[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3447555.3466576acmotherconferencesArticle/Chapter ViewAbstractPublication Pagese-energyConference Proceedingsconference-collections
short-paper

Stealthy Rootkit Attacks on Cyber-Physical Microgrids: Poster

Published: 22 June 2021 Publication History

Abstract

Cyber-physical microgrids hold the key to a carbon-neutral power sector since they enable renewable and distributed energy resource integration, can alleviate overloaded distribution systems, and provide economic energy by generating and consuming power locally. The utilization of cyber-physical assets such as controllers, IoT sensors and actuators, and communication devices can enhance the stability and improve the control of microgrids. However, such assets, if maliciously operated, can become attack entry points and jeopardize the grid operation. Blind and uncoordinated cyber-attacks can be identified by existing security measures overcoming potential operational disruptions. However, rootkit attacks can stay hidden within cyber-physical systems and leverage system information to mask their presence. Rootkit detection is a strenuous process and requires advanced security methods due to their sophisticated operation. A careful analysis of possible rootkit target locations and their exploitation techniques is necessary to design effective threat detection and mitigation mechanisms. This paper discusses the cyber kill chain of a rootkit which can simultaneously deploy itself at multiple locations in a microgrid in a coordinated and stealthy way in order to maximize the impact on power system operations. The rootkit leverages system measurements to hide its presence and its attack impact from the detection mechanisms.

References

[1]
Prashanth Krishnamurthy, Hossein Salehghaffari, Shiva Duraisamy, Ramesh Karri, and Farshad Khorrami. 2019. Stealthy Rootkits in Smart Grid Controllers. In 2019 IEEE 37th International Conference on Computer Design (ICCD). 20--28.
[2]
Abraham Peedikayil Kuruvila, Ioannis Zografopoulos, Kanad Basu, and Charalambos Konstantinou. 2021. Hardware-assisted detection of firmware attacks in inverter-based cyberphysical microgrids. International Journal of Electrical Power & Energy Systems 132 (2021), 107150.
[3]
Juan Ospina, Xiaorui Liu, Charalambos Konstantinou, and Yury Dvorkin. 2021. On the Feasibility of Load-Changing Attacks in Power Systems During the COVID-19 Pandemic. IEEE Access 9 (2021), 2545--2563.
[4]
Suman Rath, Diptak Pal, Parth Sarthi Sharma, and Bijaya Ketan Panigrahi. 2020. A cyber-secure distributed control architecture for autonomous AC microgrid. IEEE Systems Journal (Early Access) (2020).
[5]
Ioannis Zografopoulos, Juan Ospina, Xiaorui Liu, and Charalambos Konstantinou. 2021. Cyber-Physical Energy Systems Security: Threat Modeling, Risk Assessment, Resources, Metrics, and Case Studies. IEEE Access 9 (2021), 29775--29818.

Cited By

View all
  • (2023)Classification and Analysis of Malicious Code Detection Techniques Based on the APT AttackApplied Sciences10.3390/app1305289413:5(2894)Online publication date: 23-Feb-2023
  • (2023)Distributed Energy Resources Cybersecurity Outlook: Vulnerabilities, Attacks, Impacts, and MitigationsIEEE Systems Journal10.1109/JSYST.2023.330575717:4(6695-6709)Online publication date: Dec-2023
  • (2023)Lost at Sea: Assessment and Evaluation of Rootkit Attacks on Shipboard Microgrids2023 IEEE Electric Ship Technologies Symposium (ESTS)10.1109/ESTS56571.2023.10220539(534-541)Online publication date: 1-Aug-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
e-Energy '21: Proceedings of the Twelfth ACM International Conference on Future Energy Systems
June 2021
528 pages
ISBN:9781450383332
DOI:10.1145/3447555
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 June 2021

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Rootkit
  2. coordinated cyber manipulation
  3. cyber-physical microgrid
  4. data-driven prediction
  5. intelligent malware
  6. virtual twin

Qualifiers

  • Short-paper
  • Research
  • Refereed limited

Conference

e-Energy '21

Acceptance Rates

Overall Acceptance Rate 160 of 446 submissions, 36%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)22
  • Downloads (Last 6 weeks)2
Reflects downloads up to 05 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Classification and Analysis of Malicious Code Detection Techniques Based on the APT AttackApplied Sciences10.3390/app1305289413:5(2894)Online publication date: 23-Feb-2023
  • (2023)Distributed Energy Resources Cybersecurity Outlook: Vulnerabilities, Attacks, Impacts, and MitigationsIEEE Systems Journal10.1109/JSYST.2023.330575717:4(6695-6709)Online publication date: Dec-2023
  • (2023)Lost at Sea: Assessment and Evaluation of Rootkit Attacks on Shipboard Microgrids2023 IEEE Electric Ship Technologies Symposium (ESTS)10.1109/ESTS56571.2023.10220539(534-541)Online publication date: 1-Aug-2023
  • (2022)Behind Closed Doors: Process-Level Rootkit Attacks in Cyber-Physical Microgrid Systems2022 IEEE Power & Energy Society General Meeting (PESGM)10.1109/PESGM48719.2022.9916907(1-5)Online publication date: 17-Jul-2022

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media