Investigating the Effect of Network Parameters on Coordinated Cyber Attacks against a Simulated Power Plant
نویسندگان
چکیده
The fact that modern Networked Industrial Control Systems (NICS) depend on Information and Communication Technologies (ICT), is well known. Although many studies have focused on the security of these systems, today we still lack the proper understanding of the effects that cyber attacks have on NICS. In this paper we use our previously developed framework to study the effects of network parameters, i.e. delay, packet losses and background traffic, on coordinated cyber attacks against NICS. Coordinated attacks rely on several infected hosts to disrupt the normal functionality of the system. Within the context of NICS we consider multiple infected control hardware, a highly similar setting to the recently reported Stuxnet worm, the first malware specifically designed to attack NICS. Furthermore, we assume that the coordinator is located outside the system, in the Internet, from where it launches attacks by sending packets to each infected control hardware. The main goal of the attacker is to bring the physical process into a critical state, i.e. dangerous, or more generally unwanted state of the system. For the physical process we used the Boiling Water Power Plant (BWPP) model developed by Bell and Åström.
منابع مشابه
Resilient Configuration of Distribution System versus False Data Injection Attacks Against State Estimation
State estimation is used in power systems to estimate grid variables based on meter measurements. Unfortunately, power grids are vulnerable to cyber-attacks. Reducing cyber-attacks against state estimation is necessary to ensure power system safe and reliable operation. False data injection (FDI) is a type of cyber-attack that tampers with measurements. This paper proposes network reconfigurati...
متن کاملAvoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
متن کاملAvoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
متن کاملCoordinated resource scheduling in a large scale virtual power plant considering demand response and energy storages
Virtual power plant (VPP) is an effective approach to aggregate distributed generation resources under a central control. This paper introduces a mixed-integer linear programming model for optimal scheduling of the internal resources of a large scale VPP in order to maximize its profit. The proposed model studies the effect of a demand response (DR) program on the scheduling of the VPP. The pro...
متن کاملDeveloping a Correlation Index to Identify Coordinated Cyber-Attacks to Power Grids
The large deployment of Information and Communication Technology (ICT) exposes the power grid to a large number of coordinated cyber-attacks. Thus, it is necessary to design new security policies that allow an efficient and reliable operation in such conflicted cyber-space. The detection of cyberattacks is known to be a challenging problem, however, through the coordinated effort of defense-in-...
متن کامل