Attacking IEC-60870-5-104 SCADA Systems

The rapid evolution of the Information and Communications Technology (ICT) services transforms the conventional electrical grid into a new paradigm called Smart Grid (SG). Even though SG brings significant improvements, such as increased reliability and better energy management, it also introduces multiple security challenges. One of the main reasons for this is that SG combines a wide range of heterogeneous technologies, including Internet of Things (IoT) devices as well as Supervisory Control and Data Acquisition (SCADA) systems. The latter are responsible for monitoring and controlling the automatic procedures of energy transmission and distribution. Nevertheless, the presence of these systems introduces multiple vulnerabilities because their protocols do not implement essential security mechanisms such as authentication and access control. In this paper, we focus our attention on the security issues of the IEC 60870-5-104 (IEC-104) protocol, which is widely utilized in the European energy sector. In particular, we provide a SCADA threat model based on a Coloured Petri Net (CPN) and emulate four different types of cyber attacks against IEC-104. Last, we used AlienVault's risk assessment model to evaluate the risk level that each of these cyber attacks introduces to our system to confirm our intuition about their severity.

[1]  Johannes Schneider,et al.  A security evaluation of IEC 62351 , 2017, J. Inf. Secur. Appl..

[2]  Song Tan,et al.  Survey of Security Advances in Smart Grid: A Data Driven Approach , 2017, IEEE Communications Surveys & Tutorials.

[3]  Won Hyung Park,et al.  Performance Comparison and Detection Analysis in Snort and Suricata Environment , 2017, Wirel. Pers. Commun..

[4]  K. McLaughlin,et al.  Intrusion Detection System for IEC 60870-5-104 based SCADA networks , 2013, 2013 IEEE Power & Energy Society General Meeting.

[5]  Y. B. Yuan,et al.  Stateful intrusion detection for IEC 60870-5-104 SCADA security , 2014, 2014 IEEE PES General Meeting | Conference & Exposition.

[6]  Sakir Sezer,et al.  ITACA: Flexible, scalable network analysis , 2012, 2012 IEEE International Conference on Communications (ICC).

[7]  Henri Ruotsalainen,et al.  Anomaly Detection for Simulated IEC-60870-5-104 Trafiic , 2017, ARES.

[8]  MalacariaPasquale,et al.  Decision support approaches for cyber security investment , 2016 .

[9]  Panagiotis G. Sarigiannidis,et al.  Securing the Smart Grid: A Comprehensive Compilation of Intrusion Detection and Prevention Systems , 2019, IEEE Access.

[10]  Sujeet Shenoi,et al.  Security analysis of an advanced metering infrastructure , 2017, Int. J. Crit. Infrastructure Prot..

[11]  Thomas M. Chen,et al.  Petri Net Modeling of Cyber-Physical Attacks on Smart Grid , 2011, IEEE Transactions on Smart Grid.