Loading...
Vulnerability Analysis of DOS Attack in IEC61850 Protocol Using Configuration File Manipulation
Moradi Pahnekolaei, Mohammad Hassan | 2021
329
Viewed
- Type of Document: M.Sc. Thesis
- Language: Farsi
- Document No: 53895 (19)
- University: Sharif University of Technology
- Department: Computer Engineering
- Advisor(s): Jahangir, Amir Hossein; Bayat Sarmadi, Siavash
- Abstract:
- The IEC61850 Standard was introduced for IED, Intelligent Electronic Device, in a power substation so that different devices from different manufacturers could work together. Each of these devices must be configured to start communication. Chapter 6 of the IEC61850 Standard discusses the configuration language of these devices, SCL, Substation Configuration Language, as well as how to write it in detail.A failure or denial-of-service attack can occur in a power substation if a tampering or embedding a breach in devices’ configuration occurs. To discover such attack, one can model the behavior of all the components in the SCL language using a language describing the behavior, and then compare the configuration to reality by writing a program to extract the configuration file from the connections in a substation. This is called incorrect configuration detection, examples of which can be found in routers.We have developed a program that compares the original SCL file destined to configure and set the electric parameters of an IED with the actual SCL file loaded in it. It detects the differences and locates where any code or data has been changed. The evaluation results show the effectiveness of the program for almost all kinds of SCL file manipulation
- Keywords:
- Denial of Service (DOS)Attack ; Configuration ; Security ; Standard Configuration Load (SCL) ; IEC 61850 Standard ; Incorrect Configuration Detection
-
محتواي کتاب
- view