2015 IEEE Power &Amp; Energy Society General Meeting 2015
DOI: 10.1109/pesgm.2015.7286357
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity test-bed for IEC 61850 based smart substations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
32
0
2

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 49 publications
(35 citation statements)
references
References 7 publications
0
32
0
2
Order By: Relevance
“…In order to verify the proposed IDS approaches in this paper, an "attacker" laptop was directly connected to the station bus and the process bus to launch a number of cyberattacks in this test-bed, such as malformed packet attack, DoS attack, address resolution protocol (ARP) spoofing attack, and man-in-the-middle (MITM) attack, as depicted in the authors' previous work [23]. The attack could equally have originated from a malware infected host on the network.…”
Section: B Experimental Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…In order to verify the proposed IDS approaches in this paper, an "attacker" laptop was directly connected to the station bus and the process bus to launch a number of cyberattacks in this test-bed, such as malformed packet attack, DoS attack, address resolution protocol (ARP) spoofing attack, and man-in-the-middle (MITM) attack, as depicted in the authors' previous work [23]. The attack could equally have originated from a malware infected host on the network.…”
Section: B Experimental Resultsmentioning
confidence: 99%
“…In order to investigate potential cybersecurity vulnerabilities in IEC 61850 based smart substations and verify the proposed IDS, a cyber-physical test-bed has been built in the State Grid Key Laboratory of Substation Intelligent Equipment Testing Technology in China [23], as demonstrated in Fig. 8.…”
Section: A Cyber-physical Test-bedmentioning
confidence: 99%
See 1 more Smart Citation
“…Xiong Qi et al implemented an OPC-MFuzzer tool for OPC-based vulnerability exploiting based on the work of Ting Wang et al [10]. Devarajan designed the fuzzing framework for ICCP, MODBUS and DNP protocols [11]. Compared with the above traditional fuzzing tools, Sulley, the new generation of fuzzing framework, is much easier to use, in that it not only tests software in a physical machine, but also tests software in a virtual machine [8].…”
Section: Iec 61850 Fuzzing Toolmentioning
confidence: 99%
“…The Introduction of IEC 61850 IEC 61850 is the only communication standard system proposed by International Electrotechnical Commission for the future of substation automation system [5,11]. IEC 61850 defines an abstract data model that can be mapped to multiple protocols.…”
Section: Overview and Analysis Of Iec 61850mentioning
confidence: 99%