Introducing Man in the Contacts attack to trick encrypted messaging apps
Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK...
Transcript of Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK...
![Page 1: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks](https://reader031.fdocuments.us/reader031/viewer/2022021823/5b373ef67f8b9a4a728bd991/html5/thumbnails/1.jpg)
MAN-IN-THE-MIDDLE ATTACK ON POWER GRID:
ATTACK MECHANISMS AND COUNTER MEASURES
Lang Tong School of Electrical and Computer Engineering Cornell University, Ithaca, NY
Joint work with Jinsub Kim and Robert J. Thomas
Presented at the PSERC Webinar, November 19, 2013
![Page 2: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks](https://reader031.fdocuments.us/reader031/viewer/2022021823/5b373ef67f8b9a4a728bd991/html5/thumbnails/2.jpg)
The 2003 northeast blackout
Source: http://www.noaanews.noaa.gov/stories/s2015.htm Acknowledgement: The speaker thanks Carl Hauser at WSU for pointing out the incorrect image used in the seminar.
![Page 3: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks](https://reader031.fdocuments.us/reader031/viewer/2022021823/5b373ef67f8b9a4a728bd991/html5/thumbnails/3.jpg)
Pre-blackout events
U.S.-Canada Power System Outage Task Force, “Final report on the August 14, 2003 blackout in the united states and Canada: causes and recommendations, April 2004”
![Page 4: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks](https://reader031.fdocuments.us/reader031/viewer/2022021823/5b373ef67f8b9a4a728bd991/html5/thumbnails/4.jpg)
Pre-blackout events
U.S.-Canada Power System Outage Task Force, “Final report on the August 14, 2003 blackout in the united states and Canada: causes and recommendations, April 2004”
![Page 5: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks](https://reader031.fdocuments.us/reader031/viewer/2022021823/5b373ef67f8b9a4a728bd991/html5/thumbnails/5.jpg)
Pre-blackout events
U.S.-Canada Power System Outage Task Force, “Final report on the August 14, 2003 blackout in the united states and Canada: causes and recommendations, April 2004”
![Page 6: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks](https://reader031.fdocuments.us/reader031/viewer/2022021823/5b373ef67f8b9a4a728bd991/html5/thumbnails/6.jpg)
On the security of the grid
![Page 7: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks](https://reader031.fdocuments.us/reader031/viewer/2022021823/5b373ef67f8b9a4a728bd991/html5/thumbnails/7.jpg)
Power system and vulnerabilities
![Page 8: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks](https://reader031.fdocuments.us/reader031/viewer/2022021823/5b373ef67f8b9a4a728bd991/html5/thumbnails/8.jpg)
Power system and vulnerabilities
System vulnerabilities Backdoor attacks (Stuxnet) Man-in-the-middle attack Denial of service attacks
![Page 9: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks](https://reader031.fdocuments.us/reader031/viewer/2022021823/5b373ef67f8b9a4a728bd991/html5/thumbnails/9.jpg)
Outline
System model and observability State attack: mechanisms and protection Topology attack: mechanisms and protection Data driven attack Summary and conclusions
Main theme:
Develop graph and algebraic (matrix) techniques to characterize unobservable attacks
Gain insights into cost-effective protection mechanisms.
![Page 10: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks](https://reader031.fdocuments.us/reader031/viewer/2022021823/5b373ef67f8b9a4a728bd991/html5/thumbnails/10.jpg)
Power network and measurement model
![Page 11: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks](https://reader031.fdocuments.us/reader031/viewer/2022021823/5b373ef67f8b9a4a728bd991/html5/thumbnails/11.jpg)
State estimation and bad data detection
![Page 12: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks](https://reader031.fdocuments.us/reader031/viewer/2022021823/5b373ef67f8b9a4a728bd991/html5/thumbnails/12.jpg)
Network observability
![Page 13: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks](https://reader031.fdocuments.us/reader031/viewer/2022021823/5b373ef67f8b9a4a728bd991/html5/thumbnails/13.jpg)
Observability: algebraic condition
![Page 14: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks](https://reader031.fdocuments.us/reader031/viewer/2022021823/5b373ef67f8b9a4a728bd991/html5/thumbnails/14.jpg)
Unobservable attack
![Page 15: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks](https://reader031.fdocuments.us/reader031/viewer/2022021823/5b373ef67f8b9a4a728bd991/html5/thumbnails/15.jpg)
Unobservable attack
![Page 16: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks](https://reader031.fdocuments.us/reader031/viewer/2022021823/5b373ef67f8b9a4a728bd991/html5/thumbnails/16.jpg)
Can attack make network unobservable?
![Page 17: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks](https://reader031.fdocuments.us/reader031/viewer/2022021823/5b373ef67f8b9a4a728bd991/html5/thumbnails/17.jpg)
Observability:graph theoretic condition
![Page 18: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks](https://reader031.fdocuments.us/reader031/viewer/2022021823/5b373ef67f8b9a4a728bd991/html5/thumbnails/18.jpg)
Unobservable attack and protection
![Page 19: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks](https://reader031.fdocuments.us/reader031/viewer/2022021823/5b373ef67f8b9a4a728bd991/html5/thumbnails/19.jpg)
Framing attack
Jinsub Kim, Lang Tong, Robert J. Thomas, “Data framing attack on state estimation with unknown network parameters,” Asilomar Conf. on Signals, Systems, and Computers, Nov., 2013.
![Page 20: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks](https://reader031.fdocuments.us/reader031/viewer/2022021823/5b373ef67f8b9a4a728bd991/html5/thumbnails/20.jpg)
Framing attack via QCQP
Jinsub Kim, Lang Tong, Robert J. Thomas, “Data framing attack on state estimation with unknown network parameters,” Asilomar Conf. on Signals, Systems, and Computers, Nov., 2013.
![Page 21: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks](https://reader031.fdocuments.us/reader031/viewer/2022021823/5b373ef67f8b9a4a728bd991/html5/thumbnails/21.jpg)
Topology attack
Jinsub Kim, Lang Tong, “On topology attack of a smart grid: undetectable attacks and countermeasures,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 7, July, 2013.
![Page 22: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks](https://reader031.fdocuments.us/reader031/viewer/2022021823/5b373ef67f8b9a4a728bd991/html5/thumbnails/22.jpg)
Protection against topology attack
Jinsub Kim, Lang Tong, “On topology attack of a smart grid: undetectable attacks and countermeasures,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 7, July, 2013.
![Page 23: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks](https://reader031.fdocuments.us/reader031/viewer/2022021823/5b373ef67f8b9a4a728bd991/html5/thumbnails/23.jpg)
Protection against topology attack
Jinsub Kim, Lang Tong, “On topology attack of a smart grid: undetectable attacks and countermeasures,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 7, July, 2013.
![Page 24: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks](https://reader031.fdocuments.us/reader031/viewer/2022021823/5b373ef67f8b9a4a728bd991/html5/thumbnails/24.jpg)
Protection against topology attack via PMU
Jinsub Kim, Lang Tong, “On phasor measurement unit placement against state and topology attack,” IEEE SmartGridComm, October, 2013.
![Page 25: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks](https://reader031.fdocuments.us/reader031/viewer/2022021823/5b373ef67f8b9a4a728bd991/html5/thumbnails/25.jpg)
Optimal PMU placement
Jinsub Kim, Lang Tong, “On phasor measurement unit placement against state and topology attack,” IEEE SmartGridComm, October, 2013.
![Page 26: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks](https://reader031.fdocuments.us/reader031/viewer/2022021823/5b373ef67f8b9a4a728bd991/html5/thumbnails/26.jpg)
Data driven attacks
Network topology and network parameters are difficult to obtain. But they may not be needed!
Algebraic (rank) conditions for attacks can be used to construct data-driven attacks via subspace learning.
Topology conditions can be used to construct attacks using only local measurements.
Jinsub Kim, Lang Tong, Robert J. Thomas, “Data framing attack on state estimation with unknown network parameters,” Asilomar Conf. on Signals, Systems, and Computers, Nov., 2013.
![Page 27: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks](https://reader031.fdocuments.us/reader031/viewer/2022021823/5b373ef67f8b9a4a728bd991/html5/thumbnails/27.jpg)
Framing attack with unknown network parameters
Jinsub Kim, Lang Tong, Robert J. Thomas, “Data framing attack on state estimation with unknown network parameters,” Asilomar Conf. on Signals, Systems, and Computers, Nov., 2013.
![Page 28: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks](https://reader031.fdocuments.us/reader031/viewer/2022021823/5b373ef67f8b9a4a728bd991/html5/thumbnails/28.jpg)
Framing attack with unknown network parameters and partial measurements
Jinsub Kim, Lang Tong, Robert J. Thomas, “Data framing attack on state estimation with unknown network parameters,” Asilomar Conf. on Signals, Systems, and Computers, Nov., 2013.
![Page 29: Man-in-the-Middle Attack on the Power Grid · MAN-IN-THE-MIDDLE ATTACK ON POWER GRID: ATTACK MECHANISMS AND COUNTER MEASURES . Lang Tong . ... Algebraic (rank) conditions for attacks](https://reader031.fdocuments.us/reader031/viewer/2022021823/5b373ef67f8b9a4a728bd991/html5/thumbnails/29.jpg)
Conclusions
Perfect security does not exists. Cyber security (encryption and authentication)
techniques need to be complemented by monitoring and security measures based on physical systems.
Beyond state and topology attacks Attack on real-time (dispatch and market) operations Real-time contingency analysis (RTCA)
Data driven approach to attacks and counter measures