DocumentCode
656772
Title
Prevention of malware propagation in AMI
Author
Younghee Park ; Nicol, David M. ; Huaiyu Zhu ; Cheol Won Lee
Author_Institution
Inf. Trust Inst., Univ. of Illinois at Urbana-Champaign, Urbana, IL, USA
fYear
2013
fDate
21-24 Oct. 2013
Firstpage
474
Lastpage
479
Abstract
Malware can disrupt the operation of services in advanced metering infrastructure (AMI), which is at risk due to connectivity with the global Internet. In motion, malware may hide within the data payloads of legitimate AMI control traffic, implying the need for deep packet inspection. Some of the inspections one may make look for consistency with respect to data available only at the application layer, requiring one to position the analysis high in the protocol stack. Towards this end we propose a policy engine that examines both ingress and egress traffic to the AMI application layer. Policy engine rules may refer to the structure and behavior of the AMI protocol, and may also perform multi-stage analysis of data payloads looking for evidence that executable code is carried, rather than data. Our experimental results demonstrate that the policy engine is able to accurately distinguish between legitimate traffic and malware bearing traffic.
Keywords
metering; power meters; power system security; protocols; AMI application layer; AMI control traffic; AMI protocol; advanced metering infrastructure; data payloads; deep packet inspection; malware propagation; multistage analysis; policy engine; Encryption; Engines; Entropy; Malware; Payloads; Protocols;
fLanguage
English
Publisher
ieee
Conference_Titel
Smart Grid Communications (SmartGridComm), 2013 IEEE International Conference on
Conference_Location
Vancouver, BC
Type
conf
DOI
10.1109/SmartGridComm.2013.6688003
Filename
6688003
Link To Document