Man-in-the-middle attacks and defence in a power system cyber-physical testbed

被引:39
|
作者
Wlazlo, Patrick [1 ]
Sahu, Abhijeet [2 ]
Mao, Zeyu [2 ]
Huang, Hao [2 ]
Goulart, Ana [1 ,2 ]
Davis, Katherine [2 ]
Zonouz, Saman [3 ]
机构
[1] Texas A&M Univ, Elect Syst Engn Technol, College Stn, TX 77843 USA
[2] Texas A&M Univ, Elect & Comp Engn, College Stn, TX USA
[3] Rutgers State Univ, Elect & Comp Engn, New Brunswick, NJ USA
关键词
33;
D O I
10.1049/cps2.12014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Man-in-The-Middle (MiTM) attacks present numerous threats to a smart grid. In a MiTM attack, an intruder embeds itself within a conversation between two devices to either eavesdrop or impersonate one of the devices, making it appear to be a normal exchange of information. Thus, the intruder can perform false data injection (FDI) and false command injection (FCI) attacks that can compromise power system operations, such as state estimation, economic dispatch, and automatic generation control (AGC). Very few researchers have focused on MiTM methods that are difficult to detect within a smart grid. To address this, we are designing and implementing multi-stage MiTM intrusions in an emulation-based cyber-physical power system testbed against a large-scale synthetic grid model to demonstrate how such attacks can cause physical contingencies such as misguided operation and false measurements. MiTM intrusions create FCI, FDI, and replay attacks in this synthetic power grid. This work enables stakeholders to defend against these stealthy attacks, and we present detection mechanisms that are developed using multiple alerts from intrusion detection systems and network monitoring tools. Our contribution will enable other smart grid security researchers and industry to develop further detection mechanisms for inconspicuous MiTM attacks.
引用
收藏
页码:164 / 177
页数:14
相关论文
共 50 条
  • [21] Monitoring WLANs for man-in-the-middle attacks
    Harshini, NL
    Sridhar, G
    Sridhar, V
    PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING AND NETWORKS, 2004, : 210 - 215
  • [22] Robustness of Asymmetric Cyber-Physical Power Systems Against Cyber Attacks
    Lai, Rong
    Qiu, Xiaoyu
    Wu, Jiajing
    IEEE ACCESS, 2019, 7 : 61342 - 61352
  • [23] Coordinated cyber-physical attacks considering DoS attacks in power systems
    Tian, Jiwei
    Wang, Buhong
    Li, Tengyao
    Shang, Fute
    Cao, Kunrui
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2020, 30 (11) : 4345 - 4358
  • [24] Resilience enhancement of renewable cyber-physical power system against malware attacks
    Xu, Sheng
    Tu, Haicheng
    Xia, Yongxiang
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2023, 229
  • [25] A Cyber-Security Methodology for a Cyber-Physical Industrial Control System Testbed
    Noorizadeh, Mohammad
    Shakerpour, Mohammad
    Meskin, Nader
    Unal, Devrim
    Khorasani, Khashayar
    IEEE ACCESS, 2021, 9 : 16239 - 16253
  • [26] The Vulnerability of Cyber-Physical System Under Stealthy Attacks
    Sui, Tianju
    Mo, Yilin
    Marelli, Damian
    Sun, Ximing
    Fu, Minyue
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (02) : 637 - 650
  • [27] A moving target defence approach for detecting deception attacks on cyber-physical systems
    Babadi, Narges
    Doustmohammadi, Ali
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 100
  • [28] Revisiting man-in-the-middle attacks against HTTPS
    Kampourakis V.
    Kambourakis G.
    Chatzoglou E.
    Zaroliagis C.
    Network Security, 2022, 2022 (03)
  • [29] Cyber-Physical Power System (CPPS) Reliability Assessment Considering Cyber Attacks against Monitoring Functions
    Guo, Jia
    Wang, Yifei
    Guo, Chuangxin
    Dong, Shufeng
    Wen, Baijian
    2016 IEEE POWER AND ENERGY SOCIETY GENERAL MEETING (PESGM), 2016,
  • [30] Detecting Man-in-the-Middle Attacks by Precise Timing
    Aziz, Benjamin
    Hamilton, Geoff
    2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, : 81 - +