An Approach for Analyzing Cyber Security Threats and Attacks: A Case Study of Digital Substations in Norway
Abstract
:1. Introduction
- the security pyramid—the three-level starting point for the smart grid security analysis;
- threat analysis—a process of identification of assets and risks;
- threat modeling—a process to identify the most vulnerable parts of the system;
- risk assessment—provides identification and detailed understanding of risks of threats and provides mitigation recommendations;
- simulations for impact analysis—practical verification of identified threats and the proposed model in a high-detailed simulation model.
2. Related Work
3. DS System Architecture
- SCADA is a centralized system used for monitoring and controlling of all substations. It is a supervisory system for gathering data about industrial processes and sending control commands. It is located in a control center outside the DS and it is therefore out of the scope of this work.
- Gateway is a network device that allows data to flow from and into the substation. It connects the substation to the WAN.
- HMI is a graphical interface between a human operator and the controller (all the physical devices) of an industrial system. It provides interaction and communication between them.
- WAN is a network which connects the substation with the control center. It is accessible through the gateway.
- LAN/Ethernet is a local network in the DS and it is used by process and station buses.
- Switch is a network device that is used for connecting devices and switching datagrams (messages) between them.
- Process and Station Buses provide communication between lower and higher layer grid components.
- IED is a microprocessor-based device that is used by the electric power industry to control and monitor power system switching devices.
- MU is a device that enables the implementation of IEC61850 process bus by converting analog signals from the conventional CT/VT into IEC61850 Sampled Values (SV) for metering, protection, and control purposes.
- CT/VT are devices that constantly interact with physical environment and communicate with the controller via a shared process bus.
3.1. Communication Protocols
3.1.1. Analog Messages
3.1.2. IEC 61850
- GOOSE is used for communication on the process bus mainly between IEDs. Messages are embedded straight into Ethernet frames and cannot therefore exit the LAN. Protocol uses publisher-subscriber mechanism via L2 broadcasting. Messages are used mainly for delivering time-critical information [31] triggered by an event.
- MMS is used on the station bus to provide information monitoring to HMI and SCADA (via WAN). It uses TCP to deliver messages outside of the substation.
- SV is used similarly as GOOSE on the process bus. It also uses Ethernet frames, but it is used mostly for continuous streaming of measurement data.
3.1.3. IEC 60870-5-104
4. An Approach for Digital Substation Cyber Security Analysis
- the security pyramid;
- threat analysis;
- threat modeling;
- risk assessment;
- simulations for impact analysis.
4.1. The Security Pyramid
4.2. Threat Analysis (How an Attacker Utilizes Component-Wise Vulnerabilities)
- A (Destructive)—causes damage to the grid equipment, which can lead to blackouts, potentially affecting lives of people.
- B (Disabling)—can lead to blackouts without permanent damage of the grid equipment.
- C (Disruptive)—affect grid observability, without affecting its functionality.
- D (No impact)—has no impact on functionality or observability.
- A (Certain)—will happen with very high probability.
- B (Likely)—might happen with medium probability.
- C (Unlikely)—might happen with very low probability.
- D (Impossible)—cannot happen.
4.3. Threat Modeling
- A (Destructive) = 1
- B (Disabling) = 0.66
- C (Disruptive) = 0.33
- D (No impact) = 0.1
4.4. Risk Assessment
- Critical threats—threats for which impacts and mitigation techniques are not clear. Those threats need to be further analyzed in impact simulations.
- Threats for which impacts and mitigation techniques are clear—those threats do not have to be analyzed in the simulation model, because their impacts are well known and mitigation techniques can be deployed.
- Threats which can be ignored—this includes low risk threats, which does not have to be further considered.
4.5. Simulations for Impact Analysis
4.6. The Approach in a Nutshell
- Intermediary results include (1) a map of which assets are likely to be threatened or attacked by which threat and attack types (2) a list of more general categories for the actual threat and attack types for the smart grid (3) the security objectives relevant for the particular grid (4) a threat model (5) a risk model (6) simulations for the most risky threats and attack scenarios.
- Final results include demonstrations of simulations of the most risky scenarios to the stakeholders of smart grids in order to raise security awareness which will lead to taking precautions.
5. Applying the Approach to a Smart Grid Use Case: Digital Substation
5.1. The Security Pyramid
5.1.1. What Are Security Objectives in DS?
5.1.2. What Are Cyber-Security Threat and Attack Categories in DS?
- Data manipulation—tampering with control and sensor data can cause damage of grid equipment and outages.
- Unauthorized access of data—can disclose sensitive information.
- Unauthorized access of devices or users
- unauthorized access of devices—unauthorized devices in the DS network can become entry points for an attack.
- unauthorized access of users—including insiders and former employees.
- Threats on the privacy of customers—sensitive data of power consumption which can identify customers ethnicity, habits, used appliances, presence in the house and other information.
- Disruption threats—can be life threatening (hospitals, heating during cold temperatures, etc.).
5.1.3. What Are Common Threat and Attack Types in DS?
- DoS Attack, e.g., block flow of information to intended IEDs by flooding to reduce service availability
- Malware injection, e.g., the attacker injects malicious software such as ransomware and worms into software components of DS resulting in an undesirable operation, or failure of operation
- Packet transfer delay, e.g., delay in control commands
- GPS spoofing, e.g., desynchronization
- SV, MMS and GOOSE message spoofing –, e.g., prevent legitimate IEDs from getting critical messages by modifying GOOSE header fields to hijack communication channel
- Port Scanning, Network monitoring, e.g., data theft
- MitM attack, e.g., the attacker gains unauthorized access on communication network
- Corporate network intrusion from internet –, e.g., intrusion into the local network of substation with subsequent information distortion
5.2. Threat Analysis
5.2.1. Security Map: Linking Threats and Attack Types to Assets
- SCADA is located in the control center outside the DS. If an attacker gains access, it is possible to take control of the system. The attacker may manipulate the SCADA software (inject a malware), access confidential information (including data on servers and sensors from the entire grid), cause a DoS attack (potentially resulting in loss of grid observability and controllability) and send false commands resulting in control of the entire grid network with potential to damage the grid equipment.
- Gateway: an attacker may intrude to the network passing through the gateway and gain access to several components and/or flood the network via a DoS attack.
- HMI: if an attacker gains access, it is possible to take control of the system and the attacker may manipulate the HMI software (inject a malware), access confidential information on servers and sensors (within the substation) and send false commands to control the substation with potential to damage the substation equipment.
- IEDs: an attacker may gain access to an IED by obtaining login credentials. Hence, the attacker may reprogram IED, access data on IED, and/or stop/change device functionalities.
- MUs: an attacker might gain access to an MU device, manipulate analog data received from NCIT, and/or stop and/or control functionality.
- Physical Devices (CT/VT)—an attacker might gain access to sensory data, listen to measured values, and/or damage devices physically.
- Communication networks are vulnerable mostly to sniffing and DoS attacks. Sniffing can be classified to passive (monitoring and traffic capture) and active (port and vulnerability scanning). DoS attacks makes the network inaccessible to the intended users by flooding the network with traffic.
- Physical site: an engineer, technical staff, or an outsider with malicious purposes intrude into the DS as follows:
- using a mobile device with access to Internet in DS (malicious insider);
- using an infected USB flash disk or laptop in DS (insider);
- data access and modification on DS devices and communication lines interference (malicious insider and outsider);
- controlling devices manually such as turning on/off switches (malicious insider);
- controlling functionality of devices to stop, start or reverse functionality (malicious insider and outsider).
5.2.2. Security Table: Linking Threat and Attack Categories to Security Map
5.2.3. Threat Analysis Table: Linking Security Objectives to Security Table
5.3. Threat Modeling
5.4. Risk Model: Risk Assessment and Management
5.5. Impact Simulations
5.5.1. Passive Sniffing Attacks Verification
5.5.2. Active Sniffing Attacks Verification
Listing 1. Active sniffing by netdiscover |
Currently scanning: 1.1.134.0/16 | Screen View: Unique Hosts 9 Captured ARP Req/Rep packets, from 8 hosts. Total size: 540 ------------------------------------------------------------- IP At MAC Address Count Len MAC / Host ------------------------------------------------------------- 1.1.1.1 00:00:00:00:00:06 2 120 XEROX 1.1.2.1 00:00:00:00:00:07 1 60 XEROX 1.1.3.1 00:00:00:00:00:01 1 60 XEROX 1.1.3.2 00:00:00:00:00:02 1 60 XEROX 1.1.3.3 00:00:00:00:00:03 1 60 XEROX 1.1.3.4 00:00:00:00:00:04 1 60 XEROX 1.1.3.10 00:00:00:00:00:05 1 60 XEROX 1.1.10.10 00:00:00:00:00:08 1 60 XEROX |
5.5.3. Denial of Service Attacks Verification
5.5.4. Other Usage
6. Conclusions
Author Contributions
Funding
Conflicts of Interest
Abbreviations
ABW | Available Bandwidth |
ACK | Acknowledgement |
ARP | Address Resolution Protocol |
CIA | Confidentiality, Integrity, Availability |
CT/VT | Current/Voltage Transformer |
DoS | Denial of Service |
DS | Digital Substation |
GPS | Global Positioning System |
HMI | Human Machine Interface |
HW | Hardware |
IEC | International Electrotechnical Commission |
IED | Intelligent Electronic Device |
IoT | Interet of Things |
IPS | Intrusion Prevention System |
GOOSE | Generic Object-Oriented Substation Environment |
LAN | Local Area Network |
RCN | Research Council of Norway |
NCIT | Non-conventional Instrument Transformers |
NIST | National Institute of Standards and Technology |
NSM | Network and Security Management |
MAC | Message Authentication Code |
MitM | Man-in-the-Middle |
MMS | Manufacturing Message Specification |
MU | Merging Unit |
PASTA | Process of Attack Simulation and Threat Analysis |
PPS | Packets Per Second |
RAM | Random Access Memory |
RTU | Remote Terminal Unit |
SAS | Substation Automation Systems |
SCADA | Supervisory Control and Data Acquisition |
SeSV | Secure Sampled Values |
STRIDE | Spoofing, Tampering, Repudiation, Information disclosure, Denial of Service, |
Elevation of privilege | |
SG | Smart Grid |
SMV | Sampled Measured Values |
SV | Sampled Values |
SW | Software |
TCP | Transmission Control Protocol |
UDP | User Datagram Protocol |
USB | Universal Serial Bus |
VM | Virtual Machine |
WAN | Wide Area Network |
References
- Csanyi, E. What Is the Digital Substation and What Makes it Digital? EEP—Electrical Engineering Portal. Available online: https://electrical-engineering-portal.com/digital-substation (accessed on 6 May 2022).
- SINTEF, ECODIS—Engineering and Condition Monitoring in Digital Substations. Available online: https://www.sintef.no/en/projects/2019/ecodis/ (accessed on 6 May 2022).
- Lnett, InterSecure. Available online: https://www.l-nett.no/fou-og-innovasjon/fou-prosjekter/intersecure (accessed on 6 May 2022).
- NISTIR 7628 Rev. 1, Guidelines for Smart Grid Cybersecurity. Available online: https://csrc.nist.gov/publications/detail/nistir/7628/rev-1/final (accessed on 31 October 2022).
- IEEE Std C37.240-2014; IEEE Standard Cybersecurity Requirements for Substation Automation, Protection, and Control System. IEEE Power and Energy Society; IEEE Press: New York, NY, USA, 2014.
- Kwon, Y.; Lee, S.; King, R.; Lim, J.; Kim, H. Behavior Analysis and Anomaly Detection for a Digital Substation on Cyber-Physical System. Electronics 2019, 8, 326. [Google Scholar] [CrossRef] [Green Version]
- Kolosok, I.; Korkina, E. Problems of Cyber Security of Digital Substations. In Proceedings of the VIth International Workshop ’Critical Infrastructures: Contingency Management, Intelligent, Agent-Based, Cloud Computing and Cyber Security, Irkutsk, Russia, 17–24 March 2019; Atlantis Press: Amsterdam, The Netherlands, 2019; pp. 75–78. [Google Scholar] [CrossRef] [Green Version]
- Karnati, R. Security of Process Bus in Digital Substation. Master’s Thesis, University of Michigan-Dearborn, Dearborn, MI, USA, 2020. [Google Scholar]
- Hong, J.; Karnati, R.; Ten, C.W.; Lee, S.; Choi, S. Implementation of Secure Sampled Value (SeSV) Messages in Substation Automation System. IEEE Trans. Power Deliv. 2022, 37, 405–414. [Google Scholar] [CrossRef]
- Ashraf, S.; Shawon, M.H.; Khalid, H.M.; Muyeen, S.M. Denial-of-Service Attack on IEC 61850-Based Substation Automation System: A Crucial Cyber Threat towards Smart Substation Pathways. Sensors 2021, 21, 6415. [Google Scholar] [CrossRef]
- Hou, L.; Zhang, J.; Jin, N.; Zhu, M.; Li, Y. Digital substation cyber security analysis with SYN-flood attack as a simulation case. In Proceedings of the 2016 Chinese Control and Decision Conference (CCDC), Yinchuan, China, 28–30 May 2016; pp. 4467–4472. [Google Scholar] [CrossRef]
- Zhang, J.; Zhang, J.; Zeng, P.; Li, Y.; Yang, C.; Jin, Y. Key Issues in Designing Cyber Security Proxy Gateways for Digital Substation Non-immune Bay Layers. In Proceedings of the 2017 IEEE 7th Annual International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER), Honolulu, HI, USA, 31 July–4 August 2017; pp. 1309–1312. [Google Scholar] [CrossRef]
- Nweke, L.O.; Wolthusen, S. A Review of Asset-Centric Threat Modelling Approaches. Int. J. Adv. Comput. Sci. Appl. (IJACSA) 2020, 11, 1–6. [Google Scholar] [CrossRef] [Green Version]
- Holik, F.; Flå, L.H.; Jaatun, M.G.; Yayilgan, S.Y.; Foros, J. Threat Modeling of a Smart Grid Secondary Substation. Electronics 2021, 11, 850. [Google Scholar] [CrossRef]
- Liu, R.; Vellaithurai, C.; Biswas, S.S.; Gamage, T.T.; Srivastava, A.K. Analyzing the Cyber-Physical Impact of Cyber Events on the Power Grid. IEEE Trans. Smart Grid 2015, 6, 2444–2453. [Google Scholar] [CrossRef]
- Vallant, H.; Stojanović, B.; Božić, J.; Hofer-Schmitz, K. Threat Modelling and Beyond-Novel Approaches to Cyber Secure the Smart Energy System. Appl. Sci. 2021, 11, 5149. [Google Scholar] [CrossRef]
- Sugwon, H. Cyber security strategies for substation automation systems and their implications. Int. J. Smart Grid Clean Energy 2019, 8, 747–756. [Google Scholar] [CrossRef]
- Maëlle, K.Q. Cyber Security of the Smart Grid Control Systems: Intrusion Detection in IEC 61850 Communication Networks. Ph.D. Thesis, Université Grenoble Alpes, Grenoble, France, 2017. [Google Scholar]
- Shailendra, F.; Anderson, R.J.; McGrath, K.; Hansen, K.T.; Alvarez, F. The Protection of Substation Communications. 2009. Available online: https://www.cl.cam.ac.uk/rja14/Papers/S4-2010.pdf (accessed on 7 May 2022).
- Ishchenko, D.; Nuqui, R. Secure Communication of Intelligent Electronic Devices in Digital Substations. In Proceedings of the 2018 IEEE/PES Transmission and Distribution Conference and Exposition, Denver, CO, USA, 16–19 April 2018; pp. 1–5. [Google Scholar] [CrossRef]
- Yuvaraj, N.; Lakpathi, M.; Mithun, T.P. Study and Analysis of Protection Scheme of Digital Substation Using IEC61850-9-2 Process Bus Technology (2019). Int. J. Electr. Eng. Technol. 2019, 10, 1–9. [Google Scholar] [CrossRef]
- Talwar, S.; Loiselle, E.; Lambert, D.; Boutin, W.; Lavallee, M.; Sarubbi, F. Digital Transformation of Substation through IEC61850 Standard. CIGRE Canada. 2019. Available online: https://cigreconference.ca/papers/2019/CIGRE-190.pdf (accessed on 7 May 2022).
- Elbez, G.; Keller, H.B.; Hagenmeyer, V. Authentication of GOOSE Messages under Timing Constraints in IEC 61850 Substations. In Proceedings of the 6th International Symposium for ICS and SCADA Cyber Security Research 2019 (ICS-CSR), Athens, Greece, 10–12 September 2019. [Google Scholar] [CrossRef] [Green Version]
- Luyi, S.; Lang, S. A Threat Modeling Language for Substation Automation Systems; KTH, School of Electrical Engineering and Computer Science (EECS): Stockholm, Sweden, 2020. [Google Scholar]
- Khodabakhsh, A.; Yayilgan, S.Y.; Houmb, S.H.; Hurzuk, N.; Foros, J.; Istad, M. Cyber-security gaps in a digital substation: From sensors to SCADA. In Proceedings of the 9th Mediterranean Conference on Embedded Computing (MECO), Budva, Montenegro, 8–11 June 2020; pp. 1–4. [Google Scholar]
- Dalipi, F.; Yildirim, S. Security and Privacy Considerations for IoT Application on Smart Grids: Survey and Research Challenges. In Proceedings of the 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), Vienna, Austria, 22–24 August 2016. [Google Scholar]
- Abraham, D.; Yayilgan Yildirim, S.; Mohamed, A.; Gebremedhin, A.; Fisnik, D. Security and Privacy Issues in IoT-Based Smart Grids: A Case Study in a Digital Substation. In Holistic Approach for Decision Making Towards Designing Smart Cities 2021; Springer International Publishin: Cham, Switzerland, 2021; ISBN 978-3-030-85566-6. [Google Scholar]
- Khodabakhsh, A.; Yayilgan, S.Y.; Abomhara, M.; Istad, M.; Hurzuk, N. Cyber-risk identification for a digital substation. In Proceedings of the 15th International Conference on Availability, Virtual, 25–28 August 2020. [Google Scholar]
- Holik, F.; Abraham, D.; Yildirim Yayilgan, S. Emulation of IEC 60870-5-104 Communication in Digital Secondary Substations. In Communications in Computer and Information Science; Springer International Publishin: Cham, Switzerland, 2022; Volume 1616. [Google Scholar] [CrossRef]
- Khodabakhsh, A.; Yayilgan, S.Y. Data Privacy in IoT Equipped Future Smart Homes. In Proceedings of the International Conference on Intelligent Technologies and Applications, Gjøvik, Norway, 28–30 September 2020; pp. 384–391. [Google Scholar] [CrossRef]
- ScienceDirect, Manufacturing Message Specification. Available online: https://www.sciencedirect.com/topics/engineering/manufacturing-message-specification (accessed on 6 May 2022).
- Conklin, L. Threat Modeling Process. Available online: https://owasp.org/www-community/Threat_Modeling_Process (accessed on 6 May 2022).
- McCabe, J. 9—Security and Privacy Architecture, Network Analysis, Architecture, and Design, 3rd ed.; Morgan Kaufmann: Saint Louis, MO, USA, 2007; pp. 359–383. ISBN 9780123704801. ISSN 18759351. [Google Scholar] [CrossRef]
- Shevchenko, N. Threat Modeling: 12 Available Methods. Software Engineering Institute Blog. Available online: https://insights.sei.cmu.edu/blog/threat-modeling-12-available-methods/ (accessed on 6 May 2022).
- Shevchenko, N.; Chick, T.; O’Riordan, P.; Scanlon, T.; Woody, C. Threat Modeling: A Summary of Available Methods; White Paper, CMU; Software Engineering Institute: Pittsburgh, PA, USA, 2018. [Google Scholar]
- O’Connor, A. Security Risk Assessments and Threat Modelling, and Why We Do Both—LinkedIn. Available online: https://www.linkedin.com/pulse/security-risk-assessments-threat-modelling-why-we-do-both-o-connor (accessed on 6 May 2022).
- Harvey, M.; Long, D.; Reinhard, K. Visualizing NISTIR 7628, Guidelines for Smart Grid Cyber Security. In Proceedings of the 2014 Power and Energy Conference at Illinois (PECI), Champaign, IL, USA, 28 February–1 March 2014; IEEE: Piscataway, NJ, USA, 2014; pp. 1–8. [Google Scholar] [CrossRef]
- Blank, R.M.; Gallagher, P.D. Guide for Conducting Risk Assessments; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2012. [CrossRef]
Threats/Assets | SCADA | Gateway | HMI | IEDs | MUs | CT/VT |
---|---|---|---|---|---|---|
DoS attack | C/C | C/B | C/B | A/B | A/B | A/C |
Malware injection | A/B | C/C | C/B | A/B | A/C | A/D |
Packet transfer delay | C/C | C/C | C/C | A/B | A/B | A/C |
SV, MMS, GOOSE spoofing | C/C | C/C | C/C | A/B | A/B | A/C |
GPS spoofing | C/D | D/D | C/B | A/B | A/B | D/D |
Net. monitoring and scanning | D/B | D/B | D/B | D/B | D/B | D/D |
Man in the middle attack | A/B | B/B | C/B | A/B | A/B | A/C |
Intrusion from Internet | B/D | B/C | B/C | A/C | A/C | A/D |
SG Threat and Attack Categories | Data Manipu- lation Attacks | Unauth- orized Access of Data | Unautho- rized Access of Devices or Users | Attacks on the Privacy | Dis- rup- tion Att. | C | I | A | ||
---|---|---|---|---|---|---|---|---|---|---|
DS Assets | Attack/Threat Types | Dev. to SG | Users to dev. | |||||||
SCADA | Malware injection | X | X | X | X | X | X | X | ||
Take control of system | X | X | X | X | X | |||||
Manipulate sw | X | X | X | X | X | |||||
Stop functionality | X | X | X | X | X | |||||
Access to data storage servers | X | X | X | X | X | |||||
Access to sensory data | X | X | X | |||||||
Gateway | Intrusion into DS | X | X | X | ||||||
DoS | X | X | ||||||||
IED | RAM access | X | X | X | X | X | X | |||
Stop function. | X | X | X | X | ||||||
HMI | RAM access | X | X | X | X | |||||
Stop functionality | X | X | X | X | X | |||||
Take control | X | X | X | X | X | X | X | X | ||
Commu- nication network | Listen to net- work traffic | X | X | X | ||||||
Falsify comm. data (MitM) | X | X | X | X | ||||||
DoS | X | X | ||||||||
MU | Manipulate analog data | X | X | X | X | X | ||||
Stop/control functionality | X | X | X | X | ||||||
Switch | Switch control | X | X | X | ||||||
Manipulate traffic | X | X | X | X | X | X | X | |||
Connect infe- cted dev. (USB) | X | X | X | X | X | X | ||||
NCIT (CT/VT) | Access to sensory data | X | X | |||||||
Listen to generated data | X | X | X | |||||||
Physical damage | X | X |
Attack Type | Attacker BW | Attacker PPS | ABW | AVG Delay | MAX Jitter | AVG Jitter | Loss |
---|---|---|---|---|---|---|---|
No attack | - | - | 8.9 Mbps | 1 ms | 46 ms | 1.3 ms | 0% |
SYN (hping3) | 22.5 Mbps | 46,894 | 76 Kbps | 194 ms | 1112 ms | 230 ms | 49.2% |
FIN flood | 25.1 Mbps | 52,383 | 83 Kbps | 188 ms | 1114 ms | 222 ms | 51.7% |
SYN FIN | 27.1 Mbps | 56,366 | 85 Kbps | 254 ms | 1575 ms | 291 ms | 54.2% |
Push ACK | 26.2 Mbps | 54,564 | 81 Kbps | 468 ms | 1096 ms | 358.3 | 53.7% |
RESET | 27.9 Mbps | 58,030 | 84 Kbps | 1.33 s | 8196 ms | 671 ms | 67.8% |
UDP flood | 22.9 Mbps | 47,696 | 75 Kbps | - | - | - | 68.5% |
Smurf | 17.1 Mbps | 35,516 | 4.9 Mbps | 11 ms | 257 ms | 12.7 ms | 0% |
SYN (Metasploit) | 1 Mbps | 2113 | 8.9 Mbps | 1.7 ms | 244 ms | 10.7 ms | 0% |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Yildirim Yayilgan, S.; Holik, F.; Abomhara, M.; Abraham, D.; Gebremedhin, A. An Approach for Analyzing Cyber Security Threats and Attacks: A Case Study of Digital Substations in Norway. Electronics 2022, 11, 4006. https://doi.org/10.3390/electronics11234006
Yildirim Yayilgan S, Holik F, Abomhara M, Abraham D, Gebremedhin A. An Approach for Analyzing Cyber Security Threats and Attacks: A Case Study of Digital Substations in Norway. Electronics. 2022; 11(23):4006. https://doi.org/10.3390/electronics11234006
Chicago/Turabian StyleYildirim Yayilgan, Sule, Filip Holik, Mohamed Abomhara, Doney Abraham, and Alemayehu Gebremedhin. 2022. "An Approach for Analyzing Cyber Security Threats and Attacks: A Case Study of Digital Substations in Norway" Electronics 11, no. 23: 4006. https://doi.org/10.3390/electronics11234006
APA StyleYildirim Yayilgan, S., Holik, F., Abomhara, M., Abraham, D., & Gebremedhin, A. (2022). An Approach for Analyzing Cyber Security Threats and Attacks: A Case Study of Digital Substations in Norway. Electronics, 11(23), 4006. https://doi.org/10.3390/electronics11234006