首页 > 最新文献

Proceedings of the 2nd Workshop on Smart Energy Grid Security最新文献

英文 中文
Targeted Attacks against Industrial Control Systems: Is the Power Industry Prepared? 针对工业控制系统的针对性攻击:电力行业准备好了吗?
Pub Date : 2014-11-07 DOI: 10.1145/2667190.2667192
M. B. Line, Ali Zand, G. Stringhini, R. Kemmerer
Targeted cyber attacks are on the rise, and the power industry is an attractive target. Espionage and causing physical damage are likely goals of these targeted attacks. In the case of the power industry, the worst possible consequences are severe: large areas, including critical societal infrastructures, can suffer from power outages. In this paper, we try to measure the preparedness of the power industry against targeted attacks. To this end, we have studied well-known targeted attacks and created a taxonomy for them. Furthermore, we conduct a study, in which we interview six power distribution system operators (DSOs), to assess the level of cyber situation awareness among DSOs and to evaluate the efficiency and effectiveness of their currently deployed systems and practices for detecting and responding to targeted attacks. Our findings indicate that the power industry is very well prepared for traditional threats, such as physical attacks. However, cyber attacks, and especially sophisticated targeted attacks, where social engineering is one of the strategies used, have not been addressed appropriately so far. Finally, by understanding previous attacks and learning from them, we try to provide the industry with guidelines for improving their situation awareness and defense (both detection and response) capabilities.
有针对性的网络攻击正在上升,电力行业是一个有吸引力的目标。间谍活动和造成物理损害可能是这些针对性攻击的目标。就电力行业而言,最坏的后果可能是严重的:包括关键的社会基础设施在内的大片地区可能遭受停电。在本文中,我们试图衡量电力行业对针对性攻击的准备情况。为此,我们研究了众所周知的目标攻击,并为它们创建了一个分类法。此外,我们进行了一项研究,在该研究中,我们采访了六个配电系统运营商(dso),以评估dso之间的网络态势感知水平,并评估他们目前部署的系统和检测和响应目标攻击的实践的效率和有效性。我们的研究结果表明,电力行业已经为传统威胁做好了充分的准备,比如物理攻击。然而,网络攻击,特别是复杂的目标攻击,其中社会工程是使用的策略之一,到目前为止还没有得到适当的解决。最后,通过了解以前的攻击并从中学习,我们试图为行业提供改进其态势感知和防御(检测和响应)能力的指导方针。
{"title":"Targeted Attacks against Industrial Control Systems: Is the Power Industry Prepared?","authors":"M. B. Line, Ali Zand, G. Stringhini, R. Kemmerer","doi":"10.1145/2667190.2667192","DOIUrl":"https://doi.org/10.1145/2667190.2667192","url":null,"abstract":"Targeted cyber attacks are on the rise, and the power industry is an attractive target. Espionage and causing physical damage are likely goals of these targeted attacks. In the case of the power industry, the worst possible consequences are severe: large areas, including critical societal infrastructures, can suffer from power outages. In this paper, we try to measure the preparedness of the power industry against targeted attacks. To this end, we have studied well-known targeted attacks and created a taxonomy for them. Furthermore, we conduct a study, in which we interview six power distribution system operators (DSOs), to assess the level of cyber situation awareness among DSOs and to evaluate the efficiency and effectiveness of their currently deployed systems and practices for detecting and responding to targeted attacks. Our findings indicate that the power industry is very well prepared for traditional threats, such as physical attacks. However, cyber attacks, and especially sophisticated targeted attacks, where social engineering is one of the strategies used, have not been addressed appropriately so far. Finally, by understanding previous attacks and learning from them, we try to provide the industry with guidelines for improving their situation awareness and defense (both detection and response) capabilities.","PeriodicalId":292964,"journal":{"name":"Proceedings of the 2nd Workshop on Smart Energy Grid Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125818050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
An Empirical Study of TCP Vulnerabilities in Critical Power System Devices 电力系统关键设备TCP漏洞的实证研究
Pub Date : 2014-11-07 DOI: 10.1145/2667190.2667196
David Formby, Sangjoon Jung, J. Copeland, R. Beyah
Implementations of the TCP/IP protocol suite have been patched for decades to reduce the threat of TCP sequence number prediction attacks. TCP, in particular, has been adopted to many devices in the power grid as a transport layer for their applications since it provides reliability. Even though this threat has been well-known for almost three decades, this does not hold true in power grid networks; weak TCP sequence number generation can still be found in many devices used throughout the power grid. Although our analysis only covers one substation, we believe that this is without loss of generality given: 1) the pervasiveness of the flaws throughout the substation devices; and 2) the prominence of the vendors. In this paper, we show how much TCP initial sequence numbers (ISNs) are still predictable and how time is strongly correlated with TCP ISN generation. We collected power grid network traffic from a live substation for six months, and we measured TCP ISN differences and their time differences between TCP connection establishments. In the live substation, we found three unique vendors (135 devices, 68%) from a total of eight vendors (196 devices) running TCP that show strongly predictable patterns of TCP ISN generation.
TCP/IP协议套件的实现已经打了几十年的补丁,以减少TCP序列号预测攻击的威胁。特别是TCP,由于提供了可靠性,它已被电网中的许多设备采用作为其应用程序的传输层。尽管这种威胁在近三十年前就已为人所知,但在电网网络中却并非如此;在整个电网中使用的许多设备中仍然可以找到弱TCP序列号生成。虽然我们的分析只涵盖一个变电站,但我们认为这不会失去一般性,因为:1)整个变电站设备中普遍存在缺陷;2)供应商的知名度。在本文中,我们展示了多少TCP初始序列号(ISN)仍然是可预测的,以及时间如何与TCP ISN生成紧密相关。我们从一个运行中的变电站收集了六个月的电网网络流量,并测量了TCP ISN差异及其在TCP连接建立之间的时间差。在现场变电站中,我们从总共8个供应商(196个设备)中发现了三个独特的供应商(135个设备,68%)运行TCP,显示出TCP ISN生成的强可预测模式。
{"title":"An Empirical Study of TCP Vulnerabilities in Critical Power System Devices","authors":"David Formby, Sangjoon Jung, J. Copeland, R. Beyah","doi":"10.1145/2667190.2667196","DOIUrl":"https://doi.org/10.1145/2667190.2667196","url":null,"abstract":"Implementations of the TCP/IP protocol suite have been patched for decades to reduce the threat of TCP sequence number prediction attacks. TCP, in particular, has been adopted to many devices in the power grid as a transport layer for their applications since it provides reliability. Even though this threat has been well-known for almost three decades, this does not hold true in power grid networks; weak TCP sequence number generation can still be found in many devices used throughout the power grid. Although our analysis only covers one substation, we believe that this is without loss of generality given: 1) the pervasiveness of the flaws throughout the substation devices; and 2) the prominence of the vendors. In this paper, we show how much TCP initial sequence numbers (ISNs) are still predictable and how time is strongly correlated with TCP ISN generation. We collected power grid network traffic from a live substation for six months, and we measured TCP ISN differences and their time differences between TCP connection establishments. In the live substation, we found three unique vendors (135 devices, 68%) from a total of eight vendors (196 devices) running TCP that show strongly predictable patterns of TCP ISN generation.","PeriodicalId":292964,"journal":{"name":"Proceedings of the 2nd Workshop on Smart Energy Grid Security","volume":"05 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127347979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Adaptive Defending Strategy for Smart Grid Attacks 智能电网攻击的自适应防御策略
Pub Date : 2014-11-07 DOI: 10.1145/2667190.2667195
Jianye Hao, Eunsuk Kang, D. Jackson, Jun Sun
One active area of research in smart grid security focuses on applying game-theoretic frameworks to analyze interactions between a system and an attacker and formulate effective defense strategies. In previous work, a Nash equilibrium (NE) solution is chosen as the optimal defense strategy, which [7, 9] implies that the attacker has complete knowledge of the system and would also employ the corresponding NE strategy. In practice, however, the attacker may have limited knowledge and resources, and thus employ an attack which is less than optimal, allowing the defender to devise more efficient strategies. We propose a novel approach called an adaptive Markov Strategy (AMS) for defending a system against attackers with unknown, dynamic behaviors. The algorithm for computing an AMS is theoretically guaranteed to converge to a best response strategy against any stationary attacker, and also converge to a Nash equilibrium if the attacker is sufficiently intelligent to employ the AMS to launch the attack. To evaluate the effectiveness of an AMS in smart grid systems, we study a class of data integrity attacks that involve injecting false voltage information into a substation, with the goal of causing load shedding (and potentially a blackout). Our preliminary results show that the amount of load shedding costs can be significantly reduced by employing an AMS over a NE strategy.
智能电网安全研究的一个活跃领域是应用博弈论框架来分析系统与攻击者之间的相互作用,并制定有效的防御策略。在之前的工作中,选择纳什均衡(NE)解决方案作为最优防御策略,这意味着攻击者对系统有完全的了解,并且也会采用相应的NE策略。然而,在实践中,攻击者可能只有有限的知识和资源,因此使用的攻击不是最优的,允许防御者设计更有效的策略。我们提出了一种称为自适应马尔可夫策略(AMS)的新方法,用于保护系统免受具有未知动态行为的攻击者的攻击。计算AMS的算法在理论上保证收敛于针对任何固定攻击者的最佳响应策略,并且在攻击者足够聪明地使用AMS发起攻击时收敛于纳什均衡。为了评估AMS在智能电网系统中的有效性,我们研究了一类数据完整性攻击,这些攻击涉及向变电站注入虚假电压信息,目的是导致负载减少(并可能导致停电)。我们的初步结果表明,通过采用AMS而不是网元策略,可以显着降低减载成本。
{"title":"Adaptive Defending Strategy for Smart Grid Attacks","authors":"Jianye Hao, Eunsuk Kang, D. Jackson, Jun Sun","doi":"10.1145/2667190.2667195","DOIUrl":"https://doi.org/10.1145/2667190.2667195","url":null,"abstract":"One active area of research in smart grid security focuses on applying game-theoretic frameworks to analyze interactions between a system and an attacker and formulate effective defense strategies. In previous work, a Nash equilibrium (NE) solution is chosen as the optimal defense strategy, which [7, 9] implies that the attacker has complete knowledge of the system and would also employ the corresponding NE strategy. In practice, however, the attacker may have limited knowledge and resources, and thus employ an attack which is less than optimal, allowing the defender to devise more efficient strategies. We propose a novel approach called an adaptive Markov Strategy (AMS) for defending a system against attackers with unknown, dynamic behaviors. The algorithm for computing an AMS is theoretically guaranteed to converge to a best response strategy against any stationary attacker, and also converge to a Nash equilibrium if the attacker is sufficiently intelligent to employ the AMS to launch the attack. To evaluate the effectiveness of an AMS in smart grid systems, we study a class of data integrity attacks that involve injecting false voltage information into a substation, with the goal of causing load shedding (and potentially a blackout). Our preliminary results show that the amount of load shedding costs can be significantly reduced by employing an AMS over a NE strategy.","PeriodicalId":292964,"journal":{"name":"Proceedings of the 2nd Workshop on Smart Energy Grid Security","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129255571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
eFuzz: A Fuzzer for DLMS/COSEM Electricity Meters
Pub Date : 2014-11-07 DOI: 10.1145/2667190.2667194
H. Dantas, Z. Erkin, C. Doerr, Raymond Hallie, Gerrit van der Bij
Smart grids enable new functionalities like remote and micro management and consequently, provide increased efficiency, easy management and effectiveness of the entire power grid infrastructure. In order to achieve this, smart meters are attached to the communication network, collecting fine granular data. Unfortunately, as the smart meters are limited devices connected to the network and running software, they also make the whole smart grid more vulnerable than the traditional grids in term of software problems and even possible cyber attacks. In this paper, we work towards an increased software security of smart metering devices and propose a fuzzing framework, eFuzz, built on the generic fuzzing framework Peach to detect software problems. eFuzz tests smart metering devices based on the communication protocol DLMS/COSEM, the standard protocol used in Europe, for possible faults. Our experiments prove the effectiveness of using an automated fuzzing framework compared to resource demanding, human made software protocol inspections. As an example, eFuzz detected between 10 and 40 bugs in different configurations in less than 3 hours while a manual inspection takes weeks. We also investigate the quality of the eFuzz results by comparing with the traditional non-automated evaluation of the same device with respect to scope and efficiency. Our analysis shows that eFuzz is a powerful tool for security inspections for smart meters, and embedded systems in general.
智能电网实现了远程和微观管理等新功能,从而提高了整个电网基础设施的效率,易于管理和有效性。为了实现这一点,智能电表附着在通信网络上,收集细粒度数据。不幸的是,由于智能电表是连接到网络和运行软件的有限设备,它们也使整个智能电网在软件问题上比传统电网更脆弱,甚至可能受到网络攻击。在本文中,我们致力于提高智能计量设备的软件安全性,并提出了一个基于通用模糊测试框架Peach的模糊测试框架eFuzz来检测软件问题。eFuzz基于通信协议DLMS/COSEM(欧洲使用的标准协议)测试智能计量设备是否可能出现故障。我们的实验证明了与资源要求高的人工软件协议检查相比,使用自动模糊测试框架的有效性。例如,eFuzz在不到3小时的时间内检测到不同配置下的10到40个bug,而人工检查则需要数周时间。我们还通过与传统的非自动化评估相同设备的范围和效率进行比较,研究了eFuzz结果的质量。我们的分析表明,eFuzz是智能电表和嵌入式系统安全检查的强大工具。
{"title":"eFuzz: A Fuzzer for DLMS/COSEM Electricity Meters","authors":"H. Dantas, Z. Erkin, C. Doerr, Raymond Hallie, Gerrit van der Bij","doi":"10.1145/2667190.2667194","DOIUrl":"https://doi.org/10.1145/2667190.2667194","url":null,"abstract":"Smart grids enable new functionalities like remote and micro management and consequently, provide increased efficiency, easy management and effectiveness of the entire power grid infrastructure. In order to achieve this, smart meters are attached to the communication network, collecting fine granular data. Unfortunately, as the smart meters are limited devices connected to the network and running software, they also make the whole smart grid more vulnerable than the traditional grids in term of software problems and even possible cyber attacks. In this paper, we work towards an increased software security of smart metering devices and propose a fuzzing framework, eFuzz, built on the generic fuzzing framework Peach to detect software problems. eFuzz tests smart metering devices based on the communication protocol DLMS/COSEM, the standard protocol used in Europe, for possible faults. Our experiments prove the effectiveness of using an automated fuzzing framework compared to resource demanding, human made software protocol inspections. As an example, eFuzz detected between 10 and 40 bugs in different configurations in less than 3 hours while a manual inspection takes weeks. We also investigate the quality of the eFuzz results by comparing with the traditional non-automated evaluation of the same device with respect to scope and efficiency. Our analysis shows that eFuzz is a powerful tool for security inspections for smart meters, and embedded systems in general.","PeriodicalId":292964,"journal":{"name":"Proceedings of the 2nd Workshop on Smart Energy Grid Security","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116608187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Privacy-Friendly Planning of Energy Distribution in Smart Grids 智能电网中能源分配的隐私友好规划
Pub Date : 2014-11-07 DOI: 10.1145/2667190.2667191
T. Dimitriou, Ghassan O. Karame
The smart-grid is gaining increasing attention nowadays, owing to its premise to offer increased reliability, performance, and a balanced utilization of energy. However, the current design of smart-grids raises serious concerns with respect to the privacy and anonymity of users. Thus far, the literature has solely focused on the problem of privately aggregating energy reports and has not addressed the privacy threats that can occur through other intelligent operations which take place in the smart grid, such as planning the energy distribution. In this paper, we propose a novel solution that enables the planning of energy distribution in the grid without leaking any information about the energy requests of individual smart meters. We also implement a prototype based on our proposal and we evaluate its performance in realistic deployment settings.
如今,智能电网越来越受到人们的关注,因为它的前提是提供更高的可靠性、性能和平衡的能源利用。然而,目前智能电网的设计引发了对用户隐私和匿名性的严重担忧。到目前为止,文献只关注于私人汇总能源报告的问题,而没有解决智能电网中发生的其他智能操作(如规划能源分配)可能产生的隐私威胁。在本文中,我们提出了一种新颖的解决方案,该方案能够在不泄漏单个智能电表的能源需求信息的情况下规划电网中的能源分配。我们还根据我们的建议实现了一个原型,并在实际部署设置中评估了它的性能。
{"title":"Privacy-Friendly Planning of Energy Distribution in Smart Grids","authors":"T. Dimitriou, Ghassan O. Karame","doi":"10.1145/2667190.2667191","DOIUrl":"https://doi.org/10.1145/2667190.2667191","url":null,"abstract":"The smart-grid is gaining increasing attention nowadays, owing to its premise to offer increased reliability, performance, and a balanced utilization of energy. However, the current design of smart-grids raises serious concerns with respect to the privacy and anonymity of users. Thus far, the literature has solely focused on the problem of privately aggregating energy reports and has not addressed the privacy threats that can occur through other intelligent operations which take place in the smart grid, such as planning the energy distribution. In this paper, we propose a novel solution that enables the planning of energy distribution in the grid without leaking any information about the energy requests of individual smart meters. We also implement a prototype based on our proposal and we evaluate its performance in realistic deployment settings.","PeriodicalId":292964,"journal":{"name":"Proceedings of the 2nd Workshop on Smart Energy Grid Security","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117155153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Privacy Enhanced Personal Services for Smart Grids 智能电网的隐私增强个人服务
Pub Date : 2014-11-07 DOI: 10.1145/2667190.2667193
Z. Erkin, T. Veugen
Millions of people are now increasingly using smart devices at home to improve the quality of their lives. Unfortunately, the smart devices that we use at home for comfort and simplicity make our lives more complicated in terms of management due to several issues like mismatching interfaces and complexity of the micro-management. One approach to manage smart homes is to enable the utility provider, which has direct access to electrical devices via smart meters. It is expected that the data collected for the management can also be utilized for other personalized services using other business partners. In this paper, we address these personalized services and argue that privacy is a serious consideration for the deployment of the new business ideas. We provide a scientific method to provide new services for smart homes while protecting the privacy-sensitive data. To the best of our knowledge, privacy enhanced new services based on the utilization of smart meter data have not been considered by the research community.
数以百万计的人现在越来越多地在家里使用智能设备来提高生活质量。不幸的是,我们在家里使用的舒适和简单的智能设备,由于接口不匹配和微观管理的复杂性等几个问题,使我们的生活在管理方面变得更加复杂。管理智能家居的一种方法是使公用事业提供商能够通过智能电表直接访问电气设备。预计为管理收集的数据也可以通过其他业务合作伙伴用于其他个性化服务。在本文中,我们讨论了这些个性化服务,并认为隐私是部署新业务理念的重要考虑因素。我们提供科学的方法,在保护隐私敏感数据的同时,为智能家居提供新的服务。据我们所知,基于智能电表数据利用的隐私增强新服务尚未被研究界考虑。
{"title":"Privacy Enhanced Personal Services for Smart Grids","authors":"Z. Erkin, T. Veugen","doi":"10.1145/2667190.2667193","DOIUrl":"https://doi.org/10.1145/2667190.2667193","url":null,"abstract":"Millions of people are now increasingly using smart devices at home to improve the quality of their lives. Unfortunately, the smart devices that we use at home for comfort and simplicity make our lives more complicated in terms of management due to several issues like mismatching interfaces and complexity of the micro-management. One approach to manage smart homes is to enable the utility provider, which has direct access to electrical devices via smart meters. It is expected that the data collected for the management can also be utilized for other personalized services using other business partners. In this paper, we address these personalized services and argue that privacy is a serious consideration for the deployment of the new business ideas. We provide a scientific method to provide new services for smart homes while protecting the privacy-sensitive data. To the best of our knowledge, privacy enhanced new services based on the utilization of smart meter data have not been considered by the research community.","PeriodicalId":292964,"journal":{"name":"Proceedings of the 2nd Workshop on Smart Energy Grid Security","volume":"329 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115967230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Proceedings of the 2nd Workshop on Smart Energy Grid Security 第二届智能电网安全研讨会论文集
Pub Date : 2014-11-07 DOI: 10.1145/2667190
K. Kursawe, Benessa Defend
It is our great pleasure to welcome you to the 2nd Smart Energy Grid Security (SEGS) Workshop. SEGS 2014 aims to foster innovative research and discussion about smart energy grid security and privacy challenges, approaches, and solutions. SEGS'14 takes places in Scottsdale, Arizona, in conjunction with ACM CCS 2014. In the last year, the digitalization of the power grids has been pushed further, with an increasing number of countries engaging in large scale rollouts of smart grid components. While the topic of security is getting more attention, we still face insufficient understanding and communication between the electricity sector and the security community. Given the long lifetime of the systems deployed now, and the fact that the first large scale attacks have already been seen, increasing this communication and working towards applicable solutions is more important than ever before. In spite of the growing number of events and conferences focusing on the digital grid, the gap in the security research community specially addressing smart grids is still wide, and many of the systems rolled out now have a wealth of unaddressed security issues. This workshop aims to fill that void and encourage more research into the area of smart grid security by providing a forum for security researchers to present their work. This workshop serves as an opportunity to foster collaboration between the power industry and the ACM CCS research community. The scope of the workshop encompasses all aspects of the smart grid, including distribution, transmission, generation, metering, e-mobility, and integration of distributed energy resources. SEGS publications offer perspectives from both academia and industry, and present novel research on theoretical and practical aspects of smart grid security and privacy, including design, analysis, experimentation, and fielded systems. SEGS also aims for the integration of other communities, such as law, economics, and HCI, which present these communities' perspectives on technological issues. We hope that the workshop will provide the participants with the opportunity to share ideas and practical experience, and will result in progress towards more resilient power systems. TOPICS OF INTEREST The SEGS Workshop focuses on the following topics: Smart grid architectures and models Smart grid networks and communication Security and dependability in safetycritical, real-time systems Data protection and privacy Grid management Trust and assurance Intrusion detection and monitoring on smart grids Algorithms and protocols for critical infrastructures Risk and threat analysis Smartgrid standards, testing, andcertification Testbeds and field trials Usability and legal issues on grid security Cloud computing and smart grids
我们非常高兴欢迎您参加第二届智能电网安全(SEGS)研讨会。SEGS 2014旨在促进关于智能电网安全和隐私挑战、方法和解决方案的创新研究和讨论。SEGS'14将与ACM CCS 2014一起在亚利桑那州的斯科茨代尔举行。去年,电网数字化进程进一步推进,越来越多的国家开始大规模部署智能电网组件。在安全话题越来越受到关注的同时,电力部门与安防界之间的理解和沟通仍然不足。考虑到现在部署的系统的长生命周期,以及第一次大规模攻击已经出现的事实,增加这种通信并致力于适用的解决方案比以往任何时候都更加重要。尽管关注数字网格的活动和会议越来越多,但安全研究界专门研究智能网格的差距仍然很大,而且现在推出的许多系统都有大量未解决的安全问题。本次研讨会旨在填补这一空白,并通过为安全研究人员提供一个论坛来展示他们的工作,鼓励更多的研究进入智能电网安全领域。本次研讨会为促进电力行业与ACM CCS研究界之间的合作提供了机会。研讨会的范围涵盖了智能电网的各个方面,包括配电、输电、发电、计量、电动交通和分布式能源的整合。SEGS出版物提供了学术界和工业界的观点,并介绍了智能电网安全和隐私的理论和实践方面的新研究,包括设计,分析,实验和现场系统。SEGS还旨在整合其他社区,如法律、经济和HCI,展示这些社区对技术问题的看法。我们希望研讨会将为与会者提供分享想法和实践经验的机会,并将推动更有弹性的电力系统的发展。SEGS研讨会主要关注以下主题:智能电网架构和模型智能电网网络和通信安全关键实时系统的安全性和可靠性数据保护和隐私网格管理信任和保证智能电网的入侵检测和监控关键基础设施的算法和协议风险和威胁分析智能电网标准、测试和认证试验台和现场试验电网安全的可用性和法律问题云计算和智能电网
{"title":"Proceedings of the 2nd Workshop on Smart Energy Grid Security","authors":"K. Kursawe, Benessa Defend","doi":"10.1145/2667190","DOIUrl":"https://doi.org/10.1145/2667190","url":null,"abstract":"It is our great pleasure to welcome you to the 2nd Smart Energy Grid Security (SEGS) Workshop. SEGS 2014 aims to foster innovative research and discussion about smart energy grid security and privacy challenges, approaches, and solutions. SEGS'14 takes places in Scottsdale, Arizona, in conjunction with ACM CCS 2014. \u0000 \u0000In the last year, the digitalization of the power grids has been pushed further, with an increasing number of countries engaging in large scale rollouts of smart grid components. While the topic of security is getting more attention, we still face insufficient understanding and communication between the electricity sector and the security community. Given the long lifetime of the systems deployed now, and the fact that the first large scale attacks have already been seen, increasing this communication and working towards applicable solutions is more important than ever before. \u0000 \u0000In spite of the growing number of events and conferences focusing on the digital grid, the gap in the security research community specially addressing smart grids is still wide, and many of the systems rolled out now have a wealth of unaddressed security issues. This workshop aims to fill that void and encourage more research into the area of smart grid security by providing a forum for security researchers to present their work. This workshop serves as an opportunity to foster collaboration between the power industry and the ACM CCS research community. \u0000 \u0000The scope of the workshop encompasses all aspects of the smart grid, including distribution, transmission, generation, metering, e-mobility, and integration of distributed energy resources. SEGS publications offer perspectives from both academia and industry, and present novel research on theoretical and practical aspects of smart grid security and privacy, including design, analysis, experimentation, and fielded systems. SEGS also aims for the integration of other communities, such as law, economics, and HCI, which present these communities' perspectives on technological issues. We hope that the workshop will provide the participants with the opportunity to share ideas and practical experience, and will result in progress towards more resilient power systems. \u0000 \u0000TOPICS OF INTEREST The SEGS Workshop focuses on the following topics: \u0000Smart grid architectures and models \u0000Smart grid networks and communication \u0000Security and dependability in safetycritical, real-time systems \u0000Data protection and privacy \u0000Grid management \u0000Trust and assurance \u0000Intrusion detection and monitoring on smart grids \u0000Algorithms and protocols for critical infrastructures \u0000Risk and threat analysis \u0000Smartgrid standards, testing, andcertification \u0000Testbeds and field trials \u0000Usability and legal issues on grid security \u0000Cloud computing and smart grids","PeriodicalId":292964,"journal":{"name":"Proceedings of the 2nd Workshop on Smart Energy Grid Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133671625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Vulnerabilities of the Cisco IOS Implementation of the MPLS Transport Profile Cisco IOS实现MPLS传输配置文件的安全漏洞分析
Pub Date : 2014-11-07 DOI: 10.1145/2667190.2667197
Upul Jayasinghe, Sérgio Barreto Andrade, M. Popovic, T. Tesfay, J. Boudec
We are interested in the security of the MPLS Transport Profile (MPLS-TP), in the context of smart-grid communication networks. The security guidelines of the MPLS-TP standards are written in a complex and indirect way, which led us to pose as hypothesis that vendor solutions might not implement them satisfactorily. To test this hypothesis, we investigated the Cisco implementation of two MPLS-TP OAM (Operations, Administration, and Maintenance) protocols: bidirectional forwarding detection (BFD), used to detect failures in label-switched paths (LSPs) and protection state coordination (PSC), used to coordinate protection switching. Critical smart grid applications, such as protection and control, rely on the protection switching feature controlled by BFD and PSC. We did find security issues with this implementation. We implemented a testbed with eight nodes that run the MPLS-TP enabled Cisco IOS; we demonstrated that an attacker who has access to only one cable (for two attacks) or two cables (for one attack) is able to harm the network at several points (e.g., disabling both working and protection LSPs). This occurred in spite of us implementing the security guidelines that are available from Cisco for IOS and MPLS-TP. The attacks use forged BFD or PSC messages, which induce a label-edge router (LER) into believing false information about an LSP. In one attack, the LER disables the operational LSP; in another attack, the LER continues to believe that a physically destroyed LSP is up and running; in yet another attack, both operational and backup LSPs are brought down. Our findings suggest that the MPLS-TP standard should be more explicit when it comes to security. For example, to thwart the attacks revealed here, it should mandate either hop by hop authentication (such as MACSec) at every node, or an ad-hoc authentication mechanism for BFD and PSC.
我们对智能电网通信网络背景下MPLS传输配置文件(MPLS- tp)的安全性感兴趣。MPLS-TP标准的安全指导方针是以复杂和间接的方式编写的,这导致我们假设供应商解决方案可能无法令人满意地实现它们。为了验证这一假设,我们研究了Cisco实现的两种MPLS-TP OAM(操作、管理和维护)协议:双向转发检测(BFD),用于检测标签交换路径(lsp)中的故障,以及保护状态协调(PSC),用于协调保护交换。保护和控制等关键智能电网应用依赖于BFD和PSC控制的保护切换特性。我们确实在这个实现中发现了安全问题。我们实现了一个带有8个节点的测试平台,运行支持MPLS-TP的Cisco IOS;我们证明,攻击者只访问一条电缆(针对两次攻击)或两条电缆(针对一次攻击),就能够在几个点上损害网络(例如,禁用工作和保护lsp)。尽管我们为IOS和MPLS-TP实施了思科提供的安全指南,但还是发生了这种情况。这些攻击利用伪造的BFD或PSC消息,诱导LER (label-edge router)相信LSP的错误信息。在一次攻击中,LER关闭了运行LSP;在另一种攻击中,LER继续认为物理破坏的LSP已经启动并运行;在另一次攻击中,操作和备份lsp都被关闭。我们的研究结果表明,在安全性方面,MPLS-TP标准应该更加明确。例如,为了阻止这里揭示的攻击,它应该在每个节点上强制执行逐跳身份验证(例如MACSec),或者为BFD和PSC提供一个特别的身份验证机制。
{"title":"Security Vulnerabilities of the Cisco IOS Implementation of the MPLS Transport Profile","authors":"Upul Jayasinghe, Sérgio Barreto Andrade, M. Popovic, T. Tesfay, J. Boudec","doi":"10.1145/2667190.2667197","DOIUrl":"https://doi.org/10.1145/2667190.2667197","url":null,"abstract":"We are interested in the security of the MPLS Transport Profile (MPLS-TP), in the context of smart-grid communication networks. The security guidelines of the MPLS-TP standards are written in a complex and indirect way, which led us to pose as hypothesis that vendor solutions might not implement them satisfactorily. To test this hypothesis, we investigated the Cisco implementation of two MPLS-TP OAM (Operations, Administration, and Maintenance) protocols: bidirectional forwarding detection (BFD), used to detect failures in label-switched paths (LSPs) and protection state coordination (PSC), used to coordinate protection switching. Critical smart grid applications, such as protection and control, rely on the protection switching feature controlled by BFD and PSC. We did find security issues with this implementation. We implemented a testbed with eight nodes that run the MPLS-TP enabled Cisco IOS; we demonstrated that an attacker who has access to only one cable (for two attacks) or two cables (for one attack) is able to harm the network at several points (e.g., disabling both working and protection LSPs). This occurred in spite of us implementing the security guidelines that are available from Cisco for IOS and MPLS-TP. The attacks use forged BFD or PSC messages, which induce a label-edge router (LER) into believing false information about an LSP. In one attack, the LER disables the operational LSP; in another attack, the LER continues to believe that a physically destroyed LSP is up and running; in yet another attack, both operational and backup LSPs are brought down. Our findings suggest that the MPLS-TP standard should be more explicit when it comes to security. For example, to thwart the attacks revealed here, it should mandate either hop by hop authentication (such as MACSec) at every node, or an ad-hoc authentication mechanism for BFD and PSC.","PeriodicalId":292964,"journal":{"name":"Proceedings of the 2nd Workshop on Smart Energy Grid Security","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129708146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the 2nd Workshop on Smart Energy Grid Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1