论文标题
僵尸网络打破变压器:功率僵尸网络攻击针对分布网格的本地化
Botnets Breaking Transformers: Localization of Power Botnet Attacks Against the Distribution Grid
论文作者
论文摘要
传统的僵尸网络攻击利用了损坏的Internet连接设备的大量和分布式数量,用Internet数据包为目标和压倒其他设备。随着消费者采用高功能的“智能设备”,出现了一种新的“ Power Botnet”攻击,其中使用了此类设备来定位和压倒其具有异常负载需求的电动网格设备。我们介绍了这种攻击的变体,即动力孔网磨损攻击,该攻击无意引起停电或短期急性不稳定,而是迫使昂贵的机械组件更频繁地激活,需要付出代价高昂的替换 /维修。具体而言,我们针对了On-Load Tap-Changer(OLTC)变压器,该变压器使用机械开关来响应负载需求的变化。在我们的分析和模拟中,这些攻击可以使OLTC的寿命减半,或者在最极端的情况下,将其降低到其原始寿命的$ 2.5 \%$。值得注意的是,这些功率僵尸网络由未连接到用于控制电网的内部SCADA系统的设备组成。这代表了一种新的基于Internet的网络攻击,该网络攻击针对外部的电网。为了帮助电力系统减轻这些类型的僵尸网络攻击,我们制定了攻击 - 定位策略。我们将问题作为监督的机器学习任务,以找到动力僵尸网络攻击的来源。在模拟环境中,我们生成培训和测试数据集,以评估几种基于机器学习算法的本地化方法,包括SVM,神经网络和决策树。我们表明,基于决策树的分类成功地识别了动力僵尸网络攻击,并找到了折衷的设备,其精度至少为94美元\%$ $提高了“最频繁”分类器的精度。
Traditional botnet attacks leverage large and distributed numbers of compromised internet-connected devices to target and overwhelm other devices with internet packets. With increasing consumer adoption of high-wattage internet-facing "smart devices", a new "power botnet" attack emerges, where such devices are used to target and overwhelm power grid devices with unusual load demand. We introduce a variant of this attack, the power-botnet weardown-attack, which does not intend to cause blackouts or short-term acute instability, but instead forces expensive mechanical components to activate more frequently, necessitating costly replacements / repairs. Specifically, we target the on-load tap-changer (OLTC) transformer, which uses a mechanical switch that responds to change in load demand. In our analysis and simulations, these attacks can halve the lifespan of an OLTC, or in the most extreme cases, reduce it to $2.5\%$ of its original lifespan. Notably, these power botnets are composed of devices not connected to the internal SCADA systems used to control power grids. This represents a new internet-based cyberattack that targets the power grid from the outside. To help the power system to mitigate these types of botnet attacks, we develop attack-localization strategies. We formulate the problem as a supervised machine learning task to locate the source of power botnet attacks. Within a simulated environment, we generate the training and testing dataset to evaluate several machine learning algorithm based localization methods, including SVM, neural network and decision tree. We show that decision-tree based classification successfully identifies power botnet attacks and locates compromised devices with at least $94\%$ improvement of accuracy over a baseline "most-frequent" classifier.