skip to main content
10.1145/2459976.2460008acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Developing a power measurement framework for cyber defense

Published: 08 January 2013 Publication History

Abstract

Energy Delivery Systems (EDS) have become smarter by incorporating chips and data communication capabilities. As a result, they have become more vulnerable to cyber-attacks as well. As part of a systems health monitoring approach, we investigate whether cyber-events targeting EDS can be detected by monitoring component-level data such as temperature, voltage, power, and process indicative variables---collectively referred to as component health indicators. We report our experiences with developing a measurement framework for power consumption in different EDS components such as Cabinet Distribution Units (CDU), Power Distribution Units (PDU), and standard enterprise desktops. Our plan for gathering and analyzing power consumption data involves establishing a baseline execution profile and then capturing the effect of perturbations in the state from injecting various malware. As a contribution, we report on initial experiments with power measurement techniques and outline future work for evaluating components under normal and anomalous operating regimes.

References

[1]
Prowell, S., Pleszkoch, M., and Linger, R. Automated Vulnerability Detection for Compiled Smart Grid Software. In 2012 IEEE Innovative Smart Grid Technologies (ISGT).
[2]
TenHoopen, P. Rootkits. Presentation to West Michigan Linux Users Group. http://www.wmlug.org/pdf/Rootkits.pdf, 2009.
[3]
Lewis, J. The Electrical Grid as a Target for Cyber Attack. Center for Strategic and International Studies, March 2010.
[4]
Thabet, A. Stuxnet Malware Analysis Paper.
[5]
Pouchard, L., Dobson, J., and Poole, S. Collecting sensor data for high-performance computing: a case-study. In Proc. of the Parallel and Distributed Parallel Processing Techniques and Applications, 2010.
[6]
Cappello, F. Fault Tolerance in Petascale/Exascale Systems: current knowledge, challenges and research opportunities. Intl Jour of HPC Applications, Vol. 23, No. 3, Fall 2009.
[7]
Schroeder, B. and Gibson, G. Understanding failures in petascale computers. Journal of Physics: Conference Series, Vol. 78, (SciDAC 2007).
[8]
Pinheiro, E., Weber, W. D., and Barroso, L. A. Failure Trends in a Large Disk Drive Population. In Proc. of the 5th USENIX Conference on File and Storage Technologies (FAST), 2007.
[9]
Brandt, J., et al. Resource Monitoring and Management with OVIS to Enable HPC in Cloud Computing Environments. In IEEE Intl Sym on Parallel & Distributed Procsng, 1--8, 2009.
[10]
Brandt, J., et al. Using Probabilistic Characterization to Reduce Runtime Faults in HPC Systems. In Proc 8th IEEE Intl Symp on Cluster Computing and the Grid, 759--764, 2009.
[11]
Hsu, C. and Poole, S. W. Power measurement for high performance computing: State of the art. In Third International Green Computing Conference, Orlando, FL, July 2011.
[12]
Cui, Z., Zhu, Y., Bao, Y., Chen, M. A Fine-grained Component-level Power Measurement Method. In Third International Green Computing Conference, Orlando, FL, July 2011.
[13]
Buennemeyer, T., et al. Battery-Sensing Intrusion Protection for Wireless Handheld Computers using a Dynamic Threshold Calculation Algorithm for Attack Detection. In Proc. of the 40th Hawaii Intl Conference on Systems Sciences, 2007.
[14]
Asante Networks, Inc. Simple Network Management Protocol. March 2005. Online: http://goo.gl/Rukx2

Cited By

View all
  • (2024)Shells Bells: Cyber-Physical Anomaly Detection in Data CentersNOMS 2024-2024 IEEE Network Operations and Management Symposium10.1109/NOMS59830.2024.10575124(1-10)Online publication date: 6-May-2024
  • (2022)Profiling CPU Behavior for Detection of Android RansomwareSoutheastCon 202210.1109/SoutheastCon48659.2022.9764053(690-697)Online publication date: 26-Mar-2022
  • (2018)On-Device Detection via Anomalous Environmental FactorsProceedings of the 8th Software Security, Protection, and Reverse Engineering Workshop10.1145/3289239.3289246(1-8)Online publication date: 3-Dec-2018
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
CSIIRW '13: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
January 2013
282 pages
ISBN:9781450316873
DOI:10.1145/2459976

Sponsors

  • Los Alamos National Labs: Los Alamos National Labs
  • Sandia National Labs: Sandia National Laboratories
  • DOE: Department of Energy
  • Oak Ridge National Laboratory
  • Lawrence Livermore National Lab.: Lawrence Livermore National Laboratory
  • BERKELEYLAB: Lawrence National Berkeley Laboratory
  • Argonne Natl Lab: Argonne National Lab
  • Idaho National Lab.: Idaho National Laboratory
  • Pacific Northwest National Laboratory
  • Nevada National Security Site: Nevada National Security Site

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 January 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. cabinet distribution unit
  2. cyber-attacks
  3. energy delivery systems
  4. malware
  5. power distribution unit
  6. rootkits
  7. simple network management protocol

Qualifiers

  • Research-article

Conference

CSIIRW '13
Sponsor:
  • Los Alamos National Labs
  • Sandia National Labs
  • DOE
  • Lawrence Livermore National Lab.
  • BERKELEYLAB
  • Argonne Natl Lab
  • Idaho National Lab.
  • Nevada National Security Site
CSIIRW '13: Cyber Security and Information Intelligence
January 8 - 10, 2013
Tennessee, Oak Ridge, USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)1
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Shells Bells: Cyber-Physical Anomaly Detection in Data CentersNOMS 2024-2024 IEEE Network Operations and Management Symposium10.1109/NOMS59830.2024.10575124(1-10)Online publication date: 6-May-2024
  • (2022)Profiling CPU Behavior for Detection of Android RansomwareSoutheastCon 202210.1109/SoutheastCon48659.2022.9764053(690-697)Online publication date: 26-Mar-2022
  • (2018)On-Device Detection via Anomalous Environmental FactorsProceedings of the 8th Software Security, Protection, and Reverse Engineering Workshop10.1145/3289239.3289246(1-8)Online publication date: 3-Dec-2018
  • (2018)Phase Space Detection of Virtual Machine Cyber Events Through Hypervisor-Level System Call Analysis2018 1st International Conference on Data Intelligence and Security (ICDIS)10.1109/ICDIS.2018.00034(159-167)Online publication date: Apr-2018
  • (2016)Buffer overflow attack's power consumption signaturesProceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering10.1145/3015135.3015141(1-7)Online publication date: 5-Dec-2016

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media