Visible to the public Attack Models for Advanced Persistent Threats in Smart Grid Wide Area Monitoring

TitleAttack Models for Advanced Persistent Threats in Smart Grid Wide Area Monitoring
Publication TypeConference Paper
Year of Publication2017
AuthorsPaudel, Sarita, Smith, Paul, Zseby, Tanja
Conference NameProceedings of the 2Nd Workshop on Cyber-Physical Security and Resilience in Smart Grids
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4978-9
Keywordsattack model, attack tree, Human Behavior, power grid vulnerability analysis, pubcrawl, resilience, Resiliency, Scalability, security issues, Sophisticated Attacks, supply chain security, Wide Area Monitoring Security
Abstract

Wide Area Monitoring Systems (WAMSs) provide an essential building block for Smart Grid supervision and control. Distributed Phasor Measurement Units (PMUs) allow accurate clock-synchronized measurements of voltage and current phasors (amplitudes, phase angles) and frequencies. The sensor data from PMUs provide situational awareness in the grid, and are used as input for control decisions. A modification of sensor data can severely impact grid stability, overall power supply, and physical devices. Since power grids are critical infrastructures, WAMSs are tempting targets for all kinds of attackers, including well-organized and motivated adversaries such as terrorist groups or adversarial nation states. Such groups possess sufficient resources to launch sophisticated attacks. In this paper, we provide an in-depth analysis of attack possibilities on WAMSs. We model the dependencies and building blocks of Advanced Persistent Threats (APTs) on WAMSs using attack trees. We consider the whole WAMS infrastructure, including aggregation and data collection points, such as Phasor Data Concentrators (PDCs), classical IT components, and clock synchronization. Since Smart Grids are cyber-physical systems, we consider physical perturbations, in addition to cyber attacks in our models. The models provide valuable information about the chain of cyber or physical attack steps that can be combined to build a sophisticated attack for reaching a higher goal. They assist in the assessment of physical and cyber vulnerabilities, and provide strategic guidance for the deployment of suitable countermeasures.

URLhttps://dl.acm.org/citation.cfm?doid=3055386.3055390
DOI10.1145/3055386.3055390
Citation Keypaudel_attack_2017