skip to main content
10.1145/3546096.3546102acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsetConference Proceedingsconference-collections
research-article
Open Access

PowerDuck: A GOOSE Data Set of Cyberattacks in Substations

Published:08 August 2022Publication History

ABSTRACT

Power grids worldwide are increasingly victims of cyberattacks, where attackers can cause immense damage to critical infrastructure. The growing digitalization and networking in power grids combined with insufficient protection against cyberattacks further exacerbate this trend. Hence, security engineers and researchers must counter these new risks by continuously improving security measures. Data sets of real network traffic during cyberattacks play a decisive role in analyzing and understanding such attacks. Therefore, this paper presents PowerDuck, a publicly available security data set containing network traces of GOOSE communication in a physical substation testbed. The data set includes recordings of various scenarios with and without the presence of attacks. Furthermore, all network packets originating from the attacker are clearly labeled to facilitate their identification. We thus envision PowerDuck improving and complementing existing data sets of substations, which are often generated synthetically, thus enhancing the security of power grids.

References

  1. Chuadhry Mujeeb Ahmed and Nandha Kumar Kandasamy. 2021. A Comprehensive Dataset from a Smart Grid Testbed for Machine Learning Based CPS Security Research. In CPS4CIP. Springer Int’l Pub., Cham.Google ScholarGoogle Scholar
  2. Partha P. Biswas, Heng Chuan Tan, Qingbo Zhu, 2019. A Synthesized Dataset for Cybersecurity Study of IEC 61850 based Substation. In IEEE SmartGridComm.Google ScholarGoogle Scholar
  3. Jonathan Goh, Sridhar Adepu, Khurum Nazir Junejo, and Aditya Mathur. 2017. A Dataset to Support Research in the Design of Secure Water Treatment Systems. In Critical Information Infrastructures Security. Springer Int’l Pub., Cham.Google ScholarGoogle Scholar
  4. Tim Krause, Raphael Ernst, Benedikt Klaer, 2021. Cybersecurity in Power Grids: Challenges and Opportunities. Sensors 21, 18 (2021).Google ScholarGoogle Scholar
  5. Ralph Langner. 2011. Stuxnet: Dissecting a Cyberwarfare Weapon. IEEE Security & Privacy 9, 3 (2011).Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Dan Li, Dacheng Chen, Baihong Jin, 2019. MAD-GAN: Multivariate Anomaly Detection for Time Series Data with Generative Adversarial Networks. In International Conference on Artificial Neural Networks. Springer, Cham.Google ScholarGoogle Scholar
  7. Chih-Yuan Lin, August Fundin, Erik Westring, 2021. RICSel21 Data Collection: Attacks in a Virtual Power Network. In IEEE SmartGridComm.Google ScholarGoogle Scholar
  8. Ramin Moghaddass and Jianhui Wang. 2018. A Hierarchical Framework for Smart Grid Anomaly Detection Using Large-Scale Smart Meter Data. IEEE Transactions on Smart Grid 9, 6 (2018).Google ScholarGoogle ScholarCross RefCross Ref
  9. Ángel Luis Perales Gómez, Lorenzo Fernández Maimó, Alberto Huertas Celdrán, 2019. On the Generation of Anomaly Detection Datasets in Industrial Control Systems. IEEE Access 7(2019).Google ScholarGoogle ScholarCross RefCross Ref
  10. Martin Serror, Sacha Hack, Martin Henze, Marko Schuba, and Klaus Wehrle. 2021. Challenges and Opportunities in Securing the Industrial Internet of Things. IEEE Transactions on Industrial Informatics 17, 5 (2021).Google ScholarGoogle ScholarCross RefCross Ref
  11. Mustafizur R. Shahid, Gregory Blanc, Houda Jmila, 2020. Generative Deep Learning for Internet of Things Network Traffic Generation. In IEEE Pacific Rim International Symposium on Dependable Computing.Google ScholarGoogle Scholar
  12. Hyeok-Ki Shin, Woomyo Lee, Jeong-Han Yun, and HyoungChun Kim. 2020. HAI 1.0: HIL-based Augmented ICS Security Dataset. In USENIX Workshop on Cyber Security Experimentation and Test (CSET ’20).Google ScholarGoogle Scholar
  13. David E. Whitehead, Kevin Owens, Dennis Gammel, and Jess Smith. 2017. Ukraine Cyber-Induced Power Outage: Analysis and Practical Mitigation Strategies. In IEEE Conference for Protective Relay Engineers.Google ScholarGoogle Scholar
  14. Konrad Wolsing, Eric Wagner, Antoine Saillard, and Martin Henze. 2022. IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems. In International Symposium on Research in Attacks, Intrusions and Defenses (RAID ’22).Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Tarun Yadav and Arvind Mallari Rao. 2015. Technical Aspects of Cyber Kill Chain. In Security in Computing and Communications. Springer Int’l Pub., Cham.Google ScholarGoogle Scholar

Index Terms

  1. PowerDuck: A GOOSE Data Set of Cyberattacks in Substations

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            CSET '22: Proceedings of the 15th Workshop on Cyber Security Experimentation and Test
            August 2022
            150 pages
            ISBN:9781450396844
            DOI:10.1145/3546096

            Copyright © 2022 Owner/Author

            This work is licensed under a Creative Commons Attribution International 4.0 License.

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 8 August 2022

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed limited

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format