TY - GEN
T1 - Assessment of Low-Budget Targeted Cyberattacks Against Power Systems
AU - Liu, Xiao Rui
AU - Keliris, Anastasis
AU - Konstantinou, Charalambos
AU - Sazos, Marios
AU - Maniatakos, Michail
N1 - Publisher Copyright:
© 2019, IFIP International Federation for Information Processing.
PY - 2019
Y1 - 2019
N2 - The security and well-being of societies and economies are tied to the reliable and resilient operation of power systems. In the next decades, power systems are expected to become more heavily loaded and operate closer to their stability limits and operating constraints. On top of that, in recent years, cyberattacks against computing systems and networks integrated in the power grid infrastructure are a real and growing threat. Such actions, especially in industrial environments such as power systems, are generally deemed feasible only by resource-wealthy nation state actors. This chapter challenges this perception and presents a methodology, named Open Source Exploitation (OSEXP), which utilizes information from public infrastructure to assess an advanced attack vector on power systems. The attack targets Phasor Measurement Units (PMUs) which depend on Global Positioning System (GPS) signals to provide time-stamped circuit quantities of power lines. Specifically, we present a GPS time spoofing attack using low-cost commercial devices and open source software. The necessary information for the instantiation of the OSEXP attack is extracted by developing a test case model of the power system in a digital real-time simulator (DRTS). DRTS is also employed to evaluate the effectiveness and impact of the developed OSEXP attack methodology. The presented targeted attack demonstrates that an actor with limited budget has the ability to cause significant disruption to a nation.
AB - The security and well-being of societies and economies are tied to the reliable and resilient operation of power systems. In the next decades, power systems are expected to become more heavily loaded and operate closer to their stability limits and operating constraints. On top of that, in recent years, cyberattacks against computing systems and networks integrated in the power grid infrastructure are a real and growing threat. Such actions, especially in industrial environments such as power systems, are generally deemed feasible only by resource-wealthy nation state actors. This chapter challenges this perception and presents a methodology, named Open Source Exploitation (OSEXP), which utilizes information from public infrastructure to assess an advanced attack vector on power systems. The attack targets Phasor Measurement Units (PMUs) which depend on Global Positioning System (GPS) signals to provide time-stamped circuit quantities of power lines. Specifically, we present a GPS time spoofing attack using low-cost commercial devices and open source software. The necessary information for the instantiation of the OSEXP attack is extracted by developing a test case model of the power system in a digital real-time simulator (DRTS). DRTS is also employed to evaluate the effectiveness and impact of the developed OSEXP attack methodology. The presented targeted attack demonstrates that an actor with limited budget has the ability to cause significant disruption to a nation.
UR - http://www.scopus.com/inward/record.url?scp=85068600784&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85068600784&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-23425-6_12
DO - 10.1007/978-3-030-23425-6_12
M3 - Conference contribution
AN - SCOPUS:85068600784
SN - 9783030234249
T3 - IFIP Advances in Information and Communication Technology
SP - 232
EP - 256
BT - VLSI-SoC
A2 - Bombieri, Nicola
A2 - Pravadelli, Graziano
A2 - Fujita, Masahiro
A2 - Austin, Todd
A2 - Reis, Ricardo
PB - Springer New York LLC
T2 - 26th IFIP/IEEE WG 10.5 International Conference on Very Large Scale Integration, VLSI-SoC 2018
Y2 - 8 October 2018 through 10 October 2018
ER -