2016 69th Annual Conference for Protective Relay Engineers (CPRE) 2016
DOI: 10.1109/cpre.2016.7914920
|View full text |Cite
|
Sign up to set email alerts
|

The importance of testing Smart Grid IEDs against security vulnerabilities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…The measurements are mapped back to the MMXU logical device in the IEC 61850 server. Figure 10 shows a typical communication between the DNP3 client and DNP3 serve for a "select-before operate" (Hunt and Popescu 2015), (Weerathunga and Cioraca 2016) communication flow. In the select-before-operate, two commands are sent in sequence.…”
Section: Details On Interoperability Codementioning
confidence: 99%
“…The measurements are mapped back to the MMXU logical device in the IEC 61850 server. Figure 10 shows a typical communication between the DNP3 client and DNP3 serve for a "select-before operate" (Hunt and Popescu 2015), (Weerathunga and Cioraca 2016) communication flow. In the select-before-operate, two commands are sent in sequence.…”
Section: Details On Interoperability Codementioning
confidence: 99%
“…Port banning occurs when the accessed port provides information on the protocol running on the port, the device's operating system and application, etc. Port scanning helps the attacker in obtaining valuable information of the network, including IP address, list of open ports and the applications running on those ports [88][89][90][91][92].…”
Section: Transport (Layer 4)mentioning
confidence: 99%
“…There have been technical discussions about hypothetical impact scenarios by enumerating the combinations of potential catastrophe through unauthorized remote connection [9]. This includes the preliminary investigation on the specific protective relaying scheme, bus differential configuration, and what would be the impact if the IED is compromised [10], [11]. There still remains a challenge about how to effectively enumerate all hypothesized scenarios of cyber-induced attacks that can help defenders to identify pivotal combinations [9]- [12].…”
Section: Introductionmentioning
confidence: 99%