|
Attack techniques | Mechanism | Focus | Methodology |
|
Asynchronous attack [56] | Lead to instability of a real-time energy market | Erroneous control | Desynchronizing of smart meters |
Simple packet delay attack [56] | Desynchronizing the slave nodes | Manipulate of a slaves’ clock | Delay of the transmissions of the NTP or PTP packets |
DDoS [57, 58] | Denial of services, service unavailable | Unknown or new attack, exploiting vulnerabilities, overload resources | UDP flood, ICMP/PING flood, SYN flood, Ping of Death, etc. |
Advanced persistent threats (APT) [58] | Unauthorized person attempts to gain access to the system | Stealing data | Bypassing authentication |
Man-in-the-Middle (MITM) attack [58–60] | Gain illegitimate access to the system or the network | A program or person masquerades as another program or person | Spoofing and sniffing attack |
Replay attack [58, 61, 62] | Disguise valid entities or messages | Bypassing integrity | Valid message containing some valid data is repeated again and again |
|