Events & Attacks

Here, we describe the attacks carried out for the test set of each scenario. We also plot the the time series for each data point.

01-Basic

Training

IDTypeAttackStart TimeDurationDescription
1Cable maintenanceFalse0:21:230:00:30The control center issues control commands to disconnect a cable, enabling maintenance personnel safe interactions with the cable.
2Generator ControlFalse1:34:18The control center issues a control command to (re)connect a generator to the grid.
3Transformer maintenanceFalse3:09:04The control center issues control commands to enable the maintenance of an MV/LV transformer
4Separator movementFalse5:17:460:00:05The control center issues control commands to move the separator position by closing and opening switches.
5Generator controlFalse6:08:07The control center issues a command to set the power infeed of a generator to 700 kW.
6Manual commandsFalse6:53:30Manual commands
7Generator ControlFalse7:38:11The control center issues a control command to reduce the power infeed of a generator.

Test

IDTypeAttackStart TimeDurationDescription
1Host InsertionTrue0:04:30The attackers physically attach a new host to the network
2IndustroyerTrue1:11:240:03:00The attackers perform an industroyer-like attack, repeatedly sending commands to open circuit breakers
3Attack CountermeasureFalse1:14:57The control center sends manual commands to counteract the previous Industroyer attack by closing two switches
4Drift OffTrue1:38:520:08:07As an MitM, the attackers perfom a drift-off attack manipulating the voltage readings at two buses to drift off towards predefined factors.
5IndustroyerTrue2:12:110:02:50Industroyer-like attack disconnecting a power generation facility from the grid
6Attack CountermeasureFalse2:15:47The control center sends manual commands to counteract the previous Industroyer attack.
7Generator Infeed ControlFalse2:45:11The control center sends commands to reduce the active power infeed of a generator to 75% (15 kW)
8Control & FreezeTrue3:11:320:06:00As a MitM, the attackers perform a control & freeze attack: First, measurements at one or multiple RTUs are recorded and their trend is interpolated. Then, control commands to disconnect switches are inserted into the active connection(s). Future measurements are manipulated to mimic the former trend, hiding the attack’s effects (a local blackout) from the control center.
9Attack CountermeasureFalse3:19:14The control center issues manual commands to counteract the previous Control & Freeze attack.
10Cable MaintenanceFalse4:05:210:00:40The operator changes the grid’s topology by opening and closing switches to allow for a cable maintenance, i.e., by completely disconnecting the respective line.
11Arp Spoofing DoSTrue4:11:230:02:06Using ARP Spoofing, the attackers interfere with the connections between the control center and two RTUs
12IndustroyerTrue4:55:280:03:05Industroyer-like attack open circuit breakers to disconnect a part of the grid
13Attack CountermeasureFalse5:00:00The control center issues manual commands to counteract the previous Industroyer attack.
14Separator MovementFalse5:28:560:00:07The operator issues control commands to move the separator in an open ring to optimize the power flow and reduce load on affected lines.
15Drift OffTrue5:47:420:08:14As an MitM, the attackers perform a drift-off attack against a single bus voltage measurement to experience excessive amounts of noise, provoking the classification of a faulty sensor.
16Control & FreezeTrue6:15:360:09:10Following the previous Control & Freeze attack, the attackers now manipulate the power infeed of a generator. To further mask the attack’s effects, the infeed is reduced gradually over time using a secondary connection.
17Attack CountermeasureFalse6:26:31The control center issues commands to reset the power infeed as a countermeasure to the previous Control & Freeze attack.
18IndustroyerTrue6:43:270:03:01Industroyer-like attack, disconnecting a consumer (load) from the grid.
19Attack CountermeasureFalse6:47:05The control center issues manual commands to counteract the previous Industroyer attack.
20Transformer MaintenanceFalse7:05:21The operator issues control commands to disconnect an MV/LV transformer from the grid, allowing safe maintenance.
21Control & FreezeTrue7:24:330:06:01Using a central vantage point in the network, the attackers attack over 10 RTUs simultaneously for measurement manipulation, allowing the attacker to control a significant portion of all measurements. In the control phase, a local blackout is induced and then masked during the freeze phase.
22Attack CountermeasureFalse7:32:29The control center issues commands to reset the power grid’s topology as a countermeasure to the previous Control & Freeze attack.
23Drift OffTrue7:56:280:09:58As an MitM, the attackers perform a drift-off attack manipulating the voltage measurement at a single bus towards a strict over-voltage condition.
24IndustroyerTrue8:11:580:02:57Industroyer-like attack, reducing the power infeed of a power generation facility
25Attack CountermeasureFalse8:16:23The control center issues control commands to reset the power infeed as a countermeasure to the previous Industroyer attack.
26Generator Infeed ControlFalse8:32:42The control center issues control commands to change the infeed of a generator.
27Control & FreezeTrue8:46:440:05:30Similar to the previous control & freeze attack, the attackers induce a local blackout and manipulate the measurements at multiple RTUs.
28Attack CountermeasureFalse8:53:41The control center issues control commands to counteract the effects of the previous control & freeze attack
29IndustroyerTrue9:18:570:02:52Industroyer-like attack, repeatedly forcing circuit breakers to be closed (limiting the operators control)
30ARP Spoofing DoSTrue9:51:050:02:08Using ARP Spoofing, the attackers interfere with the connections between the control center and two RTUs
31Control & FreezeTrue10:04:270:09:17As an MitM, the attackers record and manipulate measurements before inserting control commands to gradually reduce the power infeed of a generator using a secondary connection.
32Attack CountermeasureFalse10:14:33The control center issues commands to counteract the previous control & freeze attack
33Transformer Tap ControlFalse10:26:40The control center issues a control command (Step Down) to change the tap position of a transformer, influencing the voltage at the lower voltage side of the transformer.
34IndustroyerTrue10:32:190:02:58Industroyer-like attack, disconnecting multiple generators and storages
35Attack CountermeasureFalse10:36:08The control center issues commands to counteract the previous industroyer attack.
36Drift OffTrue10:46:320:08:17As an MitM, the attackers perform a drift-off attack manipulating the active and reactive power measurements of two loads, inducing noise and excessive power consumption.
37Transformer Tap ControlFalse11:07:00The control center issues a control command (Step Up) to change the tap position of a transformer, influencing the voltage at the lower voltage side of the transformer.
38Topology ChangeFalse11:32:500:00:30The operator issues control command to change the grid’s topology
39Topology ChangeFalse11:37:020:00:24The operator issues control command to change the grid’s topology, reducing the load on a specific part of the grid
40Cable MaintenanceFalse11:52:110:00:44The control center issues control commands to allow for a cable maintenance. To reduce the load on the remaining lines, the infeed of a generator is reduced.

02-Semiurban

Training

IDTypeAttackStart TimeDurationDescription
1Separator MovementFalse0:58:450:00:20The separator of an open ring in the grid is moved by first closing a disconnecting switch before opening another switch to control the power flow of two wind power plants.
2Transformer MaintenanceFalse1:25:150:06:40An MV/LV transformer is disconnected for maintenance
3Generator BootstrapFalse2:03:13A wind power plant is connected to the power grid which has not been connected previously
4Generator Infeed ControlFalse2:45:36The infeed of a generator is reduced
5Separator MovementFalse3:55:200:00:14A separator of an open ring is moved to control the flow of power within the grid
6Close RingFalse4:33:44The topology is changed to close a ring, reducing the load of involved lines
7Open RingFalse4:48:24The previously opened ring is closed again
8Generator Infeed ControlFalse5:52:04The infeed of a generator is reduced
9Generator Infeed ControlFalse6:49:41The infeed of the generator is restored to the previously (unrestricted) infeed

Test

IDTypeAttackStart TimeDurationDescription
1ARP Spoofing DoSTrue0:23:230:02:16ARP Spoofing DoS against 5 RTUs
2Control & FreezeTrue0:32:380:05:58The MitM issues a control command to disconnect the low voltage section of a DSS
3Attack CountermeasureFalse0:39:07The control center issues control commands to counteract the previous control & freeze attack
4IndustroyerTrue0:53:290:03:01The attacker sends repeated control commands to disconnect a section of the grid by opening a switch
5Attack CountermeasureFalse0:57:00The control center issues control commands to counteract the previous Industroyer attack
6Transformer MaintenanceFalse1:13:430:06:00The control center issues control commands to disconnect an MV/LV transformer, enabling safe maintenance of this transformer
7ARP Spoofing DoSTrue1:23:130:02:33ARP Spoofing DoS against 4 RTUs
8Separator MovementFalse1:47:440:00:33The control center issues commands to move the separator within an open loop to another line
9Drift OffTrue2:03:370:08:05The MitM manipulates the voltage measurements of 4 buses, dissembling an undervoltage situation
10Control & FreezeTrue2:33:310:11:18The MitM issues a control command to slowly reduce the power infeed of two generators
11Attack CountermeasureFalse2:45:20The control center issues control commands to counteract the previous control & freeze attack
12Drift OffTrue2:46:360:08:15The MitM manipulates the voltage measurements of a bus to fluctuate, dissembling a faulty measurement device
13Generator BootstrapFalse3:10:50The control center issues a command to connect a previously inactive wind turbine to the grid
14IndustroyerTrue3:28:360:02:50The attacker sends repeated control commands to disconnect a section of the grid by opening a switch
15Attack CountermeasureFalse3:31:57The control center issues control commands to counteract the previous Industroyer attack
16ARP Spoofing DoSTrue3:49:120:02:04ARP Spoofing DoS against 3 RTUs
17Drift OffTrue4:02:480:09:55The MitM manipulates the voltage measurements of a bus to increase to ~1.38 pu, dissembling a local overvoltage situation
18Generator ControlFalse4:18:48The control center issues a command to modify the power infeed of a wind turbine
19Control & FreezeTrue4:41:320:09:16Control-and-freeze
20Attack CountermeasureFalse4:51:19The control center issues control commands to counteract the previous control & freeze attack
21Control & FreezeTrue4:52:340:05:26Control-and-freeze
22Attack CountermeasureFalse4:58:30The control center issues control commands to counteract the previous control & freeze attack
23Drift OffTrue5:09:570:08:16The MitM manipulates voltage and power measurements, dissembling an increase in power infeed
24ARP Spoofing DoSTrue5:25:270:02:02ARP Spoofing DoS against a single RTU
25Control & FreezeTrue5:36:370:09:18Control-and-freeze
26Attack CountermeasureFalse5:46:260:00:01The control center issues control commands to counteract the previous control & freeze attack
27Drift OffTrue6:05:250:09:55The MitM manipulates the measurements of a line, dissembling an increase in loading.
28Cable MaintenanceFalse6:25:420:00:01The control center issues commands to fully disconnect a line, enabling safe maintenance of this line
29Drift OffTrue6:37:470:09:07The MitM manipulates measurements of multiple loads, dissembling an irregular behavior
30ARP Spoofing DoSTrue6:59:140:02:12ARP Spoofing DoS against 3 RTUs
31ARP Spoofing DoSTrue7:11:110:01:45ARP Spoofing DoS against a single RTU
32IndustroyerTrue7:28:540:03:06The attacker sends repeated control commands to open and close different switches
33Attack CountermeasureFalse7:32:31The control center issues control commands to counteract the previous Industroyer attack
34IndustroyerTrue7:40:130:03:01The attacker sends repeated control commands to force a switch to stay closed
35Separator MovementFalse7:56:550:00:16The control center issues commands to move the separator within an open loop to another line
36Drift OffTrue8:12:430:08:09The MitM manipulates voltage measurements of multiple buses
37Close RingFalse8:49:51The operator issues a control command to close a previously open ring within the grid topology
38IndustroyerTrue9:12:230:02:58The attacker sends repeated commands to reduce the active power of a storage
39Attack CountermeasureFalse9:15:52The control center issues control commands to counteract the previous Industroyer attack
40IndustroyerTrue9:23:510:02:53The attacker sends repeated control commands to open switches, disconnecting a part of the grid
41Attack CountermeasureFalse9:27:14The control center issues control commands to counteract the previous Industroyer attack
42IndustroyerTrue9:33:540:02:58The attacker sends repeated control commands to disconnect the low voltage grid at a specific transformer
43Attack CountermeasureFalse9:37:23The control center issues control commands to counteract the previous Industroyer attack
44Drift OffTrue9:47:010:07:21The MitM manipulates measurements of multiple loads, dissembling an irregular behavior
45Open RingFalse10:00:39The operator issues a control command to open the previously closed ring within the grid topology
46Drift OffTrue10:35:260:15:40The MitM manipulates measurements of a load, dissembling an extreme increase in demand
47IndustroyerTrue10:52:320:03:40The attacker sends repeated control commands to disconnect a load from the grid
48Attack CountermeasureFalse10:56:42The control center issues control commands to counteract the previous Industroyer attack
49IndustroyerTrue11:12:300:03:14The attacker sends repeated control commands to disconnect a generator from the grid
50Attack CountermeasureFalse11:16:15The control center issues control commands to counteract the previous Industroyer attack
51Generator ControlFalse11:25:33The control center issues a control command to reduce the power infeed of a wind turbine
52Generator ControlFalse11:34:35The control center issues a control command to restore the power infeed of a wind turbine

03-Rural

Test

IDTypeAttackStart TimeDurationDescription
1Generator ControlFalse0:15:49The control center issues a control command to change the power infeed of a hydro electric turbine
2IndustroyerTrue0:38:210:02:52The attacker sends repeated control commands to open switches, disconnecting a part of the grid
3Attack CountermeasureFalse0:41:44The control center issues control commands to counteract the previous Industroyer attack
4ARP Spoofing DoSTrue1:00:160:01:48ARP Spoofing DoS against two RTUs
5Drift OffTrue1:10:300:16:07The MitM manipulates measurements of a load, dissembling an extreme increase in demand
6Close RingFalse1:37:00The operator issues a control command to close a previously open ring within the grid topology
7Control & FreezeTrue1:54:150:11:41The MitM issues a control command to slowly reduce the power infeed of two generators
8Attack CountermeasureFalse2:06:27The control center issues control commands to counteract the previous control & freeze attack
9Control & FreezeTrue2:26:300:09:41Control-and-freeze
10Attack CountermeasureFalse2:36:41The control center issues control commands to counteract the previous control & freeze attack
11Drift OffTrue2:40:410:07:33The MitM manipulates voltage measurements of multiple buses
12ARP Spoofing DoSTrue3:06:530:02:02ARP Spoofing DoS against a single RTU
13Control & FreezeTrue3:26:030:08:58The MitM issues a control command to disconnect a DSS
14Drift OffTrue3:33:510:09:35The MitM manipulates the voltage measurements of a bus to increase to ~1.38 pu, dissembling a local overvoltage situation
15Attack CountermeasureFalse3:35:31The control center issues control commands to counteract the previous control & freeze attack
16Generator ControlFalse4:07:47The control center issues a command to modify the power infeed of a wind turbine
17Drift OffTrue4:22:290:07:56The MitM manipulates the voltage measurements of 4 buses, dissembling an undervoltage situation
18ARP Spoofing DoSTrue4:39:480:01:57ARP Spoofing DoS against 4 RTUs
19ARP Spoofing DoSTrue5:04:230:02:18ARP Spoofing DoS against 2 RTUs
20Control & FreezeTrue5:16:180:05:29Control-and-freeze
21Attack CountermeasureFalse5:22:18The control center issues control commands to counteract the previous control & freeze attack
22IndustroyerTrue5:35:070:02:58The attacker sends repeated control commands to disconnect the low voltage grid at a specific transformer
23Attack CountermeasureFalse5:38:36The control center issues control commands to counteract the previous Industroyer attack
24IndustroyerTrue5:51:520:03:39The attacker sends repeated control commands to disconnect a load from the grid
25Attack CountermeasureFalse5:56:02The control center issues control commands to counteract the previous Industroyer attack
26Control & FreezeTrue6:03:560:09:16Control-and-freeze
27Attack CountermeasureFalse6:13:42The control center issues control commands to counteract the previous control & freeze attack
28Cable MaintenanceFalse6:35:02The control center issues commands to fully disconnect a line, enabling safe maintenance of this line
29Drift OffTrue6:57:020:08:53The MitM manipulates voltage and power measurements, dissembling an increase in power infeed
30Separator MovementFalse7:10:020:00:33The control center issues commands to move the separator within an open loop to another line
31ARP Spoofing DoSTrue7:33:150:02:15ARP Spoofing DoS against 4 RTUs
32ARP Spoofing DoSTrue7:46:110:02:12ARP Spoofing DoS against 3 RTUs
33IndustroyerTrue8:05:180:03:01The attacker sends repeated control commands to force a switch to stay closed
34IndustroyerTrue8:17:320:02:57The attacker sends repeated commands to reduce the active power of a storage
35Attack CountermeasureFalse8:21:00The control center issues control commands to counteract the previous Industroyer attack
36IndustroyerTrue8:35:350:03:05The attacker sends repeated control commands to open and close different switches
37Attack CountermeasureFalse8:39:11The control center issues control commands to counteract the previous Industroyer attack
38Drift OffTrue8:52:390:07:39The MitM manipulates measurements of multiple loads, dissembling an irregular behavior
39Separator MovementFalse9:32:480:00:16The control center issues commands to move the separator within an open loop to another line
40Drift OffTrue9:36:150:09:38The MitM manipulates measurements of multiple loads, dissembling an irregular behavior
41IndustroyerTrue10:16:380:02:51The attacker sends repeated control commands to disconnect a section of the grid by opening a switch
42Attack CountermeasureFalse10:19:59The control center issues control commands to counteract the previous Industroyer attack
43Drift OffTrue10:29:030:08:25The MitM manipulates the voltage measurements of a bus to fluctuate, dissembling a faulty measurement device
44IndustroyerTrue10:39:530:03:00The attacker sends repeated control commands to disconnect a section of the grid by opening a switch
45Attack CountermeasureFalse10:43:24The control center issues control commands to counteract the previous Industroyer attack
46Open RingFalse10:54:04The operator issues a control command to open the previously closed ring within the grid topology
47Generator ControlFalse11:08:49The control center issues a control command to reduce the power infeed of a wind turbine
48Drift OffTrue11:46:280:10:03The MitM manipulates the measurements of a line, dissembling an increase in loading.

Scroll to Top