File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/ISGT.2015.7131828
- Scopus: eid_2-s2.0-84939169219
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Modeling distributed denial of service attack in advanced metering infrastructure
Title | Modeling distributed denial of service attack in advanced metering infrastructure |
---|---|
Authors | |
Keywords | Advanced metering infrastructure cybersecu-rity distributed denial of service attack |
Issue Date | 2015 |
Citation | 2015 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference, ISGT 2015, 2015, article no. 7131828 How to Cite? |
Abstract | Imminent attacks on critical infrastructure can disrupt operations. It also interrupts information availability. One way through cyberspace is to harness the distributed computing power and flood on targeted systems with massive information as a consequence of denial in service. This paper discusses the distributed denial of service (DDoS) attack, a potential cyberthreat in AMI communication network. A typical DDoS includes two stages: (1) agents recruitment stage and (2) actual attack stage. In this paper, various models of malware installation and flooding attack on AMI devices are introduced and potential impacts are studied. Some particular attack scenario is simulated using NS3. We also discussed the potential defense technologies. |
Persistent Identifier | http://hdl.handle.net/10722/336040 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Guo, Yonghe | - |
dc.contributor.author | Ten, Chee Wooi | - |
dc.contributor.author | Hu, Shiyan | - |
dc.contributor.author | Weaver, Wayne W. | - |
dc.date.accessioned | 2024-01-15T08:22:16Z | - |
dc.date.available | 2024-01-15T08:22:16Z | - |
dc.date.issued | 2015 | - |
dc.identifier.citation | 2015 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference, ISGT 2015, 2015, article no. 7131828 | - |
dc.identifier.uri | http://hdl.handle.net/10722/336040 | - |
dc.description.abstract | Imminent attacks on critical infrastructure can disrupt operations. It also interrupts information availability. One way through cyberspace is to harness the distributed computing power and flood on targeted systems with massive information as a consequence of denial in service. This paper discusses the distributed denial of service (DDoS) attack, a potential cyberthreat in AMI communication network. A typical DDoS includes two stages: (1) agents recruitment stage and (2) actual attack stage. In this paper, various models of malware installation and flooding attack on AMI devices are introduced and potential impacts are studied. Some particular attack scenario is simulated using NS3. We also discussed the potential defense technologies. | - |
dc.language | eng | - |
dc.relation.ispartof | 2015 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference, ISGT 2015 | - |
dc.subject | Advanced metering infrastructure | - |
dc.subject | cybersecu-rity | - |
dc.subject | distributed denial of service attack | - |
dc.title | Modeling distributed denial of service attack in advanced metering infrastructure | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1109/ISGT.2015.7131828 | - |
dc.identifier.scopus | eid_2-s2.0-84939169219 | - |
dc.identifier.spage | article no. 7131828 | - |
dc.identifier.epage | article no. 7131828 | - |