Skip to main content

Malicious and Deliberate Attacks and Power System Resiliency

  • Chapter
  • First Online:
Power Systems Resilience

Part of the book series: Power Systems ((POWSYS))

Abstract

Modern embedded systems control sensitive data and information depending where these systems are installed to accomplish required tasks. Due to this aspect, cyber criminals or hackers are motivated and determined to rob intellectual property of these systems through more and more sophisticated attacks . A huge problem in defending against these massive and various types of attacks is that in the last years attacks increased their complexity while the knowledge of an attacker decreased significantly because of the tools and devices they can find in the online world and free market. The most important challenges to defend against an attack are represented by these factors: speed of the attack, complexity of the attack and the simplicity of the tools that attackers used. A very often question that most of designers and developers of embedded systems ask is: Why cyber criminals commit attacks and what motivates them? Is it money? Is it celebrity? The answer starts with simple entertainment and extends to material benefits and finding, very often, valuable sensitive information that can cause serious damages to a system and its dependencies or even terrorism acts. Best case scenario is when the attacker is exactly the owner/the developer of the system or when he is demanding various attacks in order to figure out how defense mechanisms resist when facing attacks, how these can be improved and what are the challenges in building new ones. Therefore, this chapter is focused on two main ideas considering modern embedded systems based on Field Programmable Gate Array (FPGA) technology such as communication networks or cryptographic systems. The first idea refers to malicious and deliberate attacks performed against embedded systems starting with risks , threats and vulnerabilities that motivated hackers find and exploit and the second idea is about power system resilience and how attacked systems respond and decide what to do next. This chapter is organized in six parts as follows. The first part of this chapter is an introduction about attacks on embedded systems and a background that provides all the necessary information of how attackers and attacks evolved in the last years. The second part is focused on who performs these attacks and how systems are attacked. The third part refers to the main attacks on embedded systems and how these are classified depending on different criteria such as interlinking features, integration level or programmability level. The fourth part of this chapter is about power system resilience and how actual systems react or how they should react in case of malicious attacks . The fifth part refers, with examples, to the vulnerabilities existing in modern equipment that surrounds us and how these are or can be attacked such as mobile and communication systems and social apps that we use every day. The last part concludes the chapter and draws some goals for future research directions. The main purposes of this chapter are: to review and categorize all types of attacks against embedded systems based on FPGA , to show how attacks evolved from their beginnings until present, to bring to light who are the attackers as well as what motivates these hackers and to picture how “resiliency” feature should operate or operates during life-cycle of embedded systems when someone wants to perform an attack or succeeds one. Another important goal that this chapter aims for is to find and show others vulnerabilities existing in modern systems, especially communications , that most of us can not live without them.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. F. Birleanu, N. Bizon, Reconfigurable computing in hardware security—a brief review and application. J. Electr. Eng. Electron. Control Comput. Sci. (JEEECCS) 2(3), 1–12 (2016)

    Google Scholar 

  2. M. Ciampa, Security Awareness: Applying Practical Security in Your World. IEEE Design & Test of Computers (2010)

    Google Scholar 

  3. P. Gregory, CISSP Guide to Security Essentials (Course Technology, Cengage Learning, Boston, 2010)

    Google Scholar 

  4. http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.prd29-genc-009492c/ch01s03s04.html

  5. M. Chowdhury, A. Apon, K. Dey, Data Analytics for Intelligent Transportation Systems (Elsevier, UK, 2017)

    Google Scholar 

  6. http://web.cse.ohio-state.edu/~champion.17/4471/4471_lecture_2.pdf

  7. http://sourcedaddy.com/networking/threats-vulnerabilities-and-attacks.html

  8. http://www.mckinsey.com/business-functions/digital-mckinsey/our-insights/the-rising-strategic-risks-of-cyberattacks

  9. J. Chirillo, Hack Attacks Revealed (Wiley Computer Publishing, New York, 2001)

    Google Scholar 

  10. http://f3magazine.unicri.it/?p=306

  11. http://searchsecurity.techtarget.com/definition/hacker

  12. D.G. Abraham, G.M. Dolan, G.P. Double, J.V. Stevens, Transaction security system. IBM Syst. J. 30(2), 206–229 (1991)

    Article  Google Scholar 

  13. http://fortune.com/2017/07/26/who-are-hackers/

  14. http://fortune.com/2017/06/22/cybersecurity-business-fights-back/

  15. S.J. Stolfo, S.M. Bellovin, S. Hershkop, A. Keromytis, S. Sinclair, S.W. Smith, Insider Attack and Cyber Security: Beyond the Hacker (Springer, New York, 2008)

    Google Scholar 

  16. C.W. Probst, J. Hunker, D. Gollman, M. Bishop, Insider Threats in Cyber Security (Springer, New York, 2010)

    Google Scholar 

  17. http://www.makeuseof.com/tag/5-of-the-worlds-most-famous-hackers-what-happened-to-them/

  18. http://www.telegraph.co.uk/technology/6670127/Top-10-most-famous-hackers.html

  19. https://en.wikipedia.org/wiki/MafiaBoy

  20. http://fortune.com/2017/06/22/cybersecurity-hacks-history/

  21. J. Graham, R. Howard, R. Olson, Cyber Security Essentials (CRC Press, Boca Raton, 2011)

    Google Scholar 

  22. J. Andress, S. Winterfeld, Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners (Amsterdam, Syngress, 2011)

    Book  Google Scholar 

  23. P. Anghelescu, S. Ionita, G. Iana, High-speed PCA encryption algorithm using reconfigurable computing. J. Cybern. Syst. (Taylor & Francis) 44(4), 285–304 (2013)

    Google Scholar 

  24. P. Anghelescu, FPGA implementation of programmable cellular automata encryption algorithm for network communications. Int. J. Comput. Syst. Sci. Eng. (CSSE) 31(5) Sept (2016)

    Google Scholar 

  25. H. Elmiligi, F. Gebali, M.W. El-Kharashi, Multi-dimensional analysis of embedded systems security. Microprocess. Microsyst. 41, 29–36 (2016)

    Article  Google Scholar 

  26. M. Erbschloe, Trojans, Worms, and Spyware (Elsevier, Amsterdam, 2005)

    Google Scholar 

  27. A. Singhal, Data Warehousing and Data Mining Techniques for Cyber Security (Springer, New York, 2007)

    Google Scholar 

  28. P. Eder-Neuhauser, T. Zseby, J. Fabini, G. Vormayr, Cyber attack model for smart grid environments. Sustain. Energy Grids Netw. 12, 10–29 (2017)

    Article  Google Scholar 

  29. http://www.berkes.ca/archive/berkes_hardware_attacks.pdf

  30. http://resources.infosecinstitute.com/hardware-attacks-backdoors-and-electronic-component-qualification/

  31. https://blog.finjan.com/9-common-hacking-techniques-and-how-to-deal-with-them/

  32. P. Anghelescu, E. Sofron, S. Ionita, L. Ionescu, in FPGA Implementations of Cellular Automata for Pseudo-Random Number Generation. The 29th International Semiconductor Conference, CAS 2006, Sinaia, Romania, 27–29 Sept 2006, pp. 371–374

    Google Scholar 

  33. E. Zio, Challenges in the vulnerability and risk analysis of critical infrastructures. J. Reliab. Eng. Syst. Saf. 152, 137–150 (2016)

    Article  Google Scholar 

  34. N. Nezamoddini, S. Mousavian, M.E. Kantarci, A risk optimization model for enhanced power grid resilience against physical attacks. J. Electr. Power Syst. Res. 143, 329–338 (2017)

    Article  Google Scholar 

  35. M. Donohoe, B. Jennings, S. Balasubramaniam, Context-awareness and the smart grid: requirements and challenges. J. Comput. Netw. 79, 263–282 (2015)

    Article  Google Scholar 

  36. https://ics-cert.us-cert.gov/sites/default/files/ICSJWG-Archive/QNL_MAR_16/reliability%20and%20resilience%20pdf.pdf

  37. N.M. Tabatabaei, N. Bizon, A.J. Aghbolaghi, F. Blaabjerg (eds.), Fundamentals and Contemporary Issues of Reactive Power Control in AC Power Systems (Springer Verlag London Limited, London, 2017)

    Google Scholar 

  38. https://www.fraunhofer.de/en/press/research-news/2011/february/fingerprint-makes-chips-counterfeit-proof.html

  39. Counterfeit-Proof Chips, Fraunhofer Magazine, vol. 1.12 (Fraunhofer-Gesellschaft, Munchen, 2012)

    Google Scholar 

  40. J.H. Saltzer, M.D. Schroeder, The protection of information in computer systems. Proc. IEEE 63(9), 1278–1308 (1975)

    Article  Google Scholar 

  41. F. Birleanu, N. Bizon, Principles, architectures and challenges for ensuring the integrity, internal control and security of embedded systems. J. Electr. Eng. Electron. Control Comput. Sci. (JEEECCS) 3(7), 37–45 (2017)

    Google Scholar 

  42. H. Orojloo, M.A. Azgomi, A game-theoretic approach to model and quantify the security of cyber-physical systems. J. Comput. Ind. 88, 44–57 (2017)

    Article  Google Scholar 

  43. Y. Ashibani, Q.H. Mahmoud, Cyber physical systems security: analysis, challenges and solutions. J. Comput. Secur. 68, 81–97 (2017)

    Article  Google Scholar 

  44. A.V. Gheorghe, M. Masera, M. Weijnen, L. De Vries, Critical Infrastructures at Risk—Securing the European Electric Power System (Springer, Dordrecht, 2006)

    Google Scholar 

  45. E.G. Amoroso, Cyber Attacks—Protecting National Infrastructure (Elsevier, Amsterdam, 2011)

    Google Scholar 

  46. https://www.networkworld.com/article/2177520/collaboration-social/5-top-social-media-security-threats.html

  47. W. Wang, Z. Lu, Cyber security in the smart grid: survey and challenges. Comput. Netw. 57, 1344–1371 (2013)

    Article  Google Scholar 

  48. https://www.csoonline.com/article/3106292/social-networking/social-media-the-gateway-for-malware.html

  49. K. Pipyros, C. Thraskias, L. Mitrou, D. Gritzalis, T. Apostolopoulus, A new strategy for improving cyber-attacks evaluation in the context of Tallinn manual. J. Comput. Secur. (2017)

    Google Scholar 

  50. https://www.forbes.com/sites/sungardas/2015/02/24/why-hackers-love-companies-who-use-social-media/#5348fc6a71a9

  51. https://www.networkworld.com/article/3200030/internet-of-things/researchers-find-gaps-in-iot-security.html

  52. https://www.networkworld.com/article/3202767/internet-of-things/the-fight-to-defend-the-internet-of-things.html

  53. C. Tu, X. He, Z. Shuai, F. Jiang, Big data issues in smart grid—a review. J. Renew. Sustain. Energy Rev. 79, 1099–1107 (2017)

    Article  Google Scholar 

  54. M. Ficco, M. Chora, R. Kozik, Simulation platform for cyber-security and vulnerability analysis of critical infrastructures. J. Comput. Sci. (2017). https://doi.org/10.1016/j.jocs.2017.03.025

    Article  Google Scholar 

  55. https://www.networkworld.com/article/3217664/internet-of-things/how-to-improve-iot-security.html

  56. Z.A. Baig, P. Szewczyk, C. Valli, P. Rabadia, P. Hannay, M. Chernyshev, M. Johnstone, P. Kerai, A. Ibrahim, K. Sansurooah, N. Syed, M. Peacock, Future challenges for smart cities: cyber-security and digital forensics. J. Digit. Investig. 22, 3–13 (2017)

    Article  Google Scholar 

  57. D. Jin, C. Hannon, Z. Li, P. Cortes, S. Ramaraju, P. Burgess, N. Buch, M. Shahidehpour, Smart street lighting system: a platform for innovative smart city applications and a new frontier for cyber-security. Electr. J. 29, 28–35 (2016)

    Google Scholar 

  58. https://arxiv.org/pdf/1707.08380.pdf

  59. https://smartgridawareness.org/privacy-and-data-security/smart-grid-vulnerabilities-a-more-detailed-review/smart-grid-security-threats-vulnerabilities-and-solutions/

  60. http://www.energy.ca.gov/2012publications/CEC-500-2012-047/CEC-500-2012-047.pdf

  61. C. Bekara, Security issues and challenges for the IoT-based smart grid. J. Procedia Comput. Sci. 34, 532–837 (2014)

    Article  Google Scholar 

  62. H. Yoo, T. Shon, Challenges and research directions for heterogeneous cyber-physical system based on IEC 61850: vulnerabilities, security requirements, and security architecture. J. Future Gener. Comput. Syst. 61, 128–136 (2016)

    Article  Google Scholar 

  63. https://www.cablelabs.com/remote-phy-reality

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fernando Georgel Birleanu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Birleanu, F.G., Anghelescu, P., Bizon, N. (2019). Malicious and Deliberate Attacks and Power System Resiliency. In: Mahdavi Tabatabaei, N., Najafi Ravadanegh, S., Bizon, N. (eds) Power Systems Resilience. Power Systems. Springer, Cham. https://doi.org/10.1007/978-3-319-94442-5_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-94442-5_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-94441-8

  • Online ISBN: 978-3-319-94442-5

  • eBook Packages: EnergyEnergy (R0)

Publish with us

Policies and ethics