IEC 61850变电站中的供应链攻击建模

O. Duman, Mohsen Ghafouri, Marthe Kassouf, Ribal Atallah, Lingyu Wang, M. Debbabi
{"title":"IEC 61850变电站中的供应链攻击建模","authors":"O. Duman, Mohsen Ghafouri, Marthe Kassouf, Ribal Atallah, Lingyu Wang, M. Debbabi","doi":"10.1109/SmartGridComm.2019.8909818","DOIUrl":null,"url":null,"abstract":"Supply chain attacks, which exploit vulnerabilities deliberately injected into devices either before their shipment or through subsequent firmware updates, represent one of the most insidious security threats in smart grids. The deliberate nature of such vulnerabilities means that they can be more difficult to mitigate, e.g., the attack could be designed to autonomously launch from the inside or to cause invisible physical damages to devices over a long time span. Furthermore, they can result in more severe consequences, e.g., the attack could leak sensitive information like crypto keys, or cause a large scale blackout through coordinated devices from the same malicious or hijacked vendor. In this paper, we take the first step towards a better understanding of the threat of supply chain attacks in IEC 61850 substations. Specifically, we first discuss the general concept and unique aspects of supply chain attacks. We then present concrete models of different supply chain attacks through extending the attack graph model and designing a security metric, namely k-Supply. Lastly, we apply such models to quantitatively study the potential impact of supply chain attacks through simulations.","PeriodicalId":377150,"journal":{"name":"2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":"{\"title\":\"Modeling Supply Chain Attacks in IEC 61850 Substations\",\"authors\":\"O. Duman, Mohsen Ghafouri, Marthe Kassouf, Ribal Atallah, Lingyu Wang, M. Debbabi\",\"doi\":\"10.1109/SmartGridComm.2019.8909818\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Supply chain attacks, which exploit vulnerabilities deliberately injected into devices either before their shipment or through subsequent firmware updates, represent one of the most insidious security threats in smart grids. The deliberate nature of such vulnerabilities means that they can be more difficult to mitigate, e.g., the attack could be designed to autonomously launch from the inside or to cause invisible physical damages to devices over a long time span. Furthermore, they can result in more severe consequences, e.g., the attack could leak sensitive information like crypto keys, or cause a large scale blackout through coordinated devices from the same malicious or hijacked vendor. In this paper, we take the first step towards a better understanding of the threat of supply chain attacks in IEC 61850 substations. Specifically, we first discuss the general concept and unique aspects of supply chain attacks. We then present concrete models of different supply chain attacks through extending the attack graph model and designing a security metric, namely k-Supply. Lastly, we apply such models to quantitatively study the potential impact of supply chain attacks through simulations.\",\"PeriodicalId\":377150,\"journal\":{\"name\":\"2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)\",\"volume\":\"84 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"14\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SmartGridComm.2019.8909818\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SmartGridComm.2019.8909818","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 14

摘要

供应链攻击,利用在设备发货前或随后的固件更新中故意注入的漏洞,是智能电网中最隐蔽的安全威胁之一。此类漏洞的故意性质意味着它们可能更难以缓解,例如,攻击可以被设计为从内部自动启动,或者在很长一段时间内对设备造成无形的物理损害。此外,它们还可能导致更严重的后果,例如,攻击可能会泄露加密密钥等敏感信息,或者通过来自同一恶意或被劫持供应商的协调设备造成大规模停电。在本文中,我们迈出了更好地理解IEC 61850变电站供应链攻击威胁的第一步。具体来说,我们首先讨论供应链攻击的一般概念和独特方面。然后,通过扩展攻击图模型和设计一个安全度量k-Supply,给出了不同供应链攻击的具体模型。最后,我们通过模拟应用这些模型定量研究供应链攻击的潜在影响。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Modeling Supply Chain Attacks in IEC 61850 Substations
Supply chain attacks, which exploit vulnerabilities deliberately injected into devices either before their shipment or through subsequent firmware updates, represent one of the most insidious security threats in smart grids. The deliberate nature of such vulnerabilities means that they can be more difficult to mitigate, e.g., the attack could be designed to autonomously launch from the inside or to cause invisible physical damages to devices over a long time span. Furthermore, they can result in more severe consequences, e.g., the attack could leak sensitive information like crypto keys, or cause a large scale blackout through coordinated devices from the same malicious or hijacked vendor. In this paper, we take the first step towards a better understanding of the threat of supply chain attacks in IEC 61850 substations. Specifically, we first discuss the general concept and unique aspects of supply chain attacks. We then present concrete models of different supply chain attacks through extending the attack graph model and designing a security metric, namely k-Supply. Lastly, we apply such models to quantitatively study the potential impact of supply chain attacks through simulations.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Online Demand Response of Voltage-Dependent Loads for Corrective Grid De-Congestion MEED: An Unsupervised Multi-Environment Event Detector for Non-Intrusive Load Monitoring Traction substation power signal characteristics and transient power quality evaluation method Reliable Streaming and Synchronization of Smart Meter Data over Intermittent Data Connections Synthetic Power Line Communications Channel Generation with Autoencoders and GANs
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1