File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Modeling distributed denial of service attack in advanced metering infrastructure

TitleModeling distributed denial of service attack in advanced metering infrastructure
Authors
KeywordsAdvanced metering infrastructure
cybersecu-rity
distributed denial of service attack
Issue Date2015
Citation
2015 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference, ISGT 2015, 2015, article no. 7131828 How to Cite?
AbstractImminent attacks on critical infrastructure can disrupt operations. It also interrupts information availability. One way through cyberspace is to harness the distributed computing power and flood on targeted systems with massive information as a consequence of denial in service. This paper discusses the distributed denial of service (DDoS) attack, a potential cyberthreat in AMI communication network. A typical DDoS includes two stages: (1) agents recruitment stage and (2) actual attack stage. In this paper, various models of malware installation and flooding attack on AMI devices are introduced and potential impacts are studied. Some particular attack scenario is simulated using NS3. We also discussed the potential defense technologies.
Persistent Identifierhttp://hdl.handle.net/10722/336040

 

DC FieldValueLanguage
dc.contributor.authorGuo, Yonghe-
dc.contributor.authorTen, Chee Wooi-
dc.contributor.authorHu, Shiyan-
dc.contributor.authorWeaver, Wayne W.-
dc.date.accessioned2024-01-15T08:22:16Z-
dc.date.available2024-01-15T08:22:16Z-
dc.date.issued2015-
dc.identifier.citation2015 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference, ISGT 2015, 2015, article no. 7131828-
dc.identifier.urihttp://hdl.handle.net/10722/336040-
dc.description.abstractImminent attacks on critical infrastructure can disrupt operations. It also interrupts information availability. One way through cyberspace is to harness the distributed computing power and flood on targeted systems with massive information as a consequence of denial in service. This paper discusses the distributed denial of service (DDoS) attack, a potential cyberthreat in AMI communication network. A typical DDoS includes two stages: (1) agents recruitment stage and (2) actual attack stage. In this paper, various models of malware installation and flooding attack on AMI devices are introduced and potential impacts are studied. Some particular attack scenario is simulated using NS3. We also discussed the potential defense technologies.-
dc.languageeng-
dc.relation.ispartof2015 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference, ISGT 2015-
dc.subjectAdvanced metering infrastructure-
dc.subjectcybersecu-rity-
dc.subjectdistributed denial of service attack-
dc.titleModeling distributed denial of service attack in advanced metering infrastructure-
dc.typeConference_Paper-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1109/ISGT.2015.7131828-
dc.identifier.scopuseid_2-s2.0-84939169219-
dc.identifier.spagearticle no. 7131828-
dc.identifier.epagearticle no. 7131828-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats