ED4GAP: Efficient Detection for GOOSE-Based Poisoning Attacks on IEC 61850 Substations

2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)(2020)

引用 10|浏览26
暂无评分
摘要
Devices in IEC 61850 substations use the generic object-oriented substation events (GOOSE) protocol to exchange protection-related events. Because of its lack of authentication and encryption, GOOSE is vulnerable to man-in-the-middle attacks. An adversary with access to the substation network can inject carefully crafted messages to impact the grid's availability. One of the most common such attacks, GOOSE-based poisoning, modifies the StNum and SqNum fields in the protocol data unit to take over GOOSE publications. We present ED4GAP, a network- level system for efficient detection of the poisoning attacks. We define a finite state machine model for network communication concerning the attacks. Guided by the model, ED4GAP analyzes network traffic out-of-band and detects attacks in real-time. We implement a prototype of the system and evaluate its detection accuracy. We provide a systematic approach to assessing bottlenecks, improving performance, and demonstrating that ED4GAP has low overhead and meets GOOSE's timing constraints.
更多
查看译文
关键词
GOOSE-based poisoning attacks,generic object-oriented substation event protocol,protection-related events,authentication,encryption,man-in-the-middle attacks,protocol data unit,finite state machine model,network communication,GOOSE timing constraints,network traffic out-of-band analysis,ED4GAP,network-level system,IEC 61850 substation network,SqNum fields,StNum fields
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要