Author
Listed:
- Oscar A. Tobar-Rosero
(TyT Group, Universidad Nacional de Colombia, Medellín 050034, Colombia
Current address: Industrial Automation and Communications Laboratory, Universidad Nacional de Colombia, Sede Medellín, Medellín 050034, Colombia.)
- Omar A. Roa-Romero
(TyT Group, Universidad Nacional de Colombia, Medellín 050034, Colombia)
- Germán D. Rueda-Carvajal
(TyT Group, Universidad Nacional de Colombia, Medellín 050034, Colombia)
- Alexánder Leal-Piedrahita
(GITALab, Universidad de Antioquia, Medellín 050010, Colombia)
- Juan F. Botero-Vega
(GITALab, Universidad de Antioquia, Medellín 050010, Colombia)
- Sergio A. Gutierrez-Betancur
(GITALab, Universidad de Antioquia, Medellín 050010, Colombia)
- John W. Branch-Bedoya
(TyT Group, Universidad Nacional de Colombia, Medellín 050034, Colombia)
- Germán D. Zapata-Madrigal
(GIDIA Group, Universidad Nacional de Colombia, Medellín 050034, Colombia)
Abstract
Cybersecurity in Critical Infrastructures, especially Digital Substations, has garnered significant attention from both the industrial and academic sectors. A commonly adopted approach to support research in this area involves the use of datasets, which consist of network traffic samples gathered during the operation of an infrastructure. However, creating such datasets from real-world electrical systems presents some challenges: (i) These datasets are often generated under controlled or idealized conditions, potentially overlooking the complexities of real-world operations within a digital substation; (ii) the captured data frequently contain sensitive information, making it difficult to share openly within the research community. This paper presents the creation of a new dataset aimed at advancing cybersecurity research, specifically focused on GOOSE spoofing attacks, given the crucial role of the GOOSE protocol in managing operational and control tasks within Digital Substations. The dataset highlights the real-world impacts of these attacks, demonstrating the execution of unintended operations under different operational scenarios, including both stable conditions and situations involving system failures. The data were collected from a laboratory testbed that replicates the actual functioning of a real digital substation with two bays. The experiments provided insights into key characteristics of GOOSE protocol traffic and the vulnerability of DS infrastructure to Spoofing Attacks.
Suggested Citation
Oscar A. Tobar-Rosero & Omar A. Roa-Romero & Germán D. Rueda-Carvajal & Alexánder Leal-Piedrahita & Juan F. Botero-Vega & Sergio A. Gutierrez-Betancur & John W. Branch-Bedoya & Germán D. Zapata-Madrig, 2024.
"GOOSE Secure: A Comprehensive Dataset for In-Depth Analysis of GOOSE Spoofing Attacks in Digital Substations,"
Energies, MDPI, vol. 17(23), pages 1-19, December.
Handle:
RePEc:gam:jeners:v:17:y:2024:i:23:p:6098-:d:1536158
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jeners:v:17:y:2024:i:23:p:6098-:d:1536158. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.