Malware propagation in smart grid monocultures

被引:0
|
作者
Eder-Neuhauser, P. [1 ]
Zseby, T. [1 ]
Fabini, J. [1 ]
机构
[1] TU Wien, Inst Telecommun, Gusshausstr 25-E389, A-1040 Vienna, Austria
来源
ELEKTROTECHNIK UND INFORMATIONSTECHNIK | 2018年 / 135卷 / 03期
关键词
malware attacks; smart grids; communication networks; network security;
D O I
10.1007/s00502-018-0616-5
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Smart power grids require a communication infrastructure to collect sensor data and to send control commands. The common trend for cost reduction influences the architecture, implementation, networking, and operation of smart grid devices. Whereas hardware and software reuse are imperative for vendors to lower device costs, utility companies substantially decrease their operational costs by deploying a homogeneous device base. Thousands of smart meters that feature identical hardware, firmware, and software, are one main prerequisite for automated maintenance, support, and device replacement. However, these cost savings create optimum conditions for malware propagation and infection in the grids' control networks. In this paper we show how monocultures in device types can lead to critical situations if malware exploits a common vulnerability. Although we assume that classical defensive measures, e.g., firewalls, virtual networks, and intrusion detection, are in place, we argue that new or unpatched vulnerabilities cannot be ruled out and may lead to a very fast distribution of malware in large parts of the smart grids' control network. Besides showing how fast malware can spread in device monocultures, we also discuss effective defensive measures that can support utility companies in preventing or containing malware distribution.
引用
收藏
页码:264 / 269
页数:6
相关论文
共 50 条
  • [11] Performance Analysis of Radio Propagation Models for Smart Grid Applications
    Mueller, Christian
    Georg, Hanno
    Putzke, Markus
    Wietfeld, Christian
    2011 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2011,
  • [12] Smart malware detection on Android
    Gheorghe, Laura
    Marin, Bogdan
    Gibson, Gary
    Mogosanu, Lucian
    Deaconescu, Razvan
    Voiculescu, Valentin-Gabriel
    Carabas, Mihai
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4254 - 4272
  • [13] Mathematical Models for Malware Propagation
    Martin del Rey, Angel
    Yang, Lu-Xing
    Karyotis, Vasileios A.
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [14] Analysis of Malware Propagation in Twitter
    Sanzgiri, Ameya
    Hughes, Andrew
    Upadhyaya, Shambhu
    2013 IEEE 32ND INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2013), 2013, : 195 - 204
  • [15] Prevention of Malware Propagation in AMI
    Park, Younghee
    Nicol, David M.
    Zhu, Huaiyu
    Lee, Cheol Won
    2013 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2013, : 474 - 479
  • [16] Mediating Cyber and Physical Threat Propagation in Secure Smart Grid Architectures
    Neuman, Clifford
    Tan, Kymie
    2011 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2011,
  • [17] Cascading Failures in Smart Grid: Joint Effect of Load Propagation and Interdependence
    Huang, Zhen
    Wang, Cheng
    Zhu, Tieying
    Nayak, Amiya
    IEEE ACCESS, 2015, 3 : 2520 - 2530
  • [18] Modelling smart grid IT-OT dependencies for DDoS impact propagation
    Acarali, Dilara
    Rao, K. Rajesh
    Rajarajan, Muttukrishnan
    Chema, Doron
    Ginzburg, Mark
    COMPUTERS & SECURITY, 2022, 112
  • [19] Distribution grid monitoring based on feature propagation using smart plugs
    Grafenhorst, Simon
    Förderer, Kevin
    Hagenmeyer, Veit
    Energy Informatics, 2024, 7 (01)
  • [20] Analysing and modelling worm propagation speed in the smart grid communication infrastructure
    AlMajali, Anas
    Dweik, Waleed
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2019, 11 (01) : 11 - 21