2023
DOI: 10.1007/978-3-031-20360-2_2
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Vulnerabilities of Modern Power Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 45 publications
0
2
0
Order By: Relevance
“…To carry out these kinds of attacks, one is not required to be familiar with the microgrids' settings or have the necessary skills to alter control messages and measurements. During the DoS cyber-attack on the Ukrainian power grid, operators were unable to communicate control signals to the actuators [10]. Wide area networks can be vulnerable to DoS cyber-attacks if malware is placed in substation routers, giving attackers access to phasor measurement unit (PMU) communications.…”
Section: Denial-of-service Cyber-attackmentioning
confidence: 99%
See 1 more Smart Citation
“…To carry out these kinds of attacks, one is not required to be familiar with the microgrids' settings or have the necessary skills to alter control messages and measurements. During the DoS cyber-attack on the Ukrainian power grid, operators were unable to communicate control signals to the actuators [10]. Wide area networks can be vulnerable to DoS cyber-attacks if malware is placed in substation routers, giving attackers access to phasor measurement unit (PMU) communications.…”
Section: Denial-of-service Cyber-attackmentioning
confidence: 99%
“…Due to a cyber-attack brought on by malware known as BlackEnergy in control center computers, Ukraine's power infrastructure failed in December 2015, knocking out thousands of homes and facilities. A significant percentage of consumers would lose power due to such malfunctions and cyber-attacks, and very sensitive and mission-critical equipment may suffer serious harm [10][11][12][13][14][15]. Table 1 summarizes the actual reported cyber-attacks on the energy industry [16][17][18].…”
Section: Introductionmentioning
confidence: 99%
“…Information is gained by the attacker impersonating both the server and client, hence the threat is that the attacker is able to capture, receive and sent information that is intended for another person on the network [34], [35]. In this attack, real time operations of information exchange, transactional operations and communication are interfered with [36]. Different types of attacks in this case are spoofing of IP and hijacking of sessions on the network [37], [38], [39].…”
Section: Man-in-the-middle (Mitm) Attacksmentioning
confidence: 99%
“…The vulnerabilities of cyberphysical network (CPS) based control systems in DC microgrids are multifaceted [31]. First, the interconnected nature of DERs and their reliance on communication networks exposes them to potential unauthorized access and control [32]. Malicious actors could exploit vulnerabilities in communication protocols or gain unauthorized access to the control infrastructure [33].…”
Section: Introductionmentioning
confidence: 99%