首页> 外文OA文献 >Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid
【2h】

Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid

机译:用于智能电网中基于同步相量的BlackEnergy恶意软件的威胁分析

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

The BlackEnergy malware targeting critical infrastructures has a long history. It evolved over time from a simple DDoS platform to a quite sophisticated plug-in based malware. The plug-in architecture has a persistent malware core with easily installable attack specific modules for DDoS, spamming, info-stealing, remote access, boot-sector formatting etc. BlackEnergy has been involved in several high profile cyber physical attacks including the recent Ukraine power grid attack in December 2015. This paper investigates the evolution of BlackEnergy and its cyber attack capabilities. It presents a basic cyber attack model used by BlackEnergy for targeting industrial control systems. In particular, the paper analyzes cyber threats of BlackEnergy for synchrophasor based systems which are used for real-time control and monitoring functionalities in smart grid. Several BlackEnergy based attack scenarios have been investigated by exploiting the vulnerabilities in two widely used synchrophasor communication standards: (i) IEEE C37.118 and (ii) IEC 61850-90-5. Specifically, the paper addresses reconnaissance, DDoS, man-in-the-middle and replay/reflection attacks on IEEE C37.118 and IEC 61850-90-5. Further, the paper also investigates protection strategies for detection and prevention of BlackEnergy based cyber physical attacks.
机译:针对关键基础设施的BlackEnergy恶意软件历史悠久。随着时间的推移,它已从简单的DDoS平台演变为非常复杂的基于插件的恶意软件。该插件体系结构具有持久的恶意软件核心,并具有易于安装的,针对DDoS,垃圾邮件,信息窃取,远程访问,引导扇区格式化等特定于攻击的模块。 2015年12月进行了网格攻击。本文研究了BlackEnergy的演变及其网络攻击功能。它提出了BlackEnergy用于工业控制系统的基本网络攻击模型。特别是,本文针对基于同步相量的系统分析了BlackEnergy的网络威胁,这些系统用于实时控制和监视智能电网中的功能。通过利用两种广泛使用的同步相量通信标准中的漏洞,对几种基于BlackEnergy的攻击情形进行了研究:(i)IEEE C37.118和(ii)IEC 61850-90-5。具体来说,本文针对IEEE C37.118和IEC 61850-90-5上的侦察,DDoS,中间人攻击和重放/反射攻击。此外,本文还研究了用于检测和预防基于BlackEnergy的网络物理攻击的保护策略。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号