2015
DOI: 10.1007/s11277-015-2510-3
|View full text |Cite
|
Sign up to set email alerts
|

Impact of Distributed Denial-of-Service Attack on Advanced Metering Infrastructure

Abstract: The age of Internet of Things (IoT) has brought in new challenges specifically in areas such as security. The evolution of classic power grids to smart grids is a prime example of how everything is now being connected to the Internet. With the power grid becoming smart, the information and communication systems supporting it is subject to both classical and emerging cyber-attacks. The article investigates the vulnerabilities caused by distributed denial-of-service (DDoS) attack on the smart grid advanced meter… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
4

Relationship

2
6

Authors

Journals

citations
Cited by 60 publications
(33 citation statements)
references
References 15 publications
0
33
0
Order By: Relevance
“…For instance, a misdirected control command leads to DoS attacks and about to take down the Austrian utility network [56]. In [95], Asri-Pranggono evaluated the impacts of DoS attacks (e.g., flooding attack) on the AMI network. DoS attacks can be further categorized as follows.…”
Section: E Denial Of Servicementioning
confidence: 99%
“…For instance, a misdirected control command leads to DoS attacks and about to take down the Austrian utility network [56]. In [95], Asri-Pranggono evaluated the impacts of DoS attacks (e.g., flooding attack) on the AMI network. DoS attacks can be further categorized as follows.…”
Section: E Denial Of Servicementioning
confidence: 99%
“…• Network Based Attacks: One entry point for attackers into a Cloud system can be through the network that leads to weakening the quality of Cloud services and further putting Cloud confidentiality and privacy at risks. The most common attacks on network infrastructure in the Cloud are port scanning, Botnets, man-in-the-middle (MITM) [15], distributed denial of service (DDoS) [16], and spoofing attacks.…”
Section: Classification Of Attacksmentioning
confidence: 99%
“…The different simulation approaches for availability attacks are shown in Table 3, and are described in the following paragraphs. Different types of DoS/DDoS attacks, which have different effects on a network, exist [3,5]. Since DoS/DDoS attacks seek to compromise the network's availability by attacking the network with requests, three different scenarios are simulated.…”
Section: Cyber-attacksmentioning
confidence: 99%
“…Simulation of Cyber-Attacks on SG Simulation of Cyber-Attacks on SMs Availability Attacks DoS/DDoS Attacks Soupionis and Benoist [11] Asri and Pranggono [5] Zhang et al [12] Sgouras et al [4] Ma et al [13] Integrity/Confidentiality Attacks Spoofing Attacks Zhang et al [12] Message modification Zhang et al [12] MITM Attacks Zhang et al [12] Ciancamerla et al [14] Soupionis and Benoist [11] simulated DoS/DDoS attacks on SG by attacking a specific web service to limit communication by a router, which connected the different SG elements. An approach utilized by Asri and Pranggono [5] used NeSSi, an agent-based simulation environment, to evaluate DDoS attack impact on SG.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation