Holistic attack methods against power systems using the IEC 60870-5-104 protocol
-
Published:2023
Issue:3
Volume:15
Page:42-53
-
ISSN:2061-2079
-
Container-title:Infocommunications journal
-
language:
-
Short-container-title:Infocommunications journal
Author:
Csatár János,György Péter,Holczer Tamás
Abstract
IEC 60870-5-104 is a widely used protocol for telecontrol in European power systems. However, security was not a design goal when it was originally published: This protocol lacks built-in security features such as encryption, integrity protection, or authentication. In this paper, we describe novel types of attacks against the protocol in a holistic way. Therefore, we also enumerate the possible entry points of the threat actors and demonstrate a new technique, where the malicious actor can precisely target the attack. These methods are demonstrated both on simulated environment and actual devices and compared with already published methods.
Publisher
Infocommunications Journal
Subject
Electrical and Electronic Engineering,General Computer Science