{"title":"通过电力运输系统中的电动汽车通勤和充电实现最大程度恶意软件传播的攻击设计","authors":"Sushil Poudel;Mahmoud Abouyoussef;J. Eileen Baugh;Muhammad Ismail","doi":"10.1109/JSYST.2024.3446231","DOIUrl":null,"url":null,"abstract":"The growing number of electric vehicles (EVs) on the roads led to a wide deployment of public EV charging stations (EVCSs). Recent reports revealed that both EVs and EVCSs are targets of cyber-attacks. In this context, a malware attack on vehicle-to-grid (V2G) communications increases the risk of malware spread among EVs and public EVCSs. However, the existing literature lacks practical studies on malware spread in power-transportation systems. Hence, this article demonstrates malicious traffic injection and proposes strategies to identify target EVCSs that can maximize physical malware spread within power-transportation systems. We first show the feasibility of injecting malicious traffic into the front-end V2G communication. Next, we establish a model that reflects the logical connectivity among the EVCSs, based on a realistic framework for large-scale EV commute and charge simulation. The logical connectivity is then translated into a malware spread probability, which we use to design an optimal attack strategy that identifies the locations of target EVCSs that maximize the malware spread. We compare malware spread due to random, cluster-based, and optimal attack strategies in both urban (Nashville) and rural (Cookeville) U.S. cities. Our results reveal that optimal attack strategies can accelerate malware spread by \n<inline-formula><tex-math>$10\\%$</tex-math></inline-formula>\n–\n<inline-formula><tex-math>$33\\%$</tex-math></inline-formula>\n.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 3","pages":"1809-1820"},"PeriodicalIF":4.0000,"publicationDate":"2024-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Attack Design for Maximum Malware Spread Through EVs Commute and Charge in Power-Transportation Systems\",\"authors\":\"Sushil Poudel;Mahmoud Abouyoussef;J. Eileen Baugh;Muhammad Ismail\",\"doi\":\"10.1109/JSYST.2024.3446231\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The growing number of electric vehicles (EVs) on the roads led to a wide deployment of public EV charging stations (EVCSs). Recent reports revealed that both EVs and EVCSs are targets of cyber-attacks. In this context, a malware attack on vehicle-to-grid (V2G) communications increases the risk of malware spread among EVs and public EVCSs. However, the existing literature lacks practical studies on malware spread in power-transportation systems. Hence, this article demonstrates malicious traffic injection and proposes strategies to identify target EVCSs that can maximize physical malware spread within power-transportation systems. We first show the feasibility of injecting malicious traffic into the front-end V2G communication. Next, we establish a model that reflects the logical connectivity among the EVCSs, based on a realistic framework for large-scale EV commute and charge simulation. The logical connectivity is then translated into a malware spread probability, which we use to design an optimal attack strategy that identifies the locations of target EVCSs that maximize the malware spread. We compare malware spread due to random, cluster-based, and optimal attack strategies in both urban (Nashville) and rural (Cookeville) U.S. cities. Our results reveal that optimal attack strategies can accelerate malware spread by \\n<inline-formula><tex-math>$10\\\\%$</tex-math></inline-formula>\\n–\\n<inline-formula><tex-math>$33\\\\%$</tex-math></inline-formula>\\n.\",\"PeriodicalId\":55017,\"journal\":{\"name\":\"IEEE Systems Journal\",\"volume\":\"18 3\",\"pages\":\"1809-1820\"},\"PeriodicalIF\":4.0000,\"publicationDate\":\"2024-08-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Systems Journal\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10659100/\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Systems Journal","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10659100/","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Attack Design for Maximum Malware Spread Through EVs Commute and Charge in Power-Transportation Systems
The growing number of electric vehicles (EVs) on the roads led to a wide deployment of public EV charging stations (EVCSs). Recent reports revealed that both EVs and EVCSs are targets of cyber-attacks. In this context, a malware attack on vehicle-to-grid (V2G) communications increases the risk of malware spread among EVs and public EVCSs. However, the existing literature lacks practical studies on malware spread in power-transportation systems. Hence, this article demonstrates malicious traffic injection and proposes strategies to identify target EVCSs that can maximize physical malware spread within power-transportation systems. We first show the feasibility of injecting malicious traffic into the front-end V2G communication. Next, we establish a model that reflects the logical connectivity among the EVCSs, based on a realistic framework for large-scale EV commute and charge simulation. The logical connectivity is then translated into a malware spread probability, which we use to design an optimal attack strategy that identifies the locations of target EVCSs that maximize the malware spread. We compare malware spread due to random, cluster-based, and optimal attack strategies in both urban (Nashville) and rural (Cookeville) U.S. cities. Our results reveal that optimal attack strategies can accelerate malware spread by
$10\%$
–
$33\%$
.
期刊介绍:
This publication provides a systems-level, focused forum for application-oriented manuscripts that address complex systems and system-of-systems of national and global significance. It intends to encourage and facilitate cooperation and interaction among IEEE Societies with systems-level and systems engineering interest, and to attract non-IEEE contributors and readers from around the globe. Our IEEE Systems Council job is to address issues in new ways that are not solvable in the domains of the existing IEEE or other societies or global organizations. These problems do not fit within traditional hierarchical boundaries. For example, disaster response such as that triggered by Hurricane Katrina, tsunamis, or current volcanic eruptions is not solvable by pure engineering solutions. We need to think about changing and enlarging the paradigm to include systems issues.