Cascading verification initiated by switching attacks through compromised digital relays

Abstract Attackers are able to enumerate all devices and computers within a compromised substation network. Digital relays deployed in the substation are the devices with IP addresses that can be discovered in the process of trial‐and‐error search. This paper is concerned with studies of cyberattack...

Full description

Bibliographic Details
Main Authors: Koji Yamashita, Zhiyuan Yang, Chee‐Wooi Ten, Soummya Kar, Andrew Ginter
Format: Article
Language:English
Published: Wiley 2022-06-01
Series:IET Smart Grid
Subjects:
Online Access:https://doi.org/10.1049/stg2.12062