Design and Analysis of a Sophisticated Malware Attack Against Smart Grid

被引:0
|
作者
Min, Byungho [1 ]
Varadharajan, Vijay [1 ]
机构
[1] Macquarie Univ, Adv Cyber Secur Res Ctr, Sydney, NSW 2109, Australia
来源
INFORMATION SECURITY (ISC 2013) | 2015年 / 7807卷
关键词
Smart grid; Cyber-physical system; Cyber attack; Malware; Blackout; Security; CHALLENGES; SECURITY;
D O I
10.1007/978-3-319-27659-5_9
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper, we propose a realistic malware attack against the smart grid. The paper first briefs the architecture of the smart grid in general. And then we explain our proposed attack that is specifically tailored for the smart grid infrastructures. The attack considers the characteristics of recent real malware attacks such as deceptive hardware attack and multi-stage operation. We believe this analysis will benefit the design and implementation of secure smart grid infrastructures by demonstrating how a sophisticated malware attack can damage the smart grid.
引用
收藏
页码:130 / 139
页数:10
相关论文
共 50 条
  • [21] Targeted Attack Synthesis for Smart Grid Vulnerability Analysis
    Maiti, Suman
    Balabhaskara, Anjana
    Adhikary, Sunandan
    Koley, Ipsita
    Dey, Soumyajit
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 2576 - 2590
  • [22] Time Synchronization Attack in Smart Grid: Impact and Analysis
    Zhang, Zhenghao
    Gong, Shuping
    Dimitrovski, Aleksandar D.
    Li, Husheng
    IEEE TRANSACTIONS ON SMART GRID, 2013, 4 (01) : 87 - 98
  • [23] EAPA: An efficient authentication protocol against pollution attack for smart grid
    Wen, Mi
    Lei, Jingsheng
    Bi, Zhongqin
    Li, Jing
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2015, 8 (06) : 1082 - 1089
  • [24] EAPA: An efficient authentication protocol against pollution attack for smart grid
    Mi Wen
    Jingsheng Lei
    Zhongqin Bi
    Jing Li
    Peer-to-Peer Networking and Applications, 2015, 8 : 1082 - 1089
  • [25] A Novel Method to Detect Bad Data Injection Attack in Smart Grid
    Lin, Ting
    Gu, Yun
    Wang, Dai
    Gui, Yuhong
    Guan, Xiaohong
    2013 PROCEEDINGS IEEE INFOCOM, 2013, : 3423 - 3428
  • [26] A Distillation-based Attack Against Adversarial Training Defense for Smart Grid Federated Learning
    Bondok, Atef H.
    Mahmoud, Mohamed
    Badr, Mahmoud M.
    Fouda, Mostafa M.
    Alsabaan, Maazen
    2024 IEEE 21ST CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2024, : 963 - 968
  • [27] A Novel Method to Detect Bad Data Injection Attack in Smart Grid
    Liu, Ting
    Gu, Yun
    Wang, Dai
    Gui, Yuhong
    Guan, Xiaohong
    2013 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2013, : 49 - 54
  • [28] Protecting Smart Grid Automation Systems Against Cyberattacks
    Wei, Dong
    Lu, Yan
    Jafari, Mohsen
    Skare, Paul M.
    Rohde, Kenneth
    IEEE TRANSACTIONS ON SMART GRID, 2011, 2 (04) : 782 - 795
  • [29] Vulnerability Analysis of Smart Grid under Community Attack Style
    Pan, Huan
    Lian, Honghui
    Na, Chunning
    45TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY (IECON 2019), 2019, : 5971 - 5976
  • [30] Hardware-Assisted Malware Detection for Embedded Systems in Smart Grid
    Li, Congmiao
    Srinivasan, Dipti
    Reindl, Thomas
    2015 IEEE INNOVATIVE SMART GRID TECHNOLOGIES - ASIA (ISGT ASIA), 2015,