{"title":"iCAD:智能电网DDoS防护的信息中心网络架构","authors":"George Torres, Sharad Shrestha, S. Misra","doi":"10.1109/SmartGridComm52983.2022.9960983","DOIUrl":null,"url":null,"abstract":"With the proliferation of differently-abled and het-erogeneous devices in the smart grid Denial of Service (DoS) is becoming an even more potent attack vector than it was before. This paper demonstrates the ease with which an adversary can orchestrate DoS and distributed DoS (DDoS) attacks on the grid. We then propose iCAD-an information-centric ar-chitecture, which extends the iCAAP architecture proposed by us [8], complete with mitigation strategies built for DoS/DDoS resilience. We discuss our architecture in detail and demonstrate the architecture and the mitigation technique's effectiveness in mitigating DoS/DDoS attacks in the face of significant attack load from the distributed agents.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"iCAD: information-Centric network Architecture for DDoS Protection in the Smart Grid\",\"authors\":\"George Torres, Sharad Shrestha, S. Misra\",\"doi\":\"10.1109/SmartGridComm52983.2022.9960983\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the proliferation of differently-abled and het-erogeneous devices in the smart grid Denial of Service (DoS) is becoming an even more potent attack vector than it was before. This paper demonstrates the ease with which an adversary can orchestrate DoS and distributed DoS (DDoS) attacks on the grid. We then propose iCAD-an information-centric ar-chitecture, which extends the iCAAP architecture proposed by us [8], complete with mitigation strategies built for DoS/DDoS resilience. We discuss our architecture in detail and demonstrate the architecture and the mitigation technique's effectiveness in mitigating DoS/DDoS attacks in the face of significant attack load from the distributed agents.\",\"PeriodicalId\":252202,\"journal\":{\"name\":\"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)\",\"volume\":\"61 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-10-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SmartGridComm52983.2022.9960983\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SmartGridComm52983.2022.9960983","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
iCAD: information-Centric network Architecture for DDoS Protection in the Smart Grid
With the proliferation of differently-abled and het-erogeneous devices in the smart grid Denial of Service (DoS) is becoming an even more potent attack vector than it was before. This paper demonstrates the ease with which an adversary can orchestrate DoS and distributed DoS (DDoS) attacks on the grid. We then propose iCAD-an information-centric ar-chitecture, which extends the iCAAP architecture proposed by us [8], complete with mitigation strategies built for DoS/DDoS resilience. We discuss our architecture in detail and demonstrate the architecture and the mitigation technique's effectiveness in mitigating DoS/DDoS attacks in the face of significant attack load from the distributed agents.