Dartmouth College Computer Science
Technical Report series
TR search TR listserv
|By author:||A B C D E F G H I J K L M N O P Q R S T U V W X Y Z|
|By number:||2019, 2018, 2017, 2016, 2015, 2014, 2013, 2012, 2011, 2010, 2009, 2008, 2007, 2006, 2005, 2004, 2003, 2002, 2001, 2000, 1999, 1998, 1997, 1996, 1995, 1994, 1993, 1992, 1991, 1990, 1989, 1988, 1987, 1986|
Researchers are pursuing methods of securing the cyber aspect of the
U.S. power grid, one of the country's most critical infrastructures.
An attacker who is able to infiltrate an Energy Management System
(EMS) can instruct elements of the grid to function improperly or can
skew the state information received by the control programs or
operators. In addition, a cyber attack can combine multiple attacks
and affect many physical locations at once. A study of the possible
adverse effects an attack could generate can underline the urgency of
improving grid security, contribute to a roadmap and priority list for
security researchers, and advise on how defending against cyber
attacks can differ from defending against point failures and physical
attacks. In this paper I discuss the physical and cyber systems that
compose the power grid, and I explore ways in which a compromise of
the cyber system can affect the physical system, with a particular
emphasis on the best means of creating large disturbances. Further, I
consider ways in which cyber attacks differ from physical attacks.
Senior Honors Thesis. Advisor: Sean W. Smith.
Bibliographic citation for this report: [plain text] [BIB] [BibTeX] [Refer]
Or copy and paste:
Loren D. Sands-Ramshaw, "Creating Large Disturbances in the Power Grid: Methods of Attack After Cyber Infiltration." Dartmouth Computer Science Technical Report TR2010-668, June 2010.
Notify me about new tech reports.
Search the technical reports.
To receive paper copy of a report, by mail, send your address and the TR number to reports AT cs.dartmouth.edu
Copyright notice: The documents contained in this server are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.
Technical reports collection maintained by David Kotz.