Cyber-Attacks | Objectives/Purpose | Targeting Layers | Impacts | Security Requirements |
Jamming Attacks | Disrupting the transmission and the reception of data. | Physical Data Link Network | Blocking one or several nodes to transmit and receive information collisions. | Availability |
Spoofing Attacks | Pretending to be a legitimate node to compromise the system. | Physical Data Link Network Transport | Misleading other nodes. | Integrity Availability Confidentiality Accountability |
Injection Attacks | Injecting false/untrusted data packets into a network. | Data Link Network Transport Application | Injecting false data Corrupting the legitimate processes and operations Appearance of illegitimate nodes in the network. | Integrity |
Flooding Attack | Depleting, and exhausting system resources. | Data Link Network Transport Application | Malfunction of nodes and loss of availability in a network. |
Availability |
Man-in-the-Middle Attacks | Preventing, or modifying data during transmission through the network. | Data Link Network Session | Unauthorized access to sensitive information. | Integrity Confidentiality |
Social Engineering Attacks | Manipulating users to reveal sensitive information. | Application | Violation of users’ privacy. Temporary or permanent damage to the system. Steal sensitive and private information. Identity theft. | Confidentiality |
Eavesdropping Attack | Monitoring and capturing all network traffic. | Physical Network | Loss of privacy. | Confidentiality |
Intrusion Attack | Gain illegal access to the node or network. | Network Application | Misusing available resources in the network. | Integrity Confidentiality |
Brute Force Attacks | Cracking usernames and passwords. | Network Session Presentation | Gaining unauthorized access to users’ system or accounts. | Integrity Confidentiality |
Time synchronization Attack | Targeting timing data and disrupting the time synchronization between nodes. | Physical Data Link | Compromising events, such as location estimation and fault detection Performance degradation. | Integrity Availability |
Traffic Analysis Attack | Control the hosts and the devices that are connected to the network. | Data Link | Sniff and analyze the message in order to achieve information about the patterns of communications between nodes. | Confidentiality |
Masquerade Attack | Pretend to be an authorized user. | Data Link | Gaining unauthorized access to users’ system. | Integrity Availability Confidentiality Accountability |
Smart Meter Tampering Attack | Modification the transmitted data for any customers. | Physical | Pay higher or lower electricity bills. | Integrity |
Buffer Overflow Attack | Sending improper or incorrect data to the specific system. | Transport Application | System crash or exhaust resources. | Availability |
Puppet Attack | Sending fake data in the AMI network. | Network | Reduce packet delivery to 10% or 20% Exhaust the communication network bandwidth. | Availability |
Teardrop Attack | Modification of the length and the fragmentation offset in sequential IP packets. | Network | System crash. | Availability |
Smurf Attack | Modifying the traffic of an entire system. | Network | Replay and saturate the target network. | Availability |
Popping the HMI Attack | Get unauthorized access | Application | Controling the compromised system. | Integrity Availability Confidentiality Accountability |