Attacking the smart grid using public information

Charalambos Konstantinou, Marios Sazos, M. Maniatakos
{"title":"Attacking the smart grid using public information","authors":"Charalambos Konstantinou, Marios Sazos, M. Maniatakos","doi":"10.1109/LATW.2016.7483348","DOIUrl":null,"url":null,"abstract":"Over the past years, sophisticated adversaries have infiltrated the control networks of energy companies around the globe. As attempts to compromise industrial control and information technology systems have soared, electric utilities increase their investments in cyber security as an important step to enhance resiliency of the power system. Although utility companies started adopting a defense in depth strategy, compliant with security reliability standards, the first step towards building effective mitigation strategies is to understand the attack vectors emerging from publicly available information. To this end, we utilize data from accessible resources to create a map of the topological and electrical structure of smart grid regions. Furthermore, we identify electronic devices able to control the critical electrical units in the system. The location and characteristics of these components are used in a simulation environment to study the interaction of controls and dynamics in the system. Lastly, we examine the paths of attacking control equipment and discuss the impact of such scenarios.","PeriodicalId":135851,"journal":{"name":"2016 17th Latin-American Test Symposium (LATS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"21","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 17th Latin-American Test Symposium (LATS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/LATW.2016.7483348","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 21

Abstract

Over the past years, sophisticated adversaries have infiltrated the control networks of energy companies around the globe. As attempts to compromise industrial control and information technology systems have soared, electric utilities increase their investments in cyber security as an important step to enhance resiliency of the power system. Although utility companies started adopting a defense in depth strategy, compliant with security reliability standards, the first step towards building effective mitigation strategies is to understand the attack vectors emerging from publicly available information. To this end, we utilize data from accessible resources to create a map of the topological and electrical structure of smart grid regions. Furthermore, we identify electronic devices able to control the critical electrical units in the system. The location and characteristics of these components are used in a simulation environment to study the interaction of controls and dynamics in the system. Lastly, we examine the paths of attacking control equipment and discuss the impact of such scenarios.
利用公共信息攻击智能电网
在过去的几年里,老练的对手已经渗透进了全球能源公司的控制网络。随着入侵工业控制和信息技术系统的企图激增,电力公司加大了对网络安全的投资,作为提高电力系统弹性的重要一步。尽管公用事业公司开始采用符合安全可靠性标准的纵深防御策略,但构建有效缓解策略的第一步是了解从公开可用信息中出现的攻击媒介。为此,我们利用可访问资源中的数据来创建智能电网区域的拓扑和电气结构图。此外,我们确定了能够控制系统中关键电气单元的电子设备。在仿真环境中利用这些部件的位置和特性来研究系统中控制和动力学的相互作用。最后,我们研究了攻击控制设备的路径,并讨论了这种情况的影响。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信