12.07.2015 Views

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

DESTROYING A GENERATOR WITH A CYBER ATTACK: THE AURORA TEST215Point at which breaker opensVoltageGenera<strong>to</strong>rGridTolerance time intervalPoint at which breaker closesTimeFIGURE 12.2 Notional graph displaying voltage as a function of time for a genera<strong>to</strong>r and the power grid based onthe results of Wei et al. Note that the genera<strong>to</strong>r and grid must be matched with respect <strong>to</strong> frequency, voltage, andphase rotation. The opening of the breaker—followed by a closing—moves the genera<strong>to</strong>r out of sync with the powergrid. However, this occurs within a certain permissible time <strong>to</strong>lerance (designed <strong>to</strong> prevent premature separation ofthe genera<strong>to</strong>r from the grid). Repeated opening and closing of the breaker result in severe stress on the shaft of therota<strong>to</strong>r in the genera<strong>to</strong>r—drastically shortening its lifespan.iterations, the cumulative stress on the shaft leads <strong>to</strong> failure. In the Aurora Test, after 13 iterations,the genera<strong>to</strong>r began <strong>to</strong> vibrate abnormally. After 22 iterations, smoke emerged 9 .Implementing an Aurora-Style AttackThe Idaho National Labs test is revealing, but may lead <strong>to</strong> wonder if an attack of this type ispossible in the real world. While it is true that the test—particularly the demonstration videoreleased <strong>to</strong> the Associated Press—did not include certain security measures relatively common<strong>to</strong> this type of genera<strong>to</strong>r (i.e., vibration moni<strong>to</strong>ring limit switches, over-speed limitation on thediesel engine, synchronization check on the tie breaker were all disabled during the test andsynchronization check on the protective relay was disabled during the video demonstration). 10However, with knowledge of the computer network and power genera<strong>to</strong>r, the attack is still possible.Mark Zeller, an engineer with Schweitzer Engineering Labora<strong>to</strong>ries described severalstrategies an attacker would consider at the IEEE Conference for Protective Relay Engineers 11 :1. Physical attack: The adversary manually sabotages the power genera<strong>to</strong>r by opening andclosing the breaker. Although such a method would be less than sophisticated if repeatedand/or done at random intervals, it could result in serious harm <strong>to</strong> the machine.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!