Modelling Load-Changing Attacks in Cyber-Physical Systems

被引:0
|
作者
Arnaboldi, Luca [1 ]
Czekster, Ricardo M. [1 ]
Morisset, Charles [1 ]
Metere, Roberto [2 ,3 ]
机构
[1] School of Computing, Newcastle University, Newcastle upon Tyne, United Kingdom
[2] Newcastle University, Newcastle upon Tyne, United Kingdom
[3] The Alan Turing Institute, London, United Kingdom
基金
英国工程与自然科学研究理事会; “创新英国”项目;
关键词
Continuous time systems - Smart power grids - Cybersecurity - Botnet - Embedded systems - Markov processes - Cyber Physical System - Electric power transmission networks - Malware;
D O I
暂无
中图分类号
学科分类号
摘要
Cyber-Physical Systems (CPS) are present in many settings addressing a myriad of purposes. Examples are Internet-of-Things (IoT) or sensing software embedded in appliances or even specialised meters that measure and respond to electricity demands in smart grids. Due to their pervasive nature, they are usually chosen as recipients for larger scope cyber-security attacks. Those promote system-wide disruptions and are directed towards one key aspect such as confidentiality, integrity, availability or a combination of those characteristics. Our paper focuses on a particular and distressing attack where coordinated malware infected IoT units are maliciously employed to synchronously turn on or off high-wattage appliances, affecting the grid's primary control management. Our model could be extended to larger (smart) grids, Active Buildings as well as similar infrastructures. Our approach models Coordinated Load-Changing Attacks (CLCA) also referred as GridLock or BlackIoT, against a theoretical power grid, containing various types of power plants. It employs Continuous-Time Markov Chains where elements such as Power Plants and Botnets are modelled under normal or attack situations to evaluate the effect of CLCA in power reliant infrastructures. We showcase our modelling approach in the scenario of a power supplier (e.g. power plant) being targeted by a botnet. We demonstrate how our modelling approach can quantify the impact of a botnet attack and be abstracted for any CPS system involving power load management in a smart grid. Our results show that by prioritising the type of power-plants, the impact of the attack may change: in particular, we find the most impacting attack times and show how different strategies impact their success. We also find the best power generator to use depending on the current demand and strength of attack. © 2020 The Author(s)
引用
收藏
页码:39 / 60
相关论文
共 50 条
  • [31] Learning-Based Attacks in Cyber-Physical Systems
    Khojasteh, Mohammad Javad
    Khina, Anatoly
    Franceschetti, Massimo
    Javidi, Tara
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2021, 8 (01): : 437 - 449
  • [32] Robustness of Asymmetric Cyber-Physical Power Systems Against Cyber Attacks
    Lai, Rong
    Qiu, Xiaoyu
    Wu, Jiajing
    IEEE ACCESS, 2019, 7 : 61342 - 61352
  • [33] Security Control of Cyber-Physical Systems under Cyber Attacks: A Survey
    Xing, Wei
    Shen, Jun
    SENSORS, 2024, 24 (12)
  • [34] Detecting covert channel attacks on cyber-physical systems
    Li, Hongwei
    Chasaki, Danai
    IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2024, 9 (03) : 228 - 237
  • [35] Security of SCADA Systems Against Cyber-Physical Attacks
    Do, Van Long
    Fillatre, Lionel
    Nikiforov, Igor
    Willett, Peter
    IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 2017, 32 (05) : 28 - 45
  • [36] Adversarial Attacks and Defenses on Cyber-Physical Systems: A Survey
    Li, Jiao
    Liu, Yang
    Chen, Tao
    Xiao, Zhen
    Li, Zhenjiang
    Wang, Jianping
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (06) : 5103 - 5115
  • [37] Adversarial Regression for Detecting Attacks in Cyber-Physical Systems
    Ghafouri, Amin
    Vorobeychik, Yevgeniy
    Koutsoukos, Xenofon
    PROCEEDINGS OF THE TWENTY-SEVENTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2018, : 3769 - 3775
  • [38] A Tutorial on Detecting Security Attacks on Cyber-Physical Systems
    Griffioen, Paul
    Weerakkody, Sean
    Ozel, Omur
    Mo, Yilin
    Sinopoli, Bruno
    2019 18TH EUROPEAN CONTROL CONFERENCE (ECC), 2019, : 979 - 984
  • [39] Optimal Data Injection Attacks in Cyber-Physical Systems
    Wu, Guangyu
    Sun, Jian
    Chen, Jie
    IEEE TRANSACTIONS ON CYBERNETICS, 2018, 48 (12) : 3302 - 3312
  • [40] Reliability Analysis of Cyber-Physical Systems Considering Cyber-Attacks
    Fang, Z. H.
    Mo, H. D.
    Wang, Y.
    2017 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM), 2017, : 364 - 368