Abstract

Malware that attack the electrical power grid consist of exploits and operations modules. The exploits are similar to those of traditional malware. These malware hack into an industrial computer and subsequently deploy operational modules. Some operational modules penetrate the operating system of the compromised industrial computer to take over computing functions and hence facilitate further attacks. Examples include interception of cryptographic keys, and generation of deceptive status data that indicate normal operation of a power transformer, while in reality the transformer is in distress due to the attacks. Other operational modules are designed to recognize and disrupt the physics of the physical equipment. We refer to these operations modules as physics-centric modules. The subject of this research is how physics-centric modules of malware can cause physical damage to power grid equipment. This research simulates a power transformer and a set of its protection algorithms. We make several contributions in this research, namely: i) we emulate in Python the protection algorithms that run on an industrial computer and monitor and protect a power transformer from a variety of faults; ii) we leverage these emulations to analyze the cyberattack surface of a power transformer; iii) with these insights at hand, we devise attack modus operandi that malware could use against a power transformer; and iv) we emulate these cyberattacks in Python to empirically observe and quantify their destructive effects on a power transformer. Our overall research findings in this paper serve the purpose of informing better defense against the physics-centric modules of malware that attack the electrical power grid.

Highlights

  • A cyber-physical system (CPS) commonly consists of industrial computers deeply integrated with physical equipment through I/O boards, which in turn reads measurements from sensors and applies commands to actuators

  • While background on power transformers and protection algorithms is provided in numerous other works, textbooks, and manuals, we methodically identify and integrate pertinent elements of such a background, which results in the emergence of a cyberattack surface that can be analyzed

  • We examine the use case of a power transformer, which is physical equipment commonly found in electrical substations of the electric power grid

Read more

Summary

Introduction

A cyber-physical system (CPS) commonly consists of industrial computers deeply integrated with physical equipment through I/O boards, which in turn reads measurements from sensors and applies commands to actuators. This is how industrial computers interact closely with physical equipment by sensing and changing their operational states. In the electric power industry, computer-based systems have evolved to perform many complex tasks in energy control centers. We examine the use case of a power transformer, which is physical equipment commonly found in electrical substations of the electric power grid. A. POWER TRANSFORMER Electric energy is produced at electric power generating stations and transported over high-voltage transmission lines to the utilization points. A power transformer is a key technology that allows for the efficient transport of power from its generation to the customer [4]

Objectives
Methods
Findings
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.