And monitoring such activity in private residences could prove difficult if
not impossible. This is not the only risk brought on by the interconnectivity of the smart grid.
In addition to granting a cyber-terrorist or rival nation access to more avenues of attack,
the high level of connections between the different domains of the smart grid can create the
perfect environment for cascading failures. A cascading failure is what happened in the 2003
blackout where one failure led to another, which, in turn, led to another, and so on. What makes
a cascading failure in a smart grid different is the number of steps taken. In 2003 the cascade
effect within the computer systems started with the failure of one alarm system, which then
caused the back-up server to fail due to the number of unprocessed events queued. This kept the
teams monitoring the grid in the dark so that they had no idea there was any danger.13 The rest of
the cascade effect was caused by one power system failing after another, but it all stemmed from
that original lack of information. In a smart grid, however, the cascade effect would not be
limited to one system since different systems are connected to other relevant ones. The failure
would go from one system to the next, which would increase the amount of repairs needed to be
done in order to bring the grid back on line. By dragging out the repair time you drag out the
duration of the disruption of service and increase the damage done.
Blackouts are not the only threat to a smart grid. If an attacker wanted to cause damage
without inducing a blackout they could achieve their goal by manipulating the quality of the
12
13
“Report: Spies hacked into U.S. electricity grid”; Martin LaMonica;
“Software Bug Contributed to Blackout”; Kevin Poulsen;
electricity being passed through the grid. Causing surges in the grid could damage unprotected
electronic equipment. High electronics, which are the most susceptible to such an attack, are
often hard and expensive to replace. Such sabotage could be targeted in a smart grid granting the
attacker a precision weapon.
The two-way flow of information between consumer and producer means there is a
potential for the compromise of data confidentiality. Producers in a smart grid will have to gather
extensive data on their consumers’ preferences, habits, and other personal information. A hacker,
by gaining access to the grid, can gain access to this information. While this is not as dire or
destructive as a black out or as costly as precision surge attacks it is still a real threat to the
consumer and can be used to aid further illicit activities. For example, by figuring out when a
household’s thermostat adjusts itself throughout the day, an intrepid criminal could figure out
when the house is empty and then burglarize the house.
Another vulnerability of a smart grid comes from its complexity. The magnitude of
complex networking and coding that goes into creating a large smart grid to serve a country like
the US increase the chance for bugs in the coding to be buried deep where they will not be found
until they cause an error. It also means that logic bombs (malware that only triggers once a
specific condition is met) can be hidden deep throughout the code of the smart grid as well. The
former is not an act of cyber-terrorism or warfare (it is human error), but it is still capable of
inflicting damage.
Clearly there are a lot of vulnerabilities inherent in a smart grid and the current US
industry average of fending off 69% of attacks is not going to cut it when a single attack can
cause massive damage. So what steps are we taking to ensure that as we update our grid we
maintain its security?
The NIST and the DOE have been collaborating in order to develop a roadmap to achieve
a secure smart grid. Together they have outlined six barriers to having a secure grid and five
strategies to deal with these barriers.
Barriers:
 Cyber threats are unpredictable and evolve faster than the sector’s ability to develop and
deploy countermeasures

Security upgrades to legacy systems are limited by inherent limitations of the equipment
and architectures

Performance/acceptance testing of new control and communication solutions is difficult
without disrupting operations

Threat, vulnerability, incident, and mitigation information sharing is insufficient among
government and industry

Weak business incentives for cyber-security investment by industry

Regulatory uncertainty in energy sector cyber-security
Strategies
 Build a culture of security

Assess and monitor risk

Develop and implement new protective measures to reduce risk

Manage incidents

Sustain security improvements
The goal is that, by 2020, the US will have a functioning smart grid that can survive a cyberattack without losing any critical functions.14 Each of these strategies seeks to address one or
14
“Roadmap to Achieve Energy Delivery Systems Cybersecurity”; DOE; p. 5
more of the issues plaguing cyber-security in the energy sector and they are all contingent on an
increase in the information security industry.
Creating a culture of security, while a somewhat nebulous sounding strategy, addresses
the weak incentives for investment by industry and the problem of information sharing. As
mentioned earlier, the costs of maintaining an efficient cyber-security program is expensive for
an individual company to maintain. The DOE suggests that a culture of security would lead to a
significant increase in the number of information security experts employed by the industry. To
reach this end, an educational campaign, led by industry-government cooperation, which
promotes better security awareness, must be implemented. Companies are not alone as one attack
can spread from company to company causing damage. Additional NIST found that cost of
mitigating a vulnerability late in development is up to 30 times more expensive than if the
vulnerability is caught at the beginning or early on.15 Creating an industry culture where high
security standards are expected requires the hiring of skilled information technology workers.
Assessing and monitoring risk deals with increasing communication within the industry
and the constantly changing nature of cyber threats. By creating standards and metrics to be used
in each subsector of the industry it becomes easier to track vulnerabilities. Catching these
vulnerabilities before they are exploited helps security experts catch up to the cyber-aggressors
who, one must assume, have already found the vulnerability.
The DOE and the NIST recommend a “Defense-in-depth” strategy when it comes to
developing new measures to reduce risk. This strategy is designed specifically to respond to a
security landscape that is constantly evolving. The basic idea is that security should be applied in
layers with each layer being made up of one or more security measure. For example, a firewall
could make up one layer of node’s defense, but if that is circumvented the intruder would now be
15
Ibid p. 28
subject to a layer containing intrusion detection and anti-virus software.16 While not a completely
novel concept, many personal computers feature both a firewall and anti-virus software, when
applied to each node in the smart grid network provide extra layers that would, at the very least,
slow down an attack allowing an effective response to be mounted.
The most important of these strategies, though, is mitigation of damage once an attack
has begun. This would ideally be achieve through a combination of automated systems designed
to reroute power and isolate “infected” areas of the grid in the event of an attack and teams of
information security experts working in tandem with engineers to limit the damage caused.
Mitigation is never the ideal solution, but it is the most crucial when setting up cyber defenses
for the smart grid.
Defense in the cyber realm has one key problem: “cyber-battle” is offense dominant. The
attacker always has the advantage. They are the ones who discover a vulnerability first or
develop a workaround for heavily guarded systems. A cyber-security expert is always
responding to what the attacker does. It is nearly impossible to predict what an attacker will do.
Checking for vulnerabilities achieves some kind of preemption, but it is not guided. An
attacker’s actions have a purpose and they seek out vulnerabilities to suit their purpose. The
defender cannot know this. Interestingly, this leads to a completely different solution for
securing the grid when dealing with nations versus terrorist groups. Posturing aggressively
against a rival nation can achieve a cyber-deterrence equilibrium.17By not worrying about attacks
from nations, smart grid cyber security workers do not have to worry as much about the most
complicated and highest tier of cyber-attacks that could only be undertaken by an entity with the
“NISTIR 7628 Guidelines for Smart Grid Cyber Security v1.0”; NIST; p. 25
This is the subject of my current undergraduate thesis. The explanation for how this comes about is long and
involved and would not serve the purpose of this paper to include in full.
16
17
resources of a state. This aggressive behavior, however, cannot work against cyber-terrorism, so
a capable cyber defense strategy is still required for critical infrastructure like the smart grid.
The ultimate goal of this roadmap is to create a system in which even when an attack is
sustained the power grid continues to provide reliable power (as much as possible) and recovers
quickly after an attack.18 There is only one way to ensure this: a large and devoted cyber-security
branch of the energy industry. The only way the US smart grid can be secure is if both the
government and industry commit to expanding their information security resources in order to
deal with the attacks that make it through the defense.
Ensuring the protection of a large, integrated, and extremely important network spanning
many different companies is no easy task. It requires a large investment of time, money, and
energy in order to protect the 24/7 constant reliability expected of something as essential as our
electrical grid. There are dreams of advanced encryption techniques or improved authentication
protocols that would secure communication over networks, but so far such technical solutions
have proven to be either too obtrusive as to hinder the desired interactions as well as malicious
ones or issues with the technologies have kept them as dreams. The benefits of a smart grid are
too many and too good to pass up because of these security concerns. It will just require constant
vigilance and adaptive strategies to protect.
18
Ibid p. 76
Bibliography:

“The Smart Grid: An Introduction. How a smarter grid acts as an enabling engine for our
economy, the environment, and our future.” ; prepared for the U.S. Department of Energy
by Litos Strategic Communication; 2009;
http://energy.gov/sites/prod/files/oeprod/DocumentsandMedia/DOE_SG_Book_Single_P
ages%281%29.pdf









“2012 Global R & D Funding Forecast: Industrial R & D—Energy”; Martin Grueber; R&D
Magazine; 12/16/2011; http://www.rdmag.com/articles/2011/12/2012-global-r-d-fundingforecast-industrial-r-d%E2%80%94energy
“U.S. smart grid to cost billions, save trillions”; Scott DiSavino; Reuters; 2011;
http://www.reuters.com/article/2011/05/24/us-utilities-smartgrid-epriidUSTRE74N7O420110524
“Electricity Grid in U.S. Penetrated By Spies”; Siobhan Gorman; The Wall Street Journal; April
8, 2009; http://online.wsj.com/article/SB123914805204099085.html
“Power-Grid Cyber Attack Seen Leaving Millions in Dark for Months”; Brian Wingfield;
Bloomberg.com; Feb 1, 2012; http://www.bloomberg.com/news/2012-02-01/cyber-attack-on-u-spower-grid-seen-leaving-millions-in-dark-for-months.html
“Introduction to NISTIR 7628 Guidelines for Smart Grid Cyber Security: The Smart Grid
Interoperability Panel Cyber Security Working Group”; National Institute of Standards and
Technology; September 2010; http://www.nist.gov/smartgrid/upload/nistir-7628_total.pdf
“Report: Spies hacked into U.S. electricity grid”; Martin LaMonica; Cnet.com; April 8, 2009;
http://news.cnet.com/8301-11128_3-10214898-54.html
“Software Bug Contributed to Blackout”; Kevin Poulsen; SecurityFocus; 2004-02-11;
http://www.securityfocus.com/news/8016
“Roadmap to Achieve Energy Delivery Systems Cybersecurity”; U.S. Department of Energy –
Energy Sector Control Systems Working Group; September 2011;
http://energy.gov/sites/prod/files/Energy%20Delivery%20Systems%20Cybersecurity%20Roadm
ap_finalweb.pdf
“NISTIR 7628 Guidelines for Smart Grid Cyber Security v1.0”; National Institute of Standards
and Technology; August 2010; http://www.nist.gov/smartgrid/upload/nistir-7628_total.pdf
Download