Cyber-Attacks

Objectives/Purpose

Targeting Layers

Impacts

Security Requirements

Jamming Attacks

Disrupting the transmission and the reception of data.

Physical

Data Link

Network

Blocking one or several nodes to transmit and receive information collisions.

Availability

Spoofing Attacks

Pretending to be a legitimate node to compromise the system.

Physical

Data Link

Network

Transport

Misleading other nodes.

Integrity

Availability

Confidentiality Accountability

Injection Attacks

Injecting false/untrusted data packets into a network.

Data Link

Network

Transport

Application

Injecting false data

Corrupting the legitimate processes and operations

Appearance of illegitimate nodes in the network.

Integrity

Flooding Attack

Depleting, and exhausting system resources.

Data Link

Network

Transport

Application

Malfunction of nodes and loss of availability in a network.

Availability

Man-in-the-Middle Attacks

Preventing, or modifying data during transmission through the network.

Data Link

Network

Session

Unauthorized access to sensitive information.

Integrity

Confidentiality

Social Engineering Attacks

Manipulating users to reveal sensitive information.

Application

Violation of users’ privacy.

Temporary or permanent damage to the system.

Steal sensitive and private information.

Identity theft.

Confidentiality

Eavesdropping Attack

Monitoring and capturing all network traffic.

Physical

Network

Loss of privacy.

Confidentiality

Intrusion Attack

Gain illegal access to the node or network.

Network

Application

Misusing available resources in the network.

Integrity

Confidentiality

Brute Force Attacks

Cracking usernames and passwords.

Network

Session

Presentation

Gaining unauthorized access to users’ system or accounts.

Integrity

Confidentiality

Time synchronization

Attack

Targeting timing data and disrupting the time synchronization between nodes.

Physical

Data Link

Compromising events, such as location estimation and fault detection

Performance degradation.

Integrity

Availability

Traffic Analysis Attack

Control the hosts and the devices that are connected to the network.

Data Link

Sniff and analyze the message in order to achieve information about the patterns of communications between nodes.

Confidentiality

Masquerade Attack

Pretend to be an authorized user.

Data Link

Gaining unauthorized access to users’ system.

Integrity

Availability

Confidentiality Accountability

Smart Meter

Tampering Attack

Modification the transmitted data for any customers.

Physical

Pay higher or lower electricity bills.

Integrity

Buffer Overflow Attack

Sending improper or incorrect data to the specific system.

Transport

Application

System crash or exhaust resources.

Availability

Puppet Attack

Sending fake data in the AMI network.

Network

Reduce packet delivery to 10% or 20%

Exhaust the communication network bandwidth.

Availability

Teardrop Attack

Modification of the length and the fragmentation offset in sequential IP packets.

Network

System crash.

Availability

Smurf Attack

Modifying the traffic of an entire system.

Network

Replay and saturate the target network.

Availability

Popping the HMI Attack

Get unauthorized access

Application

Controling the compromised system.

Integrity

Availability

Confidentiality Accountability