Corrupted GOOSE Detectors: Anomaly Detection in Power Utility Real-Time Ethernet Communications - SYSCO Accéder directement au contenu
Communication Dans Un Congrès Année : 2015

Corrupted GOOSE Detectors: Anomaly Detection in Power Utility Real-Time Ethernet Communications

Résumé

GOOSE protocol is used for critical protection operations in the power grid, as standardized by IEC61850. It thus has strong real-time constraints that make very hard to implement any security means for integrity and confidentiality such as encryption or signature. Our answer to this lack of dedicated cybersecurity measures is to check legitimacy of every GOOSE messages flowing over the managed network. When detectors issue an alert, the SCADA informs field devices to discard GOOSE communication and run an alternative protection strategy. This article focuses on the GOOSE attack detectors we developed: one dedicated to Ethernet storm and the other one to fraudulent GOOSE frames. The paper first introduces main GOOSE protocol mechanisms and gives a brief state of the art regarding GOOSE attack management before presenting our architecture and the detectors.
Fichier principal
Vignette du fichier
GreHack_2015_Kabir-Querrec_Version_Finale.pdf (524.93 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-01237725 , version 1 (03-12-2015)

Identifiants

  • HAL Id : hal-01237725 , version 1

Citer

Maëlle Kabir-Querrec, Stéphane Mocanu, Pascal Bellemain, Jean-Marc Thiriet, Eric Savary. Corrupted GOOSE Detectors: Anomaly Detection in Power Utility Real-Time Ethernet Communications. GreHack 2015, Verimag, Nov 2015, Grenoble, France. ⟨hal-01237725⟩
413 Consultations
379 Téléchargements

Partager

Gmail Facebook X LinkedIn More