Title
Semantic security analysis of SCADA networks to detect malicious control commands in power grids
Abstract
In the current generation of SCADA (Supervisory Control And Data Acquisition) systems used in power grids, a sophisticated attacker can exploit system vulnerabilities and use a legitimate maliciously crafted command to cause a wide range of system changes that traditional contingency analysis does not consider and remedial action schemes cannot handle. To detect such malicious commands, we propose a semantic analysis framework based on a distributed network of intrusion detection systems (IDSes). The framework combines system knowledge of both cyber and physical infrastructure in power grid to help IDS to estimate execution consequences of control commands, thus to reveal attacker's malicious intentions. We evaluated the approach on the IEEE 30-bus system. Our experiments demonstrate that: (i) by opening 3 transmission lines, an attacker can avoid detection by the traditional contingency analysis and instantly put the tested 30-bus system into an insecure state and (ii) the semantic analysis provides reliable detection of malicious commands with a small amount of analysis time.
Year
DOI
Venue
2013
10.1145/2516930.2516947
SEGS@CCS
Keywords
Field
DocType
system change,semantic security analysis,intrusion detection system,traditional contingency analysis,semantic analysis framework,semantic analysis,malicious control command,analysis time,scada network,malicious command,ieee 30-bus system,30-bus system,power grid,scada
Semantic security,Computer science,Computer security,Power grid,Exploit,Electric power transmission,SCADA,Intrusion detection system,Contingency,Vulnerability
Conference
Citations 
PageRank 
References 
15
1.06
5
Authors
5
Name
Order
Citations
PageRank
Hui Lin1151.40
Adam Slagell220312.13
Zbigniew Kalbarczyk31896159.48
Peter W. Sauer44924.17
Ravishankar K. Iyer53489504.32