Shedding Light on Inconsistencies in Grid Cybersecurity: Disconnects and Recommendations

被引:5
作者
Singer, Brian [1 ]
Pandey, Amritanshu [1 ]
Li, Shimiao [1 ]
Bauer, Lujo [1 ]
Miller, Craig [1 ]
Pileggi, Lawrence [1 ]
Sekar, Vyas [1 ]
机构
[1] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
来源
2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP | 2023年
关键词
power grid; cybersecurity; grid security; computer security; industrial control systems;
D O I
10.1109/SP46215.2023.10179343
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The operational, academic, and policy communities disagree on which threats against the power grid are likely and what damage would ensue. For instance, the feasibility and impact of MadIoT-style attacks is being actively debated. By surveying grid experts (N=18) we find that disagreements are not unique to MadIoT attacks but occur across multiple well-studied grid threats. Based on prior work and our survey, we hypothesize that the disagreements stem from inconsistencies in how grid threats are modeled. We identify five likely causes of modeling inconsistencies: 1) using unrealistic grid topologies, 2) assuming unrealistic capabilities for attackers, 3) exploring too few grid scenarios, 4) using incomplete simulators that omit relevant grid processes, and 5) using simulators that incorrectly model key grid processes. To check these hypotheses, we create a modeling framework and examine how these factors change our understanding of the feasibility and impact of grid threats. We use four diverse grid threats as case studies: MadIoT, False Data Injection Attacks, Substation Circuit Breaker Takeover, and Power Plant Takeover. We find that each of our hypothesized causes of modeling inconsistencies has a significant effect on modeling the outcomes of attacks. For example, we find that MadIoT attacks are much less feasible and require significantly more high-wattage IoT devices on realistic topologies than on topologies previously used to model them. In contrast, we find that Substation Circuit Breaker Takeover attacks are much more feasible in emergency scenarios and may require significantly fewer substations for failure than previous modeling suggested. We conclude with actionable recommendations for accurately assessing the impact of threats against the grid.
引用
收藏
页码:38 / 55
页数:18
相关论文
共 63 条
[1]   SoK: Security Evaluation of Home-Based IoT Deployments [J].
Alrawi, Omar ;
Lever, Chaz ;
Antonakakis, Manos ;
Monrose, Fabian .
2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019), 2019, :1362-1380
[2]  
[Anonymous], 2015, Business Blackout: The Insurance Implications of a Cyber Attack on the US Power Grid
[3]  
[Anonymous], 2017, EOP0111 NERC
[4]  
[Anonymous], 2016, Analysis of the Cyber Attack on the Ukrainian Power Grid
[5]  
Baiocco A, 2015, INT CONF SMART GRID, P485, DOI 10.1109/SmartGridComm.2015.7436347
[6]  
Bi SZ, 2011, IEEE GLOBE WORK, P1162, DOI 10.1109/GLOCOMW.2011.6162362
[7]   Grid Structural Characteristics as Validation Criteria for Synthetic Networks [J].
Birchfield, Adam B. ;
Xu, Ti ;
Gegner, Kathleen M. ;
Shetye, Komal S. ;
Overbye, Thomas J. .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2017, 32 (04) :3258-3265
[8]   Assessing a Potential Cyberattack on the Italian Electric System [J].
Bruno, Clementina ;
Guidi, Luca ;
Lorite-Espejo, Azahara ;
Pestonesi, Daniela .
IEEE SECURITY & PRIVACY, 2015, 13 (05) :42-51
[9]  
Celik ZB, 2018, PROCEEDINGS OF THE 2018 USENIX ANNUAL TECHNICAL CONFERENCE, P147
[10]   Study on attack paths of cyber attack in cyber-physical power systems [J].
Chen, Lei ;
Yue, Dong ;
Dou, Chunxia ;
Chen, Jianbo ;
Cheng, Zihao .
IET GENERATION TRANSMISSION & DISTRIBUTION, 2020, 14 (12) :2352-2360