De-Synchronisation Attack Modelling in Real-Time Protocols Using Queue Networks: Attacking the ISO/IEC 61850 Substation Automation Protocol

被引:0
作者
Wright, James G. [1 ]
Wolthusen, Stephen D. [1 ,2 ]
机构
[1] Royal Holloway Univ London, Sch Math & Informat Secur, Egham TW20 0EX, Surrey, England
[2] Norwegian Univ Sci & Technol, Norwegian Informat Secur Lab, Trondheim, Norway
来源
CRITICAL INFORMATION INFRASTRUCTURES SECURITY (CRITIS 2017) | 2018年 / 10707卷
基金
英国工程与自然科学研究理事会;
关键词
Queue networks; ISO/IEC; 61850; Quality of service; Protocol analysis; De-synchronisation attack; SECURITY ANALYSIS;
D O I
10.1007/978-3-319-99843-5_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Applications developed for Supervisory Control And Data Acquisition (SCADA) protocols in several domains, particularly the energy sector, must satisfy hard real-time constraints to ensure the safety of the systems they are deployed on. These systems are highly sensitive to Quality of Service (QoS) violations, but it is not always clear whether a compliant implementation will satisfy the stated QoS of the standard. This paper proposes a framework for studying a protocol's QoS properties based on a queuing network approach that offers a number of advantages over state machine or model-checking approaches. The authors describe the framework as an instance of a network of M/M/1/K of queues with the block-after-service discipline, to allow for the analysis of probabilistic packet flows in valid protocol runs. This framework allows for the study of denial of service (DoS), performance degradation, and de-synchronisation attacks. The model is validated by a tool allowing automation of queue network analysis, and is used to demonstrate a possible breach of the QoS guarantees of the ISO/IEC 61850-7-2 substation automation standard with a de-synchronisation attack.
引用
收藏
页码:131 / 143
页数:13
相关论文
共 24 条
[1]  
Ansilla JD, 2015, 2015 INTERNATIONAL CONFERENCED ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2015)
[2]  
Cherepanov A., 2017, TECHNICAL REPORT
[3]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[4]  
Gaderer G., 2006, 2006 IEEE International Workshop on Factory Communication Systems, P247
[5]  
Gross D., 2009, Fundamentals of Queueing Theory, V4th
[6]   Predicting the Effects of DDoS Attacks on a Network of Critical Infrastructures [J].
Hurst, William ;
Shone, Nathan ;
Monnet, Quentin .
CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, :1698-1703
[7]  
Itkin E, 2016, I S PRECIS CLOCK SYN, P12
[8]   A queuing theory based model for studying intrusion evolution and elimination in computer networks [J].
Kammas, Pantelis ;
Komninos, Thodoros ;
Stamatiou, Yannis C. .
FOURTH INTERNATIONAL SYMPOSIUM ON INFORMATION ASSURANCE AND SECURITY, PROCEEDINGS, 2008, :167-+
[9]   The Association between Serum Uric Acid Levels and the Prevalence of Vulnerable Atherosclerotic Carotid Plaque: A Cross-sectional Study [J].
Li, Qing ;
Zhou, Yong ;
Dong, Kehui ;
Wang, Anxin ;
Yang, Xin ;
Zhang, Caifeng ;
Zhu, Yi ;
Wu, Shouling ;
Zhao, Xingquan .
SCIENTIFIC REPORTS, 2015, 5
[10]   Power Generation Enhancement by Utilizing Plant Photosynthate in Microbial Fuel Cell Coupled Constructed Wetland System [J].
Liu, Shentan ;
Song, Hailiang ;
Li, Xianning ;
Yang, Fei .
INTERNATIONAL JOURNAL OF PHOTOENERGY, 2013, 2013