Attacking the smart grid using public information

Charalambos Konstantinou, Marios Sazos, Mihalis Maniatakos

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Over the past years, sophisticated adversaries have infiltrated the control networks of energy companies around the globe. As attempts to compromise industrial control and information technology systems have soared, electric utilities increase their investments in cyber security as an important step to enhance resiliency of the power system. Although utility companies started adopting a defense in depth strategy, compliant with security reliability standards, the first step towards building effective mitigation strategies is to understand the attack vectors emerging from publicly available information. To this end, we utilize data from accessible resources to create a map of the topological and electrical structure of smart grid regions. Furthermore, we identify electronic devices able to control the critical electrical units in the system. The location and characteristics of these components are used in a simulation environment to study the interaction of controls and dynamics in the system. Lastly, we examine the paths of attacking control equipment and discuss the impact of such scenarios.

Original languageEnglish (US)
Title of host publicationLATS 2016 - 17th IEEE Latin-American Test Symposium
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages105-110
Number of pages6
ISBN (Electronic)9781509013319
DOIs
StatePublished - Jun 1 2016
Event17th IEEE Latin-American Test Symposium, LATS 2016 - Foz do Iguacu, Brazil
Duration: Apr 6 2016Apr 9 2016

Other

Other17th IEEE Latin-American Test Symposium, LATS 2016
CountryBrazil
CityFoz do Iguacu
Period4/6/164/9/16

Fingerprint

Control equipment
Electric utilities
Information technology
Industry

ASJC Scopus subject areas

  • Hardware and Architecture
  • Safety, Risk, Reliability and Quality
  • Electrical and Electronic Engineering

Cite this

Konstantinou, C., Sazos, M., & Maniatakos, M. (2016). Attacking the smart grid using public information. In LATS 2016 - 17th IEEE Latin-American Test Symposium (pp. 105-110). [7483348] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/LATW.2016.7483348

Attacking the smart grid using public information. / Konstantinou, Charalambos; Sazos, Marios; Maniatakos, Mihalis.

LATS 2016 - 17th IEEE Latin-American Test Symposium. Institute of Electrical and Electronics Engineers Inc., 2016. p. 105-110 7483348.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Konstantinou, C, Sazos, M & Maniatakos, M 2016, Attacking the smart grid using public information. in LATS 2016 - 17th IEEE Latin-American Test Symposium., 7483348, Institute of Electrical and Electronics Engineers Inc., pp. 105-110, 17th IEEE Latin-American Test Symposium, LATS 2016, Foz do Iguacu, Brazil, 4/6/16. https://doi.org/10.1109/LATW.2016.7483348
Konstantinou C, Sazos M, Maniatakos M. Attacking the smart grid using public information. In LATS 2016 - 17th IEEE Latin-American Test Symposium. Institute of Electrical and Electronics Engineers Inc. 2016. p. 105-110. 7483348 https://doi.org/10.1109/LATW.2016.7483348
Konstantinou, Charalambos ; Sazos, Marios ; Maniatakos, Mihalis. / Attacking the smart grid using public information. LATS 2016 - 17th IEEE Latin-American Test Symposium. Institute of Electrical and Electronics Engineers Inc., 2016. pp. 105-110
@inproceedings{9874e9fbd9a246f28ec562a8e5d29e59,
title = "Attacking the smart grid using public information",
abstract = "Over the past years, sophisticated adversaries have infiltrated the control networks of energy companies around the globe. As attempts to compromise industrial control and information technology systems have soared, electric utilities increase their investments in cyber security as an important step to enhance resiliency of the power system. Although utility companies started adopting a defense in depth strategy, compliant with security reliability standards, the first step towards building effective mitigation strategies is to understand the attack vectors emerging from publicly available information. To this end, we utilize data from accessible resources to create a map of the topological and electrical structure of smart grid regions. Furthermore, we identify electronic devices able to control the critical electrical units in the system. The location and characteristics of these components are used in a simulation environment to study the interaction of controls and dynamics in the system. Lastly, we examine the paths of attacking control equipment and discuss the impact of such scenarios.",
author = "Charalambos Konstantinou and Marios Sazos and Mihalis Maniatakos",
year = "2016",
month = "6",
day = "1",
doi = "10.1109/LATW.2016.7483348",
language = "English (US)",
pages = "105--110",
booktitle = "LATS 2016 - 17th IEEE Latin-American Test Symposium",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - GEN

T1 - Attacking the smart grid using public information

AU - Konstantinou, Charalambos

AU - Sazos, Marios

AU - Maniatakos, Mihalis

PY - 2016/6/1

Y1 - 2016/6/1

N2 - Over the past years, sophisticated adversaries have infiltrated the control networks of energy companies around the globe. As attempts to compromise industrial control and information technology systems have soared, electric utilities increase their investments in cyber security as an important step to enhance resiliency of the power system. Although utility companies started adopting a defense in depth strategy, compliant with security reliability standards, the first step towards building effective mitigation strategies is to understand the attack vectors emerging from publicly available information. To this end, we utilize data from accessible resources to create a map of the topological and electrical structure of smart grid regions. Furthermore, we identify electronic devices able to control the critical electrical units in the system. The location and characteristics of these components are used in a simulation environment to study the interaction of controls and dynamics in the system. Lastly, we examine the paths of attacking control equipment and discuss the impact of such scenarios.

AB - Over the past years, sophisticated adversaries have infiltrated the control networks of energy companies around the globe. As attempts to compromise industrial control and information technology systems have soared, electric utilities increase their investments in cyber security as an important step to enhance resiliency of the power system. Although utility companies started adopting a defense in depth strategy, compliant with security reliability standards, the first step towards building effective mitigation strategies is to understand the attack vectors emerging from publicly available information. To this end, we utilize data from accessible resources to create a map of the topological and electrical structure of smart grid regions. Furthermore, we identify electronic devices able to control the critical electrical units in the system. The location and characteristics of these components are used in a simulation environment to study the interaction of controls and dynamics in the system. Lastly, we examine the paths of attacking control equipment and discuss the impact of such scenarios.

UR - http://www.scopus.com/inward/record.url?scp=84978473084&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84978473084&partnerID=8YFLogxK

U2 - 10.1109/LATW.2016.7483348

DO - 10.1109/LATW.2016.7483348

M3 - Conference contribution

SP - 105

EP - 110

BT - LATS 2016 - 17th IEEE Latin-American Test Symposium

PB - Institute of Electrical and Electronics Engineers Inc.

ER -