12.07.2015 Views

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

TAKING THE POWER GRID OFFLINE WITH MINIMAL EFFORT: ATTACKS LEVERAGING217an Aurora-style attack. This can be implemented in hardware <strong>to</strong> avoid a manual attack.Clearly, it would be preferable <strong>to</strong> also implement time delays for commands sent through acomputer network as well.• Command moni<strong>to</strong>ring on the protective relay: With this technique, the administra<strong>to</strong>r isnotified of certain patterns of open/close commands and can even set policies <strong>to</strong> providewarnings, prevent breaker closures, enforce time delays, etc.• Implement a second relay: This countermeasure adds a redundant relay <strong>to</strong> the setup,providing defense in-depth <strong>to</strong> the genera<strong>to</strong>r. The second relay could be operating on adifferent network, utilize different authentication, etc., than the first.• Local genera<strong>to</strong>r island detection logic: Here, the rate of change of the frequency ismoni<strong>to</strong>red. When this rate falls outside acceptable ranges (an “island condition”), thegenera<strong>to</strong>r is disconnected.In practice, it will take a combination of measures such as the ones listed above—in addition<strong>to</strong> solid security practices as described earlier. There are also trade-offs, as an Aurorastyleattack is a high-impact, low-frequency event, any mitigation device must not interferewith normal power operations. For instance, relay-based Hardware Mitigation Devices(HMDs)—which employ protection similar <strong>to</strong> the methods listed above—are thought <strong>to</strong> haveexasperated the massive European power failure in November 2006. 16Albeit an experimental test, the Aurora Test successfully demonstrated <strong>to</strong> the world thata cyber attack could have severe repercussions in the physical world. Further, this test led<strong>to</strong> important research on how <strong>to</strong> better mitigate cyber attacks against the power grid. Likeother attack methods described in earlier chapters of this part of the book, the Aurora Testis a cyber attack directed at a specific piece of industrial equipment. In the next section, we discusshow attacks on key systems in a power grid can lead <strong>to</strong> more serious failures. These attacksrely on leveraging the <strong>to</strong>pology of the power-grid network <strong>to</strong> magnify their effects.TAKING THE POWER GRID OFFLINE WITH MINIMAL EFFORT:ATTACKS LEVERAGING NETWORK TOPOLOGYIn the introduction <strong>to</strong> this chapter, we mentioned how a 2009 paper by Chinese researchersJian-Wei Wang and Li-Li Rong led <strong>to</strong> comments by the chairman of the U.S.-China EconomicSecurity and Review Commission in 2010 where he stated that the researchers “published apaper on how <strong>to</strong> attack a small power grid sub-network in a way that would cause cascadingfailure <strong>to</strong> the entire U.S. west-coast power grid.” 17 A later report in the New York Timesdiscussed the comments and downplayed the significance of the research. 18 Upon a close readof the paper, it becomes apparent that the work of these Chinese researchers is simply a newaddition <strong>to</strong> an up-and-coming area of academic research where academic researchers studywhere infrastructure <strong>to</strong>pologies are vulnerable <strong>to</strong> attacks and explore potential mitigationstrategies. It is likely that Chinese researchers studied the power grid of the western UnitedStates because the data was available rather than for purposes of ill will.However this is not <strong>to</strong> say that attacks leveraging power-grid network <strong>to</strong>pology areunimportant—or not possible. For example, in the summer of 2003, much of the easternUnited States experienced blackouts resulting from a cascading failure that originated in

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!