Preventive Maintenance for Advanced Metering Infrastructure Against Malware Propagation

被引:43
作者
Guo, Yonghe [1 ]
Ten, Chee-Wooi [1 ]
Hu, Shiyan [1 ]
Weaver, Wayne W. [1 ]
机构
[1] Michigan Technol Univ, Dept Elect & Comp Engn, Houghton, MI 49931 USA
基金
美国能源部;
关键词
Advanced metering infrastructure (AMI); anomaly detection; malware propagation; preventive maintenance; SMART; SECURITY;
D O I
10.1109/TSG.2015.2453342
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Advanced metering infrastructure (AMI) deployment has been widely promoted in recent years to improve the accuracy of billing information as well as to facilitate implementation of demand response. Information integrity and availability of the devices is crucial to the billing information that should reflect accurately on how much the household energy is consumed. The IP-based smart metering devices may exist with unknown vulnerabilities that can introduce back-doors to enable worm propagation across AMI network. The infected devices can be attack agents that would largely disable the metering functionalities or manipulate control variables of each meter. This paper proposes an optimal frequency of on-site investigation and the number of monitoring verification to investigate potential anomalies of malware footprinting by applying the decision process framework of Markovian. The proposed method determines the best inspection strategies based on the observation from the existing anomaly detectors deployed in the network. The considerations include malware propagation characteristics, accuracy of anomaly detectors, and investigation and diagnosis costs. Four scenarios are simulated using the proposed method, demonstrating the effectiveness of investigation on potentially infected electronic meters within an AMI network.
引用
收藏
页码:1314 / 1328
页数:15
相关论文
共 54 条
  • [31] A topologically-aware worm propagation model for wireless sensor networks
    Khayam, SA
    Radha, H
    [J]. 25th IEEE International Conference on Distributed Computing Systems Workshops, Proceedings, 2005, : 210 - 216
  • [32] Larsen J., 2012, CYBERSECURITY FIELD
  • [33] Cumulative Attestation Kernels for Embedded Systems
    Lemay, Michael
    Gunter, Carl A.
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2012, 3 (02) : 744 - 760
  • [34] Li S., IEEE T SMART G UNPUB
  • [35] Strategic FRTU Deployment Considering Cybersecurity in Secondary Distribution Network
    Liao, Chen
    Ten, Chee-Wooi
    Hu, Shiyan
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2013, 4 (03) : 1264 - 1274
  • [36] Liebowitz M., 2012, NBC NEWS 0410
  • [37] Security and Privacy Challenges in the Smart Grid
    McDaniel, Patrick
    McLaughlin, Stephen
    [J]. IEEE SECURITY & PRIVACY, 2009, 7 (03) : 75 - 77
  • [38] McLaughlin Stephen, 2009, Critical Information Infrastructures Security. 4th International Workshop, CRITIS 2009. Revised Papers, P176
  • [39] McLaughlin S, 2010, 26TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2010), P107
  • [40] Mirkovic K., 2005, INTERNET DENIAL SERV, V1st