Proceedings of the 17th International Conference on Availability, Reliability and Security 2022
DOI: 10.1145/3538969.3544475
|View full text |Cite
|
Sign up to set email alerts
|

Attacking Power Grid Substations: An Experiment Demonstrating How to Attack the SCADA Protocol IEC 60870-5-104

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
3
2

Relationship

2
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…The approach has thus far consisted of first performing 1. Cyber security attacks on respective systems to identify the attack effects and system behaviours (Erdődi et. al.…”
Section: Cyber Experiments In the Cscmentioning
confidence: 99%
“…The approach has thus far consisted of first performing 1. Cyber security attacks on respective systems to identify the attack effects and system behaviours (Erdődi et. al.…”
Section: Cyber Experiments In the Cscmentioning
confidence: 99%
“…In this paper, we utilize the Digital Station (DS) Enclave testbed shown in Figure 3, which covers a complete IEC 61850 substation automation system, to conduct cyber-attacks on IEC 61850 by targeting the PTP. The DS Enclave testbed has been developed as part of the CybWin Project [52] and was earlier used for analysis of different types of cyber-attacks on the SCADA protocol IEC 60870-5-104, which is used for communication between the IEC 61850 substation and the dispatch (control) center [53]. As shown in Figure 3, the digital substation consists of a station bus and a process bus, which are represented in a yellow block and a red block, respectively.…”
Section: Digital Station Enclave Setupmentioning
confidence: 99%
“…The DS enclave is equipped with IECTest, a specialized software conforming to the IEC/104 standard, which we utilized to emulate the operations of a control center [43]. This versatile tool allowed script-based programming, enabling the automation of specific com-mands, such as the opening and closing circuit breakers, to be executed at predetermined times within the experiment's duration.…”
Section: Testlabmentioning
confidence: 99%
“…To assess the precision and attack classification capabilities of the IDS, we selected a set of validated cyber-attacks [43] for implementation in the testbed.…”
Section: Attack Scenariosmentioning
confidence: 99%