Malware in smart grid

Thumbnail Image
Date
2017-01-01
Authors
Ozen, Altay
Major Professor
Advisor
Neil Zhenqiang Gong
Committee Member
Journal Title
Journal ISSN
Volume Title
Publisher
Authors
Research Projects
Organizational Units
Organizational Unit
Electrical and Computer Engineering

The Department of Electrical and Computer Engineering (ECpE) contains two focuses. The focus on Electrical Engineering teaches students in the fields of control systems, electromagnetics and non-destructive evaluation, microelectronics, electric power & energy systems, and the like. The Computer Engineering focus teaches in the fields of software systems, embedded systems, networking, information security, computer architecture, etc.

History
The Department of Electrical Engineering was formed in 1909 from the division of the Department of Physics and Electrical Engineering. In 1985 its name changed to Department of Electrical Engineering and Computer Engineering. In 1995 it became the Department of Electrical and Computer Engineering.

Dates of Existence
1909-present

Historical Names

  • Department of Electrical Engineering (1909-1985)
  • Department of Electrical Engineering and Computer Engineering (1985-1995)

Related Units

Journal Issue
Is Version Of
Versions
Series
Department
Electrical and Computer Engineering
Abstract

With the advancement in communication technology of Smart Grid, cyber-attacks are becoming the serious threat. Specifically, the vulnerabilities created due to the successful malware installation in smart grid is a very serious concern since it can be exploited to disable the system along with taking control or damaging the critical infrastructure permanently. The main idea behind this thesis is to explore the malware issue in the remedial action scheme (RAS), widely used for wide area protection, of smart grid. This thesis is concerned mainly on the cyber part of the Smart Grid. The main contribution of the work is divided into two major parts.

In the first part, we modelled the stealthy coordinated cyber-attack with a malware at its core. The purpose of this attack is to damage the grid without getting detected by legitimate users. The attack uses a Trojan Horse malware to get a backdoor access to one of the RAS controllers. Once malware is installed, the attacker gets control of the RAS controller whenever he desires. This includes outside the LAN of the RAS controller as well. Specifically, the malware provides undetectable communication between the attacker and the device, and provides attacker the ability to execute commands in the affected device. Once the malware installation is successful, we perform the coordinate cyber-attacks by replacing the existing RAS controller script with a malicious one which plays with a generator to damage the system. This part is intended to demonstrate the dangers of the malware in Smart grid.

In the second part, the defense scheme against the malware attack is proposed. The main idea is to detect and disable the device operating for RAS controller that is affected by some type of malware. This is done by introducing the one other device called Overseer. The Overseer should not have any access or control over any part of the actual grid (relays, generators, etc.). However, it should be able to communicate with all RAS controllers. RAS controllers are also upgraded so that they will take an extra measurement from a randomly selected generator which is reported to the Overseer with all the other measurements they normally take periodically. The main task of the overseer is to oversee the RAS controllers by taking updates from them. Through the usage of the proposed architecture, the overseer can detect a RAS controller which is acting maliciously. Once the malicious controller is detected, it can disable it using denial of service (DOS) attack on it until the situation is fixed. It is to be noted that the Smart Grid requires RAS controllers to perform corrective action during disturbances in the grid, they are just there to keep track of the grid during normal functioning of the power system. This means that grid does not need RAS controllers to function normally. Another possibility is when the Overseer is infected. Since Overseer has no access/control over the grid, the worst thing an attacker can do is to DOS a RAS controller which, again, will not affect the grid.

Comments
Description
Keywords
Citation
DOI
Source
Subject Categories
Copyright
Sun Jan 01 00:00:00 UTC 2017