Man‐in‐the‐middle attacks and defence in a power system cyber‐physical testbed

نویسندگان

چکیده

Man-in-The-Middle (MiTM) attacks present numerous threats to a smart grid. In MiTM attack, an intruder embeds itself within conversation between two devices either eavesdrop or impersonate one of the devices, making it appear be normal exchange information. Thus, can perform false data injection (FDI) and command (FCI) that compromise power system operations, such as state estimation, economic dispatch, automatic generation control (AGC). Very few researchers have focused on methods are difficult detect To address this, we designing implementing multi-stage intrusions in emulation-based cyber-physical testbed against large-scale synthetic grid model demonstrate how cause physical contingencies misguided operation measurements. create FCI, FDI, replay this This work enables stakeholders defend these stealthy attacks, detection mechanisms developed using multiple alerts from intrusion systems network monitoring tools. Our contribution will enable other security industry develop further for inconspicuous attacks.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Virtual Power System Testbed and Inter-Testbed Integration

The Virtual Power System Testbed (VPST) at University of Illinois at Urbana-Champaign is part of the Trustworthy Cyber Infrastructure for the Power Grid (TCIP) and is maintained by members of the Information Trust Institute (ITI). VPST is designed to be integrated with other testbeds across the country to explore performance and security of Supervisory Control And Data Acquisition (SCADA) proto...

متن کامل

A testbed for power system security evaluation

This paper describes a project that integrates real devices used in the electric power grid with a simulation of electrical power generation and distribution, and a computer/communication simulator. The testbed is designed to evaluate the cyber-security of power grid control systems. Through a combination of simulation and emulation, the testbed seamlessly integrates virtual and real components...

متن کامل

Defence Against 802.11 DoS Attacks Using Artificial Immune System

In this paper we present an Artificial Immune System (AIS) based security framework, which prevents a number of serious Denial of Service (DoS) attacks. The proposed security framework can counter de-authentication and disassociation attacks. The results of our experiments clearly demonstrate that the proposed framework approximately achieved 100% detection rate with negligible false positive r...

متن کامل

Threshold Implementation as a Countermeasure against Power Analysis Attacks

One of the usual ways to find sensitive data or secret parameters of cryptographic devices is to use their physical leakages. Power analysis is one of the attacks which lay in such a model. In comparison with other types of side-channels, power analysis is so efficient and has a high success rate. So it is important to provide a countermeasure against it. Different types of countermeasures use ...

متن کامل

Cooperative Defence Against DDoS Attacks

Distributed denial of service (DDoS) attacks on the Internet have become an immediate problem. As DDoS streams do not have common characteristics, currently available intrusion detection systems (IDS) cannot detect them accurately. As a result, defend DDoS attacks based on current available IDS will dramatically affect legitimate traffic. In this paper, we propose a distributed approach to defe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IET cyber-physical systems

سال: 2021

ISSN: ['2398-3396']

DOI: https://doi.org/10.1049/cps2.12014