2012 IEEE Globecom Workshops 2012
DOI: 10.1109/glocomw.2012.6477809
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting the GOOSE protocol: A practical attack on cyber-infrastructure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
57
0
6

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 103 publications
(64 citation statements)
references
References 2 publications
1
57
0
6
Order By: Relevance
“…While vendors try to fully abide by the standard, differences in the implementation process might still be found as shown in this paper. The presence of such differences in the implementation process might expose the system to unwanted vulnerabilities, which might be exploited by prying eyes to launch cyber-attacks on the power grid [7,23]. As GOOSE messaging is the base protocol for critical applications such as power systems protection, any vulnerability in the system might lead to devastating consequences, ranging from system disturbances to complete blackouts.…”
Section: Libiec61850mentioning
confidence: 99%
“…While vendors try to fully abide by the standard, differences in the implementation process might still be found as shown in this paper. The presence of such differences in the implementation process might expose the system to unwanted vulnerabilities, which might be exploited by prying eyes to launch cyber-attacks on the power grid [7,23]. As GOOSE messaging is the base protocol for critical applications such as power systems protection, any vulnerability in the system might lead to devastating consequences, ranging from system disturbances to complete blackouts.…”
Section: Libiec61850mentioning
confidence: 99%
“…Other work describes attack step sequences that include crafting legitimate but malicious DNP3 packets so that 4 circuit breakers can be opened simultaneously in a 30 bus network [10]. Hoyos et al [8] describe a message authentication attack on a network operating with the IEC-61850 standard and running the GOOSE protocol. Several examples of attacks feasible on Programmable Logic Controllers (PLCs) that run a Modbus protocol are described in the literature [7].…”
Section: Related Workmentioning
confidence: 99%
“…A timing attack on the IEC-61850-8-1 authentication mechanism [8] shows that since the computation capacity of embedded processors for running an authentication algorithm currently exceeds the needed 4ms response time, a successful attack would be able to create an automation breakdown, including damaging circuit breakers and power transformers.…”
Section: Related Workmentioning
confidence: 99%
“…The field StNum is status number, a counter that increments each time a GOOSE message has been sent with any change in the values of the Data Set. The field SqNum is sequence number, containing an incremental counter for each time a GOOSE message has been sent [6]. The field Test indicates if the message is a test or not.…”
Section: Feature Extractionmentioning
confidence: 99%