Proceedings 2020 Network and Distributed System Security Symposium 2020
DOI: 10.14722/ndss.2020.24365
|View full text |Cite
|
Sign up to set email alerts
|

DefRec: Establishing Physical Function Virtualization to Disrupt Reconnaissance of Power Grids' Cyber-Physical Infrastructures

Abstract: Reconnaissance is critical for adversaries to prepare attacks causing physical damage in industrial control systems (ICS) like smart power grids. Disrupting reconnaissance is challenging. The state-of-the-art moving target defense (MTD) techniques based on mimicking and simulating system behaviors do not consider the physical infrastructure of power grids and can be easily identified. To overcome these challenges, we propose physical function virtualization (PFV) that "hooks" network interactions with real phy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 46 publications
0
8
0
Order By: Relevance
“…Recently, deception technology for modernized substation systems is proposed by Lin et al [43]. Their proposed technology utilizes software-defined networking and "seed devices", which are real power grid devices but, behind SDN (software-defined networking), interact with attackers on behalf of virtual, decoy devices to present realistic device characteristics, etc.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, deception technology for modernized substation systems is proposed by Lin et al [43]. Their proposed technology utilizes software-defined networking and "seed devices", which are real power grid devices but, behind SDN (software-defined networking), interact with attackers on behalf of virtual, decoy devices to present realistic device characteristics, etc.…”
Section: Related Workmentioning
confidence: 99%
“…Transmission line parameters are critical information for various power system applications including fault location and classification [1][2][3], relay protection [4][5][6], and other applications [7,8]. Thus, the accuracy of line parameters is important, and accurate line parameter estimation methods are demanded.…”
Section: Introductionmentioning
confidence: 99%
“…Although being effective in some settings, existing defense approaches against PLC-oriented attacks have the following key limitations. Firstly, defending approaches adopted by intrusion detection systems (IDSs) [9][10][11] , deception defense [12][13][14] and attestation [15][16][17][18][19] take effect after attacks happened, mainly detecting them but not blocking them, while blocking technologies such as industrial firewalls alone are not able to effectively block growing sophisticated attacks [20][21][22] . Secondly, most existing approaches are designed based on the characteristics of one or several specific kinds of known attacks, such as [9,13,15].…”
Section: Introductionmentioning
confidence: 99%
“…Firstly, defending approaches adopted by intrusion detection systems (IDSs) [9][10][11] , deception defense [12][13][14] and attestation [15][16][17][18][19] take effect after attacks happened, mainly detecting them but not blocking them, while blocking technologies such as industrial firewalls alone are not able to effectively block growing sophisticated attacks [20][21][22] . Secondly, most existing approaches are designed based on the characteristics of one or several specific kinds of known attacks, such as [9,13,15]. Thirdly, most existing approaches are hardware-based and require external devices, such as [11,13,17], which are costly, and difficult to deploy and update, especially in a deployed distributed control system (DCS).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation