27
Discovering Vulnerabilities in Power Grids Daniel Bienstock Columbia University, New York Madison, 2009 Daniel Bienstock ( Columbia University, New York) Discovering Vulnerabilities in Power Grids Madison, 2009 1/9

Discovering Vulnerabilities in Power Gridsdano/talks/mad09.pdf · Discovering Vulnerabilities in Power Grids Daniel Bienstock Columbia University, New York Madison, 2009 Daniel Bienstock

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Discovering Vulnerabilities in Power Gridsdano/talks/mad09.pdf · Discovering Vulnerabilities in Power Grids Daniel Bienstock Columbia University, New York Madison, 2009 Daniel Bienstock

Discovering Vulnerabilities in Power Grids

Daniel Bienstock

Columbia University, New York

Madison, 2009

Daniel Bienstock ( Columbia University, New York)Discovering Vulnerabilities in Power Grids Madison, 2009 1 / 9

Page 2: Discovering Vulnerabilities in Power Gridsdano/talks/mad09.pdf · Discovering Vulnerabilities in Power Grids Daniel Bienstock Columbia University, New York Madison, 2009 Daniel Bienstock

The Problem

Background. National-scale blackouts in North America andEurope since Summer/Fall 2003 due to cascading power gridfailures, specifically, cascading failures of transmission systems.Experts agree: more failures inevitable in the future; potentialeconomic and social impact enormous.

The Rub. Modern power grids are robust but not perfect. Hidden,“complex” vulnerabilities remain. We want to discover suchvulnerabilities without becoming excessively conservative

Methodology? The N − k problem: in a grid with N lines, isthere a set of k lines whose simultaneous outage will create asystem instability?

Daniel Bienstock ( Columbia University, New York)Discovering Vulnerabilities in Power Grids Madison, 2009 2 / 9

Page 3: Discovering Vulnerabilities in Power Gridsdano/talks/mad09.pdf · Discovering Vulnerabilities in Power Grids Daniel Bienstock Columbia University, New York Madison, 2009 Daniel Bienstock

The Problem

Background. National-scale blackouts in North America andEurope since Summer/Fall 2003 due to cascading power gridfailures, specifically, cascading failures of transmission systems.Experts agree: more failures inevitable in the future; potentialeconomic and social impact enormous.

The Rub. Modern power grids are robust but not perfect. Hidden,“complex” vulnerabilities remain. We want to discover suchvulnerabilities without becoming excessively conservative

Methodology? The N − k problem: in a grid with N lines, isthere a set of k lines whose simultaneous outage will create asystem instability?

Daniel Bienstock ( Columbia University, New York)Discovering Vulnerabilities in Power Grids Madison, 2009 2 / 9

Page 4: Discovering Vulnerabilities in Power Gridsdano/talks/mad09.pdf · Discovering Vulnerabilities in Power Grids Daniel Bienstock Columbia University, New York Madison, 2009 Daniel Bienstock

The Problem

Background. National-scale blackouts in North America andEurope since Summer/Fall 2003 due to cascading power gridfailures, specifically, cascading failures of transmission systems.Experts agree: more failures inevitable in the future; potentialeconomic and social impact enormous.

The Rub. Modern power grids are robust but not perfect. Hidden,“complex” vulnerabilities remain. We want to discover suchvulnerabilities without becoming excessively conservative

Methodology? The N − k problem: in a grid with N lines, isthere a set of k lines whose simultaneous outage will create asystem instability?

Daniel Bienstock ( Columbia University, New York)Discovering Vulnerabilities in Power Grids Madison, 2009 2 / 9

Page 5: Discovering Vulnerabilities in Power Gridsdano/talks/mad09.pdf · Discovering Vulnerabilities in Power Grids Daniel Bienstock Columbia University, New York Madison, 2009 Daniel Bienstock

Is it the Right Problem?

It is fundamentally a static model – but the sequence of eventscould matter.

The context almost certainly does matter – what is the distributionof demand (and not just in aggregate form). How about generationcapacity? Is the grid “stressed”, impeded or diminished to asignificant degree?

Difficult to explicitly (and accurately) model such stress – lots ofnoise.

The N − k methodology is too slow. Difficult to scale well withincreasing N and, especially, k (e.g. huge jump from 2 to 3).

Daniel Bienstock ( Columbia University, New York)Discovering Vulnerabilities in Power Grids Madison, 2009 3 / 9

Page 6: Discovering Vulnerabilities in Power Gridsdano/talks/mad09.pdf · Discovering Vulnerabilities in Power Grids Daniel Bienstock Columbia University, New York Madison, 2009 Daniel Bienstock

Is it the Right Problem?

It is fundamentally a static model – but the sequence of eventscould matter.

The context almost certainly does matter – what is the distributionof demand (and not just in aggregate form). How about generationcapacity? Is the grid “stressed”, impeded or diminished to asignificant degree?

Difficult to explicitly (and accurately) model such stress – lots ofnoise.

The N − k methodology is too slow. Difficult to scale well withincreasing N and, especially, k (e.g. huge jump from 2 to 3).

Daniel Bienstock ( Columbia University, New York)Discovering Vulnerabilities in Power Grids Madison, 2009 3 / 9

Page 7: Discovering Vulnerabilities in Power Gridsdano/talks/mad09.pdf · Discovering Vulnerabilities in Power Grids Daniel Bienstock Columbia University, New York Madison, 2009 Daniel Bienstock

Is it the Right Problem?

It is fundamentally a static model – but the sequence of eventscould matter.

The context almost certainly does matter – what is the distributionof demand (and not just in aggregate form). How about generationcapacity? Is the grid “stressed”, impeded or diminished to asignificant degree?

Difficult to explicitly (and accurately) model such stress – lots ofnoise.

The N − k methodology is too slow. Difficult to scale well withincreasing N and, especially, k (e.g. huge jump from 2 to 3).

Daniel Bienstock ( Columbia University, New York)Discovering Vulnerabilities in Power Grids Madison, 2009 3 / 9

Page 8: Discovering Vulnerabilities in Power Gridsdano/talks/mad09.pdf · Discovering Vulnerabilities in Power Grids Daniel Bienstock Columbia University, New York Madison, 2009 Daniel Bienstock

Is it the Right Problem?

It is fundamentally a static model – but the sequence of eventscould matter.

The context almost certainly does matter – what is the distributionof demand (and not just in aggregate form). How about generationcapacity? Is the grid “stressed”, impeded or diminished to asignificant degree?

Difficult to explicitly (and accurately) model such stress – lots ofnoise.

The N − k methodology is too slow. Difficult to scale well withincreasing N and, especially, k (e.g. huge jump from 2 to 3).

Daniel Bienstock ( Columbia University, New York)Discovering Vulnerabilities in Power Grids Madison, 2009 3 / 9

Page 9: Discovering Vulnerabilities in Power Gridsdano/talks/mad09.pdf · Discovering Vulnerabilities in Power Grids Daniel Bienstock Columbia University, New York Madison, 2009 Daniel Bienstock

What should we expect from a vulnerability model?

It should be agnostic – ideally, it should be assumption-free, sothat we don’t just find the vulnerabilities we expect to find.

Annoying is a better term. We need out-of-the-box thinking.

It should be adversarial – it should allow a controller vs.adversary game.

Adversary → Controller → Adversary → . . .

From a computational standpoint, it should be fast and scale well.

Daniel Bienstock ( Columbia University, New York)Discovering Vulnerabilities in Power Grids Madison, 2009 4 / 9

Page 10: Discovering Vulnerabilities in Power Gridsdano/talks/mad09.pdf · Discovering Vulnerabilities in Power Grids Daniel Bienstock Columbia University, New York Madison, 2009 Daniel Bienstock

What should we expect from a vulnerability model?

It should be agnostic – ideally, it should be assumption-free, sothat we don’t just find the vulnerabilities we expect to find.

Annoying is a better term. We need out-of-the-box thinking.

It should be adversarial – it should allow a controller vs.adversary game.

Adversary → Controller → Adversary → . . .

From a computational standpoint, it should be fast and scale well.

Daniel Bienstock ( Columbia University, New York)Discovering Vulnerabilities in Power Grids Madison, 2009 4 / 9

Page 11: Discovering Vulnerabilities in Power Gridsdano/talks/mad09.pdf · Discovering Vulnerabilities in Power Grids Daniel Bienstock Columbia University, New York Madison, 2009 Daniel Bienstock

What should we expect from a vulnerability model?

It should be agnostic – ideally, it should be assumption-free, sothat we don’t just find the vulnerabilities we expect to find.

Annoying is a better term. We need out-of-the-box thinking.

It should be adversarial – it should allow a controller vs.adversary game.

Adversary → Controller → Adversary → . . .

From a computational standpoint, it should be fast and scale well.

Daniel Bienstock ( Columbia University, New York)Discovering Vulnerabilities in Power Grids Madison, 2009 4 / 9

Page 12: Discovering Vulnerabilities in Power Gridsdano/talks/mad09.pdf · Discovering Vulnerabilities in Power Grids Daniel Bienstock Columbia University, New York Madison, 2009 Daniel Bienstock

What should we expect from a vulnerability model?

It should be agnostic – ideally, it should be assumption-free, sothat we don’t just find the vulnerabilities we expect to find.

Annoying is a better term. We need out-of-the-box thinking.

It should be adversarial – it should allow a controller vs.adversary game.

Adversary → Controller → Adversary → . . .

From a computational standpoint, it should be fast and scale well.

Daniel Bienstock ( Columbia University, New York)Discovering Vulnerabilities in Power Grids Madison, 2009 4 / 9

Page 13: Discovering Vulnerabilities in Power Gridsdano/talks/mad09.pdf · Discovering Vulnerabilities in Power Grids Daniel Bienstock Columbia University, New York Madison, 2009 Daniel Bienstock

What should we expect from a vulnerability model?

It should be agnostic – ideally, it should be assumption-free, sothat we don’t just find the vulnerabilities we expect to find.

Annoying is a better term. We need out-of-the-box thinking.

It should be adversarial – it should allow a controller vs.adversary game.

Adversary → Controller → Adversary → . . .

From a computational standpoint, it should be fast and scale well.

Daniel Bienstock ( Columbia University, New York)Discovering Vulnerabilities in Power Grids Madison, 2009 4 / 9

Page 14: Discovering Vulnerabilities in Power Gridsdano/talks/mad09.pdf · Discovering Vulnerabilities in Power Grids Daniel Bienstock Columbia University, New York Madison, 2009 Daniel Bienstock

Why is the N − k model slow?

At the core, it is an enumerational approach.

But an astronomical amount of enumeration would be required ifexplictly carried out. Intelligent, implicit enumeration (integerprogramming) can be used, but even that method is slow.

98 nodes, 204 lines, 15 generatorsS = a vulnerability with k lines was found

F = there is no a vulnerability with ≤ k linesk

Min. throughput 2 3 40.90 193, F 6598, F 206350, S0.88 256, F 15445, F 984743, F0.84 133, F 5565, F 232525, F0.75 213, F 7550, F 100583, F

Daniel Bienstock ( Columbia University, New York)Discovering Vulnerabilities in Power Grids Madison, 2009 5 / 9

Page 15: Discovering Vulnerabilities in Power Gridsdano/talks/mad09.pdf · Discovering Vulnerabilities in Power Grids Daniel Bienstock Columbia University, New York Madison, 2009 Daniel Bienstock

Why is the N − k model slow?

At the core, it is an enumerational approach.

But an astronomical amount of enumeration would be required ifexplictly carried out. Intelligent, implicit enumeration (integerprogramming) can be used, but even that method is slow.

98 nodes, 204 lines, 15 generatorsS = a vulnerability with k lines was found

F = there is no a vulnerability with ≤ k linesk

Min. throughput 2 3 40.90 193, F 6598, F 206350, S0.88 256, F 15445, F 984743, F0.84 133, F 5565, F 232525, F0.75 213, F 7550, F 100583, F

Daniel Bienstock ( Columbia University, New York)Discovering Vulnerabilities in Power Grids Madison, 2009 5 / 9

Page 16: Discovering Vulnerabilities in Power Gridsdano/talks/mad09.pdf · Discovering Vulnerabilities in Power Grids Daniel Bienstock Columbia University, New York Madison, 2009 Daniel Bienstock

Why is the N − k model slow?

At the core, it is an enumerational approach.

But an astronomical amount of enumeration would be required ifexplictly carried out. Intelligent, implicit enumeration (integerprogramming) can be used, but even that method is slow.

98 nodes, 204 lines, 15 generatorsS = a vulnerability with k lines was found

F = there is no a vulnerability with ≤ k linesk

Min. throughput 2 3 40.90 193, F 6598, F 206350, S0.88 256, F 15445, F 984743, F0.84 133, F 5565, F 232525, F0.75 213, F 7550, F 100583, F

Daniel Bienstock ( Columbia University, New York)Discovering Vulnerabilities in Power Grids Madison, 2009 5 / 9

Page 17: Discovering Vulnerabilities in Power Gridsdano/talks/mad09.pdf · Discovering Vulnerabilities in Power Grids Daniel Bienstock Columbia University, New York Madison, 2009 Daniel Bienstock

A new model

The goal: find hidden, complex vulnerabilities of varying severityin an agnostic manner

How: Place stress on the system, see what “shakes out”

A means to an end: assume an adversary has limited power tochange the laws of physics – in order to limit the amount ofsatisfied

and: Find where and to what degree the adversary wants tostress the system.

Daniel Bienstock ( Columbia University, New York)Discovering Vulnerabilities in Power Grids Madison, 2009 6 / 9

Page 18: Discovering Vulnerabilities in Power Gridsdano/talks/mad09.pdf · Discovering Vulnerabilities in Power Grids Daniel Bienstock Columbia University, New York Madison, 2009 Daniel Bienstock

A new model

The goal: find hidden, complex vulnerabilities of varying severityin an agnostic manner

How: Place stress on the system, see what “shakes out”

A means to an end: assume an adversary has limited power tochange the laws of physics – in order to limit the amount ofsatisfied

and: Find where and to what degree the adversary wants tostress the system.

Daniel Bienstock ( Columbia University, New York)Discovering Vulnerabilities in Power Grids Madison, 2009 6 / 9

Page 19: Discovering Vulnerabilities in Power Gridsdano/talks/mad09.pdf · Discovering Vulnerabilities in Power Grids Daniel Bienstock Columbia University, New York Madison, 2009 Daniel Bienstock

A new model

The goal: find hidden, complex vulnerabilities of varying severityin an agnostic manner

How: Place stress on the system, see what “shakes out”

A means to an end: assume an adversary has limited power tochange the laws of physics – in order to limit the amount ofsatisfied

and: Find where and to what degree the adversary wants tostress the system.

Daniel Bienstock ( Columbia University, New York)Discovering Vulnerabilities in Power Grids Madison, 2009 6 / 9

Page 20: Discovering Vulnerabilities in Power Gridsdano/talks/mad09.pdf · Discovering Vulnerabilities in Power Grids Daniel Bienstock Columbia University, New York Madison, 2009 Daniel Bienstock

A new model

The goal: find hidden, complex vulnerabilities of varying severityin an agnostic manner

How: Place stress on the system, see what “shakes out”

A means to an end: assume an adversary has limited power tochange the laws of physics – in order to limit the amount ofsatisfied

and: Find where and to what degree the adversary wants tostress the system.

Daniel Bienstock ( Columbia University, New York)Discovering Vulnerabilities in Power Grids Madison, 2009 6 / 9

Page 21: Discovering Vulnerabilities in Power Gridsdano/talks/mad09.pdf · Discovering Vulnerabilities in Power Grids Daniel Bienstock Columbia University, New York Madison, 2009 Daniel Bienstock

Details:

Basic power flow equation for line between i and j:f ij = x ij (θi − θj ) (linear approx.)f ij = x ij sin (θi − θj ) (lossless case)

f ij = power flow, θi , θj = phase angles, x ij = “impedance”.

Adversary can change the x ij

Fact: If x ij is huge, then line effectively blocked

The adversary is constrained : each individual change isbounded, as is the cumulative change

Daniel Bienstock ( Columbia University, New York)Discovering Vulnerabilities in Power Grids Madison, 2009 7 / 9

Page 22: Discovering Vulnerabilities in Power Gridsdano/talks/mad09.pdf · Discovering Vulnerabilities in Power Grids Daniel Bienstock Columbia University, New York Madison, 2009 Daniel Bienstock

Details:

Basic power flow equation for line between i and j:f ij = x ij (θi − θj ) (linear approx.)f ij = x ij sin (θi − θj ) (lossless case)

f ij = power flow, θi , θj = phase angles, x ij = “impedance”.

Adversary can change the x ij

Fact: If x ij is huge, then line effectively blocked

The adversary is constrained : each individual change isbounded, as is the cumulative change

Daniel Bienstock ( Columbia University, New York)Discovering Vulnerabilities in Power Grids Madison, 2009 7 / 9

Page 23: Discovering Vulnerabilities in Power Gridsdano/talks/mad09.pdf · Discovering Vulnerabilities in Power Grids Daniel Bienstock Columbia University, New York Madison, 2009 Daniel Bienstock

Details:

Basic power flow equation for line between i and j:f ij = x ij (θi − θj ) (linear approx.)f ij = x ij sin (θi − θj ) (lossless case)

f ij = power flow, θi , θj = phase angles, x ij = “impedance”.

Adversary can change the x ij

Fact: If x ij is huge, then line effectively blocked

The adversary is constrained : each individual change isbounded, as is the cumulative change

Daniel Bienstock ( Columbia University, New York)Discovering Vulnerabilities in Power Grids Madison, 2009 7 / 9

Page 24: Discovering Vulnerabilities in Power Gridsdano/talks/mad09.pdf · Discovering Vulnerabilities in Power Grids Daniel Bienstock Columbia University, New York Madison, 2009 Daniel Bienstock

Details:

Basic power flow equation for line between i and j:f ij = x ij (θi − θj ) (linear approx.)f ij = x ij sin (θi − θj ) (lossless case)

f ij = power flow, θi , θj = phase angles, x ij = “impedance”.

Adversary can change the x ij

Fact: If x ij is huge, then line effectively blocked

The adversary is constrained : each individual change isbounded, as is the cumulative change

Daniel Bienstock ( Columbia University, New York)Discovering Vulnerabilities in Power Grids Madison, 2009 7 / 9

Page 25: Discovering Vulnerabilities in Power Gridsdano/talks/mad09.pdf · Discovering Vulnerabilities in Power Grids Daniel Bienstock Columbia University, New York Madison, 2009 Daniel Bienstock

Is the model fast?

Table: 600 nodes, 990 lines

Budget10 20 27 36 40

sec 11848 7500 4502 11251 7800

Its Limit 210 114 Limit 208

Problem is less overtly combinatorial

Daniel Bienstock ( Columbia University, New York)Discovering Vulnerabilities in Power Grids Madison, 2009 8 / 9

Page 26: Discovering Vulnerabilities in Power Gridsdano/talks/mad09.pdf · Discovering Vulnerabilities in Power Grids Daniel Bienstock Columbia University, New York Madison, 2009 Daniel Bienstock

Is the model fast?

Table: 600 nodes, 990 lines

Budget10 20 27 36 40

sec 11848 7500 4502 11251 7800

Its Limit 210 114 Limit 208

Problem is less overtly combinatorial

Daniel Bienstock ( Columbia University, New York)Discovering Vulnerabilities in Power Grids Madison, 2009 8 / 9

Page 27: Discovering Vulnerabilities in Power Gridsdano/talks/mad09.pdf · Discovering Vulnerabilities in Power Grids Daniel Bienstock Columbia University, New York Madison, 2009 Daniel Bienstock

What kind of attack pattern do we get?

Table: Attack histogram

1 ≤ x ij ≤ 20 1 ≤ x ij ≤ 10 1 ≤ x ij ≤ 10x-Range Qtty x-Range Qtty x-Range Qtty[ 1, 1 ] 8 [ 1, 1 ] 1 [ 1, 1 ] 14( 1, 2 ] 72 ( 1, 2 ] 405 ( 1, 2 ] 970( 2, 3 ] 4 ( 2, 9 ] 0 ( 2, 5 ] 3( 5, 6 ] 1 ( 9, 10 ] 3 ( 5, 6 ] 0( 6, 7 ] 1 ( 6, 7 ] 1( 7, 8 ] 4 ( 7, 9 ] 0( 8, 20 ] 0 ( 9, 10 ] 2

Daniel Bienstock ( Columbia University, New York)Discovering Vulnerabilities in Power Grids Madison, 2009 9 / 9