With the increasing use of information and communication technology in electrical power grids, the security of energy supply is increasingly threatened by cyber-attacks. Traditional cyber-security measures, such as firewalls or intrusion detection/prevention systems, can be used as mitigation and prevention measures, but their effective use requires a deep understanding of the potential threat landscape and complex attack processes in energy information systems. Given the complexity and lack of detailed knowledge of coordinated, timed attacks in smart grid applications, we need information and insight into realistic attack scenarios in an appropriate and practical setting. In this paper, we present a man-in-the-middle-based attack scenario that intercepts process communication between control systems and field devices, employs false data injection techniques, and performs data corruption such as sending false commands to field devices. We demonstrate the applicability of the presented attack scenario in a physical smart grid laboratory environment and analyze the generated data under normal and attack conditions to extract domain-specific knowledge for detection mechanisms.
翻译:随着电网越来越多地使用信息和通信技术,能源供应的安全日益受到网络攻击的威胁,传统的网络安全措施,如防火墙或入侵探测/预防系统,可以用作减轻和预防措施,但有效使用这些措施需要深入了解能源信息系统的潜在威胁面貌和复杂的攻击过程。鉴于智能电网应用中协调的、有时间限制的袭击的复杂性和缺乏详细知识,我们需要在适当和切合实际的环境中对现实的攻击情景提供信息和洞察。本文介绍了中继攻击情景,即拦截控制系统和实地装置之间的通信,使用虚假的数据注入技术,并进行数据腐败,例如向实地装置发送错误指令。我们展示了在物理智能电网实验室环境中攻击情景的适用性,并分析了正常和攻击条件下生成的数据,以获取用于探测机制的域内知识。