Man-in-the-middle attacks and defence in a power system cyber-physical testbed

被引:39
|
作者
Wlazlo, Patrick [1 ]
Sahu, Abhijeet [2 ]
Mao, Zeyu [2 ]
Huang, Hao [2 ]
Goulart, Ana [1 ,2 ]
Davis, Katherine [2 ]
Zonouz, Saman [3 ]
机构
[1] Texas A&M Univ, Elect Syst Engn Technol, College Stn, TX 77843 USA
[2] Texas A&M Univ, Elect & Comp Engn, College Stn, TX USA
[3] Rutgers State Univ, Elect & Comp Engn, New Brunswick, NJ USA
关键词
33;
D O I
10.1049/cps2.12014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Man-in-The-Middle (MiTM) attacks present numerous threats to a smart grid. In a MiTM attack, an intruder embeds itself within a conversation between two devices to either eavesdrop or impersonate one of the devices, making it appear to be a normal exchange of information. Thus, the intruder can perform false data injection (FDI) and false command injection (FCI) attacks that can compromise power system operations, such as state estimation, economic dispatch, and automatic generation control (AGC). Very few researchers have focused on MiTM methods that are difficult to detect within a smart grid. To address this, we are designing and implementing multi-stage MiTM intrusions in an emulation-based cyber-physical power system testbed against a large-scale synthetic grid model to demonstrate how such attacks can cause physical contingencies such as misguided operation and false measurements. MiTM intrusions create FCI, FDI, and replay attacks in this synthetic power grid. This work enables stakeholders to defend against these stealthy attacks, and we present detection mechanisms that are developed using multiple alerts from intrusion detection systems and network monitoring tools. Our contribution will enable other smart grid security researchers and industry to develop further detection mechanisms for inconspicuous MiTM attacks.
引用
收藏
页码:164 / 177
页数:14
相关论文
共 50 条
  • [41] Power System Security With Cyber-Physical Power System Operation
    Oyewole, Peju Adesina
    Jayaweera, Dilan
    IEEE ACCESS, 2020, 8 (08): : 179970 - 179982
  • [42] Cyber-physical system testbed for power system monitoring and wide-area control verificationInspec keywordsOther keywords
    Cui, Hantao
    Li, Fangxing
    Tomsovic, Kevin
    IET ENERGY SYSTEMS INTEGRATION, 2020, 2 (01) : 32 - 39
  • [43] A Formal Approach to Cyber-Physical Attacks
    Lanotte, Ruggero
    Merro, Massimo
    Muradore, Riccardo
    Vigano, Luca
    2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 436 - 450
  • [44] Reflective Attenuation of Cyber-Physical Attacks
    Segovia, Mariana
    Cavalli, Ana Rosa
    Cuppens, Nora
    Rubio-Hernan, Jose
    Garcia-Alfaro, Joaquin
    COMPUTER SECURITY, ESORICS 2019, 2020, 11980 : 19 - 34
  • [45] A Future Outlook for Cyber-Physical Power System
    Su, Zhuo
    Xu, Luo
    Xin, Shujun
    Li, Weijian
    Shi, Zhan
    Guo, Qinglai
    2017 IEEE CONFERENCE ON ENERGY INTERNET AND ENERGY SYSTEM INTEGRATION (EI2), 2017,
  • [46] Cryptanalytical Attacks on Cyber-physical Systems
    Novotny, Martin
    2016 5TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2016, : 10 - 10
  • [47] Integrity Attacks on Cyber-Physical Systems
    Mo, Yilin
    Sinopoli, Bruno
    HICONS 12: PROCEEDINGS OF THE 1ST ACM INTERNATIONAL CONFERENCE ON HIGH CONFIDENCE NETWORKED SYSTEMS, 2012, : 47 - 54
  • [48] Active and Passive Defense Strategies of Cyber-Physical Power System against Cyber Attacks Considering Node Vulnerability
    Qu, Zhengwei
    Shi, Hualiang
    Wang, Yunjing
    Yin, Guiliang
    Abu-Siada, Ahmed
    PROCESSES, 2022, 10 (07)
  • [49] Design and evaluation of a cyber-physical testbed for improving attack resilience of power systems
    Sahu, Abhijeet
    Wlazlo, Patrick
    Mao, Zeyu
    Huang, Hao
    Goulart, Ana
    Davis, Katherine
    Zonouz, Saman
    IET Cyber-Physical Systems: Theory and Applications, 2021, 6 (04): : 208 - 227
  • [50] Cryptanalytic attacks on cyber-physical systems
    Novotny, Martin
    MICROPROCESSORS AND MICROSYSTEMS, 2017, 52 : 534 - 539