• 3.1 Network level mitigation
  • 3.2 Physical level mitigation
  • Applications of attack mitigation mechanisms in energy




    Download 1,66 Mb.
    Pdf ko'rish
    bet3/6
    Sana13.05.2024
    Hajmi1,66 Mb.
    #230080
    1   2   3   4   5   6
    Bog'liq
    e3sconf greenenergy2024 03008

    3 Applications of attack mitigation mechanisms in energy 
    networks 
    Along with detection schemes for DoS attacks, there may be implemented attack mitigation 
    mechanisms to protect network nodes from such attacks. DoS schemes of attack mitigation 
    include the following approaches: first, moderating DoS network layer attacks so that target 
    resources are depleted and second, mitigation of physical engagement attacks physical layer 
    to disrupt wireless communications. 
    3.1 Network level mitigation 
    The most common approaches to mitigating attacks DoS are developed for the network 
    level and most of them have proven effective for the Internet [5], e.g. the mechanisms as 
    follows: 

    Rate-limiting: the core idea of rate-limiting mechanisms is to impose a percentage limit 
    on a set of packages identified as possibly maliciously from the detection mechanism. It 
    is usually applied when the mechanism detection has false positives (false positives) or 
    cannot it just characterize the attack’s flow.

    Email Filtering: with the help of attack detection methods, the filtering mechanisms can 
    distinguish between the source of packet addresses and the blacklist provided by attack 
    detectors to filter all suspect flows in this way further forwarding or routing packages to 
    the victims. 
    , 03008 (2024)
    E3S Web of Conferences
    https://doi.org/10.1051/e3sconf/202450803008
    508
    GreenEnergy 2023
    2



    Reconfiguration: to mitigate or effect DoS attacks, a possible solution is the 
    reconfiguration of the network architecture, like altering the topology of the victim or 
    network intermediary by adding more sources to the victim or by isolating attack 
    devices. 
    3.2 Physical level mitigation 
    Because wire networks are used in local systems in SG, the wireless jamming becomes the 
    main DoS attack on wireless energy networks, especially in some scenarios involving 
    distribution and transmission systems (fig. 1). Thus, wireless communication that is 
    resistant to jamming attacks, is very important for SG applications to deal with these 
    attacks and maintain continued transmission of information [6]. There has been significant 
    progress in the development of wireless network shapes which are resistant to jamming 
    attacks. Schemes like these may be designed either coordinated or uncoordinated. 
    Coordinated protocols are conventional against jamming attacks transmission schemes 
    already explored in the field of wireless communications [7]. They can be categorized as 
    Dispersion by direct sequence spectrum (DSSS), Frequency switching spectrum dispersion 
    (FHSS) and Dispersion frequency slip spectrum (CSS). However, the issue related to the 
    coordinated protocols is that the secret, such as the direct sequence in DSSS and the 
    switching pattern in CSS, is considered confidential to others (for instance, of attackers). 
    This assumption does not apply to standards open communication, such as WiFi and 
    cellular networks [8]. Therefore, coordinated protocols are vulnerable to deliberate attacks 
    with knowledge of their information protocol. 
    Fig.1. Esential Smart Grid components [9]. 
    Uncoordinated protocols have potential for securing wireless communication in 
    distributed environments. Uncoordinated protocols need the transmitter and receiver to 
    share an advanced known secret between them [10, 11, 12]. They accidentally create a 
    secret (for example, the pattern switch to FHSS) for each transmission and avert attacks 
    from the acquisition of adequate knowledge to disrupt communication. The standard FHSS 
    and DSSS, have indeterminate equivalents of UFHSS and UDSSS respectively. 

    Download 1,66 Mb.
    1   2   3   4   5   6




    Download 1,66 Mb.
    Pdf ko'rish

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Applications of attack mitigation mechanisms in energy

    Download 1,66 Mb.
    Pdf ko'rish