Dataset for KIOS CoE Sandboxing use-case SUC4 corresponding to cyber attacks affecting the Coordinated Overcurrent Protection Scheme (IEC 61850 GOOSE)
Creators
Description
The datasets reflect on two main scenarios (S1-S2) related to SUC4 - corresponding to cyber attacks affecting the Coordinated Overcurrent Protection Scheme. The first scenario explores the response of the coordinated overcurrent protection when circuit breakers (CBs) are healthy, under normal operation, i.e., SUC4/S1(without attack), and the under a FDI cyberattack on IEC 61850 - GOOSE communication protocol, i.e., SUC4/S1(with FDI attack). Similarly, the second scenario investigates the response of the coordinated overcurrent protection when there a mechanical failure in the CB of the downstream feeder, under normal operation, i.e., SUC4/S2(without attack), and the under a message suppresion (MS) cyber-attack on GOOSE protocol, i.e., SUC4/S2(with MS attack). Details regarding the datasets captured during the execution of each scenario (with and without attacks), including electrical measurements and network traffic, are briefly rsummarized below, while the full details are provided in the supporting documents.
- SUC4/S1(without attack) datasets/Normal operation (without cyber-attack on GOOSE) when CBs are healthy : This dataset is related to the operation of the sandboxing use case SUC4 described in this document, which examines operation of the protection scheme in a substation using overcurrent protective relays (IEDs) in the sandboxing environment, that communicate with each other via IEC6180/GOOSE protocol. Specifically, this dataset corresponds to the first scenario (S1) of SUC4, without any attack. More details about the scenario related to this dataset can be found in Section 1.3.1 of the SUC4 supporting document. The dataset includes electrical measurements of the upstream and downstream feeders of the substation, the status (stNum) and sequence (sqNum) numbers, along with the binary values in “alldata” field of the GOOSE messages of IED1 and IED2, as well as the status of the CB1 and CB2. The dataset is provided in the form of time-series measurements available as MATLAB (.mat) and CSV (.csv) files. The measurements were recorded with a 0.5-millisecond time resolution by specific blocks in RT-Lab environment of the real time simulator. In addition, network traffic data as Packer CAPture files (.pcapng) are included in this database.
- SUC4/S1(with FDI attack) datasets/FDI cyber-attack on GOOSE signals when CBs are healthy: This dataset corresponds to the first scenario (S1) of SUC4, where an FDI cyber-attack is conducted in the local network by an attacker model, in order to inject fake messages to deceive an IED to unnecessarily trip its CB during normal grid conditions (without a shortcircuit event) and cause a regional blackout. More details about the scenario related to this dataset can be found in Section 1.3.1 of the supporting document. The dataset includes electrical measurements of the upstream and downstream feeders of the substation, the status (stNum) and sequence (sqNum) numbers, along with the binary values in “alldata” field of the GOOSE messages of IED1 and IED2, as well as the status of the CB1 and CB2. The dataset is provided in the form of time-series measurements available as MATLAB (.mat) and CSV (.csv) files. The measurements were recorded with a 0.5-millisecond time resolution by specific blocks in RT-Lab environment of the real time simulator. In addition, network traffic data as Packer CAPture files (.pcapng) are included in this database.
- SUC4/S2(without attack) datasets/ Normal operation (without attack on GOOSE) when CB presents a failure: This dataset corresponds to the first scenario (S1) of SUC4, where an FDI cyber-attack is conducted in the local network by an attacker model, in order to inject fake messages to deceive an IED to unnecessarily trip its CB during normal grid conditions (without a shortcircuit event) and cause a regional blackout. More details about the scenario related to this dataset can be found in Section 1.3.1 of the supporting document. The dataset includes electrical measurements of the upstream and downstream feeders of the substation, the status (stNum) and sequence (sqNum) numbers, along with the binary values in “alldata” field of the GOOSE messages of IED1 and IED2, as well as the status of
the CB1 and CB2. The dataset is provided in the form of time-series measurements available as MATLAB (.mat) and CSV (.csv) files. The measurements were recorded with a 0.5-millisecond time resolution by specific blocks in RT-Lab environment of the real time simulator. In addition, network traffic data as Packer CAPture files (.pcapng) are included in this database. - SUC4/S2(with MS attack) datasets/MS cyber-attack on GOOSE signals when CB presents a failure: This dataset corresponds to the second scenario (S2) of SUC4, where an MS cyber-attack is conducted in the local network in order prevent critical benign messages, such inter-trip messages requesting backup protection, to reach their destination (back-up IED) when a CB failure occurs during a short-circuit event. As a result, the duration of a short-circuit is prolonged or the protection scheme is not able to clear the short-circuit event, which can cause catastrophic failures to power system. More details about the scenario related to
this dataset can be found in Section 1.3.2 of the support document. The dataset includes electrical measurements of the upstream and downstream feeders of
the substation, the status (stNum) and sequence (sqNum) numbers, along with the binary values in “alldata” field of the GOOSE messages of IED1 and IED2, as well as the status of the CB1 and CB2. The dataset is provided in the form of time-series measurements available as MATLAB (.mat) and CSV (.csv) files. The measurements were recorded with a 0.5-millisecond time resolution by specific blocks in RT-Lab environment of the real time simulator. In addition, network traffic data as Packer CAPture files (.pcapng) are included in this database.
Files
Electron_SUC4_S1_FDI_Attack_Measurements.csv
Files
(255.2 MB)
Name | Size | Download all |
---|---|---|
md5:4acd676b8071b8b88374009e506a0da7
|
49.5 MB | Preview Download |
md5:007058f0d04f90536e5de9bd7b9d6d35
|
22.0 MB | Download |
md5:5e2673a84e089737df824ee45fc29416
|
173.4 kB | Download |
md5:4646036e2878d3260373bac28d43e086
|
61.0 MB | Preview Download |
md5:b48a8629b8bd5c86b903939d396db281
|
27.4 MB | Download |
md5:11e2f8448c0b6344305936a23988c2f5
|
231.2 kB | Download |
md5:771b1b594761c34642fb12994b8fe77d
|
34.2 MB | Preview Download |
md5:c73b6c1ff93dd16a5a9153869e4b8d08
|
15.9 MB | Download |
md5:276a87bddbf62b346cb89ba7035597ac
|
125.2 kB | Download |
md5:638e1a98cd70e0c38a7d67cc1de41b4d
|
30.4 MB | Preview Download |
md5:8b656f8a7b1b894809f060c3223ce5ee
|
14.0 MB | Download |
md5:96185f2ba3afff438b91384b41ef30a4
|
422.9 kB | Download |
Additional details
Related works
- Is supplemented by
- Data paper: 10.5281/zenodo.12636116 (DOI)
- Data paper: 10.5281/zenodo.12960228 (DOI)