János Csatár, Péter György, and Tamás Holczer

Holistic attack methods against power systems using the IEC 60870-5-104 protocol

IEC 60870-5-104 is a widely used protocol for telecontrol in European power systems. However, security was not a design goal when it was originally published: This protocol lacks built-in security features such as encryption, integrity protection, or authentication. In this paper, we describe novel types of attacks against the protocol in a holistic way. Therefore, we also enumerate the possible entry points of the threat actors and demonstrate a new technique, where the malicious actor can precisely target the attack. These methods are demonstrated both on simulated environment and actual devices and compared with already published methods.

Reference:

DOI: 10.36244/ICJ.2023.3.5

Download 

Please cite this paper the following way:

János Csatár, Péter György, and Tamás Holczer, "Holistic attack methods against power systems using the IEC 60870-5-104 protocol", Infocommunications Journal, Vol. XV, No 3, September 2023, pp. 42-53., https://doi.org/10.36244/ICJ.2023.3.5