Cascading verification initiated by switching attacks through compromised digital relays
Abstract Attackers are able to enumerate all devices and computers within a compromised substation network. Digital relays deployed in the substation are the devices with IP addresses that can be discovered in the process of trial‐and‐error search. This paper is concerned with studies of cyberattack...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2022-06-01
|
Series: | IET Smart Grid |
Subjects: | |
Online Access: | https://doi.org/10.1049/stg2.12062 |