Cybersecurity Intrusion Detection for Station and Process Bus Applications in Substations: Challenges and Experiences

A. Klien, Amro Mohamed
{"title":"Cybersecurity Intrusion Detection for Station and Process Bus Applications in Substations: Challenges and Experiences","authors":"A. Klien, Amro Mohamed","doi":"10.1109/SASG57022.2022.10199351","DOIUrl":null,"url":null,"abstract":"Numerous cyber-attacks on critical infrastructure triggered utilities to implement sophisticated cyber security measures to protect the electrical grid. For example, firewalls and “air gaps” are currently used to safeguard substations. However, these can be evaded through remote access tunnels or computers directly attached to the station network. Therefore, measures are needed to detect cyber threats in substation networks to respond quickly and minimize consequences.This document describes how to apply the different NIST Cybersecurity Framework (CSF) functions: Identity, Protect, Detect, Respond, and Recover to substations and which benefits emerge from utilizing what IEC 61850 standard offers. The frequently used attack vector on industrial control systems is the connections to services in corporate IT and control centers or temporary maintenance connections.Another entry point is engineering workstations connected to substation networks. Finally, the storage of settings and test documents could also be an entry point for attackers and malware.","PeriodicalId":206589,"journal":{"name":"2022 Saudi Arabia Smart Grid (SASG)","volume":"246 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 Saudi Arabia Smart Grid (SASG)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SASG57022.2022.10199351","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Numerous cyber-attacks on critical infrastructure triggered utilities to implement sophisticated cyber security measures to protect the electrical grid. For example, firewalls and “air gaps” are currently used to safeguard substations. However, these can be evaded through remote access tunnels or computers directly attached to the station network. Therefore, measures are needed to detect cyber threats in substation networks to respond quickly and minimize consequences.This document describes how to apply the different NIST Cybersecurity Framework (CSF) functions: Identity, Protect, Detect, Respond, and Recover to substations and which benefits emerge from utilizing what IEC 61850 standard offers. The frequently used attack vector on industrial control systems is the connections to services in corporate IT and control centers or temporary maintenance connections.Another entry point is engineering workstations connected to substation networks. Finally, the storage of settings and test documents could also be an entry point for attackers and malware.
变电站网络安全入侵检测与过程总线应用:挑战与经验
针对关键基础设施的大量网络攻击促使公用事业公司实施复杂的网络安全措施来保护电网。例如,目前使用防火墙和“气隙”来保护变电站。然而,这些可以通过远程访问隧道或直接连接到车站网络的计算机来规避。因此,需要采取措施检测变电站网络中的网络威胁,以快速响应并最大限度地减少后果。本文档描述了如何将不同的NIST网络安全框架(CSF)功能应用于变电站:身份识别、保护、检测、响应和恢复,以及利用IEC 61850标准提供的好处。工业控制系统经常使用的攻击媒介是企业IT和控制中心的服务连接或临时维护连接。另一个切入点是连接到变电站网络的工程工作站。最后,设置和测试文档的存储也可能成为攻击者和恶意软件的入口点。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信