Bader et al., 2023 - Google Patents

Comprehensively analyzing the impact of cyberattacks on power grids

Bader et al., 2023

View PDF
Document ID
5527367732402202484
Author
Bader L
Serror M
Lamberts O
Sen �
van der Velde D
Hacker I
Filter J
Padilla E
Henze M
Publication year
Publication venue
2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P)

External Links

Snippet

The increasing digitalization of power grids and especially the shift towards IP-based communication drastically increase the susceptibility to cyberattacks, potentially leading to blackouts and physical damage. Understanding the involved risks, the interplay of …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • H04L41/06Arrangements for maintenance or administration or management of packet switching networks involving management of faults or events or alarms
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing packet switching networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Similar Documents

Publication Publication Date Title
Quincozes et al. A survey on intrusion detection and prevention systems in digital substations
Sun et al. Cyber security of a power grid: State-of-the-art
Huseinović et al. A survey of denial-of-service attacks and solutions in the smart grid
Ashok et al. Cyber-physical attack-resilient wide-area monitoring, protection, and control for the power grid
Jin et al. Toward a cyber resilient and secure microgrid using software-defined networking
Chen et al. Implementing attacks for modbus/TCP protocol in a real-time cyber physical system test bed
Liu et al. Intruders in the grid
Hussain et al. Vulnerabilities and countermeasures in electrical substations
Bader et al. Comprehensively analyzing the impact of cyberattacks on power grids
Babay et al. Deploying intrusion-tolerant SCADA for the power grid
da Silva et al. A new methodology for real-time detection of attacks in IEC 61850-based systems
Wermann et al. ASTORIA: A framework for attack simulation and evaluation in smart grids
Albarakati et al. Security monitoring of IEC 61850 substations using IEC 62351-7 network and system management
Ghaleb et al. Scada-sst: a scada security testbed
Elbez et al. A new classification of attacks against the cyber-physical security of smart grids
Khan et al. Demonstrating cyber-physical attacks and defense for synchrophasor technology in smart grid
Bahsi et al. A cyber attack taxonomy for microgrid systems
Qassim et al. Simulating command injection attacks on IEC 60870-5-104 protocol in SCADA system
Singh et al. Sharp-net: Platform for self-healing and attack resilient pmu networks
Singh et al. A novel architecture for attack-resilient wide-area protection and control system in smart grid
Banik et al. Implementing man-in-the-middle attack to investigate network vulnerabilities in smart grid test-bed
Mustafa et al. CPGrid-OT: Cyber-power data generation using real-time reconfigurable testbed for resiliency
Aljohani et al. Modeling time-varying wide-scale distributed denial of service attacks on electric vehicle charging Stations
Lin et al. RICSel21 data collection: Attacks in a virtual power network
Semertzis et al. Power System Stability Analysis from Cyber Attacks Perspective