3.1. Success Ratio
To provide an overview of the results and ease the comparison of the two models,
Figure 2 shows the success ratio (the number of successful attacks divided by the total number of attacks) of the MaDIoT attacks simulated for the scenarios presented in
Table 5. In this figure, the differences in the success ratios between the US39 scenario and the EU scenarios are noticeable.
For the US39 scenario, it is remarkable that all the attacks simulated that compromised more than 150 k bots were successful. In fact, the difference between 150 k and 200 k is significant, going from 10% success probability to 100%. The consideration of an attack as successful if it trips at least one protection explains this difference. This means that, under the conditions assumed, it does not matter if the buses affected are close between them when compromising more than 150 k bots: the attack will always manage to disconnect loads or generation. Therefore, the attacker does not need advanced knowledge of the grid: by performing its attack during the peak demand hour, the probability of success could be high. It may seem like this contradicts the results presented in [
11]; however, it should be taken into account that the study in [
11] considered a daily load pattern for the grid, so its results may aggregate the success ratio of carrying out madiot attacks during valley demand hours (which could present lower success ratios) and during peak demand (which could present higher success ratios).
On the other hand, regarding the PST-16 system, MaDIoT attacks start being successful in the EU-A and EU-C scenarios for botnets
k bots and, for the EU-B scenario, for botnets
k. While EU-A and EU-C end up having a similar success ratio (≈30%) for the largest botnet size considered, the maximum success ratio for the EU-B scenario is significantly smaller (≈10%). As
Figure 1 shows, areas A and C are the areas with the highest gap between generation capacity and demand: area A has more generation than demand, while area C needs to import power from outside the area.
The number of bots needed to have a successful attack is lower in the IEEE 39-Bus system than in the PST-16 as it is also a smaller system.
3.2. Impact of MaDIoT Attacks on Test Systems
Despite the fact that IEEE 39-Bus and the PST-16 grid models present different success ratios to the MaDIoT attacks, the success ratio is not tantamount to the degree of the impact (the number of loads and/or generators disconnected).
Table 6 shows the average generation and demand disconnected in successful MaDIoT attacks to 500 k bots in the US39 and EU-C scenarios (EU-C is the highest impact scenario for the PST-16 model). Although the average demand affected is similar in both scenarios, in the US39 scenario generation is not disconnected. To compare them, two high-impact cases (one per model) have been selected for analysis in this paper. The results of these two cases are plotted in
Figure 3,
Figure 4 and
Figure 5, which are discussed below.
Figure 3 plots the frequency (Hz), the voltages (p.u), and the relative rotor angle of generators (with respect to the reference generator) against time when compromising a total of 500 k bots within loads 30, 31, and 34 in the PST-16 model (one high-impact EU-C scenario). The time of the attack (t = 1 s) is indicated by “*” in the
x-axis. For the frequency and voltages, only the information for six buses is plotted, including the buses to which the attacked loads are connected, to keep the figure visually simple. Regarding the relative rotor angle, only three generators from area C are represented.
Figure 3 shows how the attack significantly destabilises the system.
Figure 4 shows a zoom on the frequency and the relative rotor angle during the first 10 seconds of the case shown in
Figure 3. Starting with the frequency, the attack has, at first, a reduced impact that is noticeable for a few seconds; a slight oscillation between the areas is observed, but the system manages to confine frequency variations and is apparently stable. Nevertheless, by t = 15 s, area C diverges from the other two areas. The frequency of bus C10, which has generation connected, drops suddenly to 46 Hz at around t = 18.5 s. These frequency variations about 12 s after the attack are explained by the loss of the rotor angle stability of the system.
The middle plot of
Figure 3 clearly shows the immediate high impact that the attack has on the voltages of area C. It is worth remembering that the system, prior to the attack, was already working under what could be considered peak-demand conditions and that, under these conditions, area C was already dependent on the power imports from the other two areas. The voltages of the buses attacked drop significantly to just above the limit configured for the tripping of the undervoltage protections. However, due to the increase in demand caused by the attack, the system loses rotor angle stability and goes into voltage collapse. The bottom plot of
Figure 3 shows that the rotor angles in the generators of area C start to diverge with respect to the reference generator after some initial oscillations. Therefore, the system first experiences a rotor angle stability problem that leads to a voltage collapse.
Since voltages drop below 0.85 p.u for more than 10s (
Figure 3), undervoltage protections start tripping, disconnecting loads from the system. The actuation of these protections, together with the UFLS and OFGR protections in the frequency domain, are one of the main causes for the oscillations in the 15–20 s interval. After the actuation of the protections, the system seems to recover by t = 20 s but with rather low voltage levels (e.g., at Bus C10). By that time, nearly 2.9 GW of generation has become disconnected from the system due to the OFGR scheme. However, the impact could be different if further protection features were implemented (e.g., distance protection with/without out-of-step protection). In this case, despite facing an increase in the demand due to the attack, the system ends up with around 3 GW less demand than before the attack (≈20% decrease), due to load shedding (UFLS and undervoltage protections). This means that not only the equivalent to the extraordinary demand caused by the attack had to be disconnected from the system but also that more loads had to be disconnected for the system to recover.
Similarly to
Figure 3,
Figure 5 plots the frequency and voltages when attacking 500 k bots in loads 12, 16, and 28 in the IEEE 39-Bus system (one high-impact US39 scenario).
In the case plotted, the immediate impact of the attack on the frequency and voltages of the system is significant. It can be observed that the frequency drops by 1 Hz in approximately two seconds. Below 59 Hz, the UFLS scheme starts actuating, as described in
Table 2. This softens the drop in frequency; only when it reaches ≈58.6 Hz does the system start to increase the frequency. However, the recovery is slow. In this case, the system manages to keep all voltages within limits, so the only protections tripping are the UFLS protections. These protections shed about 1.1 GW of loads along the system. Nevertheless, despite disconnecting loads, the total demand of the system increases by 76 MW with respect to the demand before the attack (≈1.2% increase). This means that, practically, the amount of demand disconnected is equivalent to the demand increase provoked by the attack. However, the shedding also affects legitimate loads as UFLS protections make no distinction. Compared to the EU-C case analysed in
Figure 3, the relative impact is smaller because the system manages to maintain its stability.
Therefore, although any attack compromising any three buses in the IEEE 39-Bus system may be successful, its impact could be relatively low, equivalent to the magnitude of the attack. On the other hand, destabilising the PST-16 system is more difficult as it is larger and has more resources to face the attack; however, as discussed, a successful attack can significantly affect the stability of the system, causing the partial disconnection of loads and generation.
The results presented also show the different types of impact that MaDIoT attacks have on different grids. In the case presented for the PST-16 system, the attack mainly affects rotor angle instability in area C and voltages, whereas for the IEEE 39-Bus system the main impact was on the frequency, motivated by the high inertia of the generation in the model.
It should be highlighted that these results correspond to a worst-case-like scenario where demand is high, and the attack affects only three electrical nodes that are close among them. The success ratio and impact of the attack can be expected to be lower when the attack is distributed among a greater number of nodes (while keeping the same botnet size), when demand is low (as more line capacity becomes available and the relative attack size per botnet size is smaller) or when distant nodes are the ones affected (for example, when there is only one node per area in the PST-16 model). Not only the size but also the location of the attack has an impact on the survival of the system, i.e., whether or not the attack can destabilise the power system. For instance, while the distribution of the attacks among different locations affects fewer frequency-stability-induced problems, it may affect voltage-stability-induced problems.