Man-in-the-middle attacks and defence in a power system cyber-physical testbed

被引:39
|
作者
Wlazlo, Patrick [1 ]
Sahu, Abhijeet [2 ]
Mao, Zeyu [2 ]
Huang, Hao [2 ]
Goulart, Ana [1 ,2 ]
Davis, Katherine [2 ]
Zonouz, Saman [3 ]
机构
[1] Texas A&M Univ, Elect Syst Engn Technol, College Stn, TX 77843 USA
[2] Texas A&M Univ, Elect & Comp Engn, College Stn, TX USA
[3] Rutgers State Univ, Elect & Comp Engn, New Brunswick, NJ USA
关键词
33;
D O I
10.1049/cps2.12014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Man-in-The-Middle (MiTM) attacks present numerous threats to a smart grid. In a MiTM attack, an intruder embeds itself within a conversation between two devices to either eavesdrop or impersonate one of the devices, making it appear to be a normal exchange of information. Thus, the intruder can perform false data injection (FDI) and false command injection (FCI) attacks that can compromise power system operations, such as state estimation, economic dispatch, and automatic generation control (AGC). Very few researchers have focused on MiTM methods that are difficult to detect within a smart grid. To address this, we are designing and implementing multi-stage MiTM intrusions in an emulation-based cyber-physical power system testbed against a large-scale synthetic grid model to demonstrate how such attacks can cause physical contingencies such as misguided operation and false measurements. MiTM intrusions create FCI, FDI, and replay attacks in this synthetic power grid. This work enables stakeholders to defend against these stealthy attacks, and we present detection mechanisms that are developed using multiple alerts from intrusion detection systems and network monitoring tools. Our contribution will enable other smart grid security researchers and industry to develop further detection mechanisms for inconspicuous MiTM attacks.
引用
收藏
页码:164 / 177
页数:14
相关论文
共 50 条
  • [1] Adaptive control for cyber-physical systems under man-in-the-middle attacks with false data injections
    Kumar, Rahul
    Dey, Rajeeb
    Guelton, Kevin
    Bali, Arun
    Singh, Uday Pratap
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2024, 361 (04):
  • [2] Coordinated cyber-physical attacks of cyber-physical power system
    Yang Y.
    Lan S.
    Qin Z.
    Liu H.
    Dianli Zidonghua Shebei/Electric Power Automation Equipment, 2020, 40 (02): : 97 - 102
  • [3] Monitoring system reaction in cyber-physical testbed under cyber-attacks
    Bernieri, Giuseppe
    Miciolino, Estefania Etcheves
    Pascucci, Federica
    Setola, Roberto
    COMPUTERS & ELECTRICAL ENGINEERING, 2017, 59 : 86 - 98
  • [4] Cyber-Physical Testbed - The Impact of Cyber Attacks and the Human Factor
    Soupionis, Yannis
    Benoist, Thierry
    2015 10TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2015, : 326 - 331
  • [5] The Man-in-the-Middle Defence
    Anderson, Ross
    Bond, Mike
    SECURITY PROTOCOLS, 2009, 5087 : 153 - 156
  • [6] Attack and defence methods in cyber-physical power system
    Yang, Ting
    Liu, Yuzhe
    Li, Wei
    IET ENERGY SYSTEMS INTEGRATION, 2022, 4 (02) : 159 - 170
  • [7] An Integrated Testbed for Power System Cyber-Physical Operations Training
    Chamana, Manohar
    Bhatta, Rabindra
    Schmitt, Konrad
    Shrestha, Rajendra
    Bayne, Stephen
    APPLIED SCIENCES-BASEL, 2023, 13 (16):
  • [8] Multidomain Cyber-Physical Testbed for Power System Vulnerability Assessment
    Mishchenko, Denys
    Oleinikova, Irina
    Erdodi, Laszlo
    Pokhrel, Basanta Raj
    IEEE ACCESS, 2024, 12 : 38135 - 38149
  • [9] Man-in-the-middle attack against cyber-physical systems under random access protocol
    Zhang, Xiao-Guang
    Yang, Guang-Hong
    Wasly, Saud
    INFORMATION SCIENCES, 2021, 576 : 708 - 724
  • [10] Resilience Evaluation of Cyber-Physical Power System Considering Cyber Attacks
    Kong, Xiangxing
    Lu, Zhigang
    Guo, Xiaoqiang
    Zhang, Jiangfeng
    Li, Huifeng
    IEEE TRANSACTIONS ON RELIABILITY, 2024, 73 (01) : 245 - 256