首页> 外文期刊>Electronic Notes in Theoretical Computer Science >Modelling Load-Changing Attacks in Cyber-Physical Systems
【24h】

Modelling Load-Changing Attacks in Cyber-Physical Systems

机译:在网络 - 物理系统中建模负载变化攻击

获取原文
获取外文期刊封面目录资料

摘要

Cyber-Physical Systems (CPS) are present in many settings addressing a myriad of purposes. Examples are Internet-of-Things (IoT) or sensing software embedded in appliances or even specialised meters that measure and respond to electricity demands in smart grids. Due to their pervasive nature, they are usually chosen as recipients for larger scope cyber-security attacks. Those promote system-wide disruptions and are directed towards one key aspect such as confidentiality, integrity, availability or a combination of those characteristics. Our paper focuses on a particular and distressing attack where coordinated malware infected IoT units are maliciously employed to synchronously turn on or off high-wattage appliances, affecting the grid's primary control management. Our model could be extended to larger (smart) grids, Active Buildings as well as similar infrastructures. Our approach models Coordinated Load-Changing Attacks (CLCA) also referred as GridLock or BlackIoT, against a theoretical power grid, containing various types of power plants. It employs Continuous-Time Markov Chains where elements such as Power Plants and Botnets are modelled under normal or attack situations to evaluate the effect of CLCA in power reliant infrastructures. We showcase our modelling approach in the scenario of a power supplier (e.g. power plant) being targeted by a botnet. We demonstrate how our modelling approach can quantify the impact of a botnet attack and be abstracted for any CPS system involving power load management in a smart grid. Our results show that by prioritising the type of power-plants, the impact of the attack may change: in particular, we find the most impacting attack times and show how different strategies impact their success. We also find the best power generator to use depending on the current demand and strength of attack.
机译:在许多设置中存在网络物理系统(CPS)存在解决无数的目的。例子是嵌入设备中的物联网(物联网)或传感软件,甚至专门的仪表,测量和响应智能电网的电力需求。由于它们的普遍性,通常选择作为更大的范围网络安全攻击的收件人。那些促进系统范围的中断,并针对一个关键方面,例如保密,完整性,可用性或这些特征的组合。我们的论文侧重于特定和令人痛苦的攻击,其中协调恶意软件感染的物联网单位是恶意地用于同步开启或关闭高瓦格电器,影响电网的主要控制管理。我们的模型可以扩展到更大(智能)网格,积极建筑物以及类似的基础设施。我们的方法模型协调加载变更攻击(CLCA)也称为玻璃锁或Blackiot,反对理论电网,包含各种类型的发电厂。它采用连续时间马尔可夫链,其中诸如发电厂和僵尸网络等元件在正常或攻击情况下建模,以评估CLCA在省电基础设施中的影响。我们在由僵尸网络定位的电源供应商(例如电厂)的情况下展示我们的建模方法。我们展示了我们的建模方法如何量化僵尸网络攻击的影响,并为涉及智能电网电力负载管理的任何CPS系统抽象。我们的研究结果表明,通过优先考虑电厂类型,攻击的影响可能会发生变化:特别是,我们发现最有效的攻击时间,并展示了不同的策略如何影响他们的成功。我们还发现,根据当前需求和攻击强度,我们发现最好的发电机。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号