Enhancing Cybersecurity in Energy IT Infrastructure Through a Layered Defense Approach to Major Malware Threats DOI Creative Commons
Dojin Yoo,

Seunghuk Lee,

Sherry X. Yang

et al.

Applied Sciences, Journal Year: 2024, Volume and Issue: 14(22), P. 10342 - 10342

Published: Nov. 11, 2024

This study examines the cybersecurity vulnerabilities of energy IT infrastructure in context rapid digital transformation and network expansion. While these advancements have improved efficiency, they also increased susceptibility to cyber threats, particularly from malware such as Industroyer, Triton, NotPetya, BlackEnergy3. By analyzing this research identifies key weaknesses systems highlights need for enhanced anomaly detection, segmentation, system integrity checks. To address vulnerabilities, proposes a layered security architecture which each layer—physical, control, network, application, security—provides independent protection while integrating into unified defense strategy. emphasizes necessity combining technical-, organizational-, policy-based responses bolster across all levels infrastructure. Key recommendations include immediate vulnerability patching, international cooperation, stronger legal frameworks, education, establishment command structure. provides practical insights strategies strengthening through comprehensive, integrated approach.

Language: Английский

Trust-Based Detection and Mitigation of Cyber Attacks in Distributed Cooperative Control of Islanded AC Microgrids DOI Open Access
Md Abu Taher, Mohd Tariq, Arif I. Sarwat

et al.

Electronics, Journal Year: 2024, Volume and Issue: 13(18), P. 3692 - 3692

Published: Sept. 18, 2024

In this study, we address the challenge of detecting and mitigating cyber attacks in distributed cooperative control islanded AC microgrids, with a particular focus on False Data Injection Attacks (FDIAs), significant threat to Smart Grid (SG). The SG integrates traditional power systems communication networks, creating complex system numerous vulnerable links, making it prime target for attacks. These can lead disclosure private data, network failures, even blackouts. Unlike machine learning-based approaches that require extensive datasets mathematical models dependent accurate modeling, our method is free from such dependencies. To enhance microgrid’s resilience against these threats, propose resilient algorithm by introducing novel trustworthiness parameter into algorithm. Our evaluates energy resources (DERs) based their voltage measurements exchanged information, using Kullback-Leibler (KL) divergence dynamically adjust actions. We validated approach through simulations both IEEE-34 bus feeder eight DERs larger microgrid twenty-two DERs. results demonstrated detection accuracy around 100%, millisecond range mitigation time, ensuring rapid recovery. Additionally, improved stability up almost 100% under attack scenarios, showcasing its effectiveness promptly maintaining resilience. findings highlight potential security face threats.

Language: Английский

Citations

3

Clop Ransomware in Action: A Comprehensive Analysis of Its Multi-Stage Tactics DOI Open Access
Yong-Joon Lee, Jaeil Lee,

Dojin Ryu

et al.

Electronics, Journal Year: 2024, Volume and Issue: 13(18), P. 3689 - 3689

Published: Sept. 17, 2024

Recently, Clop ransomware attacks targeting non-IT fields such as distribution, logistics, and manufacturing have been rapidly increasing. These advanced are particularly concentrated on Active Directory (AD) servers, causing significant operational financial disruption to the affected organizations. In this study, multi-step behavior of was deeply investigated decipher sequential techniques strategies attackers. One key insights uncovered is vulnerability in AD administrator accounts, which often used a primary point exploitation. This study aims provide comprehensive analysis that enables organizations develop deeper understanding multifaceted threats posed by build more strategic robust defenses against them.

Language: Английский

Citations

0

Industrial Cyber-Physical Security Attacks on Infrastructure Control Systems using Microsoft’s ICSpector Open-Source Framework DOI

Fatema Khalifa Said ALSaidi,

Sabah Ali Al’Abd Al-Busaidi,

Sundaravadivazhagan Balasubaramanian

et al.

Published: Aug. 9, 2024

Language: Английский

Citations

0

Enhancing Cybersecurity in Energy IT Infrastructure Through a Layered Defense Approach to Major Malware Threats DOI Creative Commons
Dojin Yoo,

Seunghuk Lee,

Sherry X. Yang

et al.

Applied Sciences, Journal Year: 2024, Volume and Issue: 14(22), P. 10342 - 10342

Published: Nov. 11, 2024

This study examines the cybersecurity vulnerabilities of energy IT infrastructure in context rapid digital transformation and network expansion. While these advancements have improved efficiency, they also increased susceptibility to cyber threats, particularly from malware such as Industroyer, Triton, NotPetya, BlackEnergy3. By analyzing this research identifies key weaknesses systems highlights need for enhanced anomaly detection, segmentation, system integrity checks. To address vulnerabilities, proposes a layered security architecture which each layer—physical, control, network, application, security—provides independent protection while integrating into unified defense strategy. emphasizes necessity combining technical-, organizational-, policy-based responses bolster across all levels infrastructure. Key recommendations include immediate vulnerability patching, international cooperation, stronger legal frameworks, education, establishment command structure. provides practical insights strategies strengthening through comprehensive, integrated approach.

Language: Английский

Citations

0