Study the Level of Network Security and Penetration Tests on Power Electronic Device
Abstract
:1. Introduction
2. Article Structure and Table of Acronyms
- Section 1—Introduction. Here, we present a brief description of the state of the problem under consideration;
- Section 2—Structure of the article;
- Section 3—Related work. Here, we present a review of various works that are related or very close to the problem discussed in this practical study;
- Section 4—Experimental setup and the tools and research methodology used. Here, we explain the setup, the tools used, and the research methodology;
- Section 5—Results. Here, we present the results obtained from the study;
- Section 6—Discussion and analysis of the obtained results;
- Section 7—Conclusions.
3. Related Work
4. Experimental Setup, Used Tools, and Research Methodology
4.1. Experiemtnal Setup
4.2. Used Tools
- Network analyzer: Colasoft Capsa free (version 11.1) was used [50]. It is a network analyzer through which various parameters can be monitored, such as generated traffic, number of TCP packets, traffic generated by protocols, etc.;
- Nmap (version 7.94): This is a tool that is used for discovering the security vulnerabilities of various communication devices. In addition, this tool has a different set of scripts through which it finds out the most common cybersecurity vulnerabilities of the devices [51];
- hping3 (version 3.0.0): This is a tool for creating and sending custom TCP/IP packets. The tool can be used to perform additional tasks such as network scanning, network security testing, etc. Different types of TCP DoS attacks can be simulated with hping3, making it a valuable tool for testing the network security of different devices [52];
- Wireshark (version 4.0.7): This is a network protocol analyzer that “captures” all packets that are exchanged between communication devices. These captured packets can then be examined and analyzed extensively. This tool can also be used to find out whether the data exchange between communication devices is secure [53];
- Burp Suite Community Edition (version 2023.9.1): This tool is used to test/study the security of applications. It can also be used to find out whether the data exchange is secure [54];
- The Colasoft ping tool (version 2.0) [55] is used to measure the round-trip delay (RTD) between the monitoring center and the studied PDU in the experimental network;
4.3. Research Methodology
5. Results
5.1. Studying the Level of Network Security
5.2. Penetration Testing
5.2.1. TCP SYN Flooding
5.2.2. TCP ACK Flooding
5.2.3. TCP RST Flooding
5.2.4. TCP FIN Flooding
5.2.5. TCP PUSH Flooding
5.2.6. TCP URG Flooding
5.2.7. Additional Summary Results
6. Discussion
6.1. Discusion for the Results from Section 5.1
- Network segmentation by creating VLANs (Virtual Local Area Networks) and using hardware firewalls;
- Load balancing—distributing traffic across multiple servers;
- Blocking traffic from known or suspected IP addresses that have been linked to DoS attacks in the past or present;
- Limiting the speed of traffic, which can prevent a DoS attack from overloading the server;
- Using Content Delivery Networks (CDNs)—this distributes the content of the website across multiple locations, so a DoS attack could not bring down the entire site.
6.2. Discusion for the Results from Section 5.2
7. Conclusions
Funding
Data Availability Statement
Conflicts of Interest
References
- Wu, Y.-E.; Lin, P.-J. Design of a High Efficiency High Step-Up/Step-Down Bidirectional Isolated DC–DC Converter. Processes 2022, 10, 50. [Google Scholar] [CrossRef]
- Wu, Y.-E.; Ke, Y.-T. A Novel Bidirectional Isolated DC-DC Converter with High Voltage Gain and Wide Input Voltage. IEEE Trans. Power Electron. 2021, 36, 7973–7985. [Google Scholar] [CrossRef]
- Sahin, Y.; Ting, N.S.; Yesilyurt, H. A novel capacitor-voltage reduced bidirectional PWM DC-DC buck-boost converter for renewable energy battery charge system. Int. J. Circ. Theor. Appl. 2023, 51, 2875–2888. [Google Scholar] [CrossRef]
- Stefanov, I.T.; Kishkin, K.Y.; Arnaudov, D.D. Examination of LLC based DC/DC Resonant Converter at Different Modes of Operation. In Proceedings of the XXXII International Scientific Conference Electronics (ET), Sozopol, Bulgaria, 13–15 September 2023. [Google Scholar]
- Kishkin, K.; Kanchev, H.; Arnaudov, D. Modeling the Influences of Cells Characteristics in Battery Bank. In Proceedings of the 22nd International Symposium on Electrical Apparatus and Technologies (SIELA), Bourgas, Bulgaria, 1–4 June 2022. [Google Scholar]
- Kroics, K.; Zarembo, J. Concept of Inductor with a Virtual Air Gap for Increasing Fault Current Capability in Traction Drive Applications. In Proceedings of the 13th National Conference with International Participation (ELECTRONICA), Sofia, Bulgaria, 19–20 May 2022. [Google Scholar]
- Dankov, D.; Marinov, P. Study of Power GaN MOSFET Gate Drivers. In Proceedings of the 13th National Conference with International Participation (ELECTRONICA), Sofia, Bulgaria, 19–20 May 2022. [Google Scholar]
- Grigorova, T.; Vuchev, A. A Study of a Phase-Shifted Full-Bridge LLC Resonant Converter Operating in Continuous Conduction Mode with ZVS. In Proceedings of the 13th National Conference with International Participation (ELECTRONICA), Sofia, Bulgaria, 19–20 May 2022. [Google Scholar]
- Lidow, A. The Path Forward for GaN Power Devices. In Proceedings of the 2020 IEEE Workshop on Wide Bandgap Power Devices and Applications in Asia (WiPDA Asia), Suita, Japan, 23–25 September 2020; pp. 1–3. [Google Scholar]
- Zeng, J.; Zhang, G.; Yu, S.S.; Zhang, B.; Zhang, Y. LLC resonant converter topologies and industrial applications—A review. Chin. J. Electr. Eng. 2020, 6, 73–84. [Google Scholar] [CrossRef]
- Zhou, K.; Wang, X.; Yang, Q. Research on the performance of LLC resonant converter considering the influence of parasitic parameters. In Proceedings of the IEEE Sustainable Power and Energy Conference (iSPEC), Chengdu, China, 23–25 November 2020. [Google Scholar]
- Madzharov, N.; Iliev, D. Wireless Power Transfer System with Four Degrees of Freedom. In Proceedings of the 2022 57th International Scientific Conference on Information, Communication and Energy Systems and Technologies (ICEST), Ohrid, North Macedonia, 16–18 June 2022; pp. 1–4. [Google Scholar]
- Sapundzhi, F. Study of the Effect of the Energy Produced from a Grid-Connected Rooftop Solar PV System for Small Households. Int. J. Online Biomed. Eng. 2022, 18, 147–154. [Google Scholar] [CrossRef]
- Sapundzhi, F.; Baeva, S.; Lazarova, M.; Ivanova, L. An analysis of seasonal fluctuations and forecasting of some production capacities generated by photovoltaic power system. In Proceedings of the 48th International Conference “Applications of Mathematics in Engineering and Economics”, Sofia, Bulgaria, 7–13 June 2022. [Google Scholar]
- Kishkin, K.; Arnaudov, D.; Penev, D. Algorithm for Charging a Supercapacitor Energy Storage System. In Proceedings of the 43rd International Spring Seminar on Electronics Technology (ISSE), Demanovska Valley, Slovakia, 14–15 May 2020. [Google Scholar]
- Semsar, S.; Luo, Z.; Nie, S.; Lehn, P.W. Integrated Wireless Charging Receiver for Electric Vehicles with Dual Inverter Drives. IEEE Trans. Power Electron. 2024, 39, 1802–1814. [Google Scholar] [CrossRef]
- Zhang, Z.; Ding, L.; Hou, A.; Bao, W. A Novel Control Strategy of Wind-Energy Storage Integrated System to Suppress Wind Power Fluctuation. In Proceedings of the IEEE International Conference on Advanced Power System Automation and Protection (APAP), Xuchang, China, 8–12 October 2023. [Google Scholar]
- Milczarek, A.; Martinez-Caballero, L. Control Strategy of Hybrid Energy Storage System for High-Dynamic Load Changes. In Proceedings of the IEEE 17th International Conference on Compatibility, Power Electronics and Power Engineering (CPE-POWERENG), Tallinn, Estonia, 14–16 June 2023. [Google Scholar]
- Deng, Q.; Qiu, D.; Xie, Z.; Zhang, B.; Chen, Y. Online SOC Estimation of Supercapacitor Energy Storage System Based on Fractional-Order Model. IEEE Trans. Instrum. Meas. 2023, 72, 1–10. [Google Scholar] [CrossRef]
- Cui, Y. Regenerative Braking System of FSAE Racing Car Based on Simulink. In Proceedings of the 3rd International Conference on Energy, Power and Electrical Engineering (EPEE), Wuhan, China, 15–17 September 2023. [Google Scholar]
- Damatopoulou, T.; Angelopoulos, S.; Christodoulou, C.; Gonos, I.; Kladas, A.; Hristoforou, E. Magnetic Shielding for Electric Car Power Cables. IEEE Trans. Magn. 2023, 59, 1–7. [Google Scholar] [CrossRef]
- Hamednia, A.; Hanson, V.; Zhao, J.; Murgovski, N.; Forsman, J.; Pourabdollah, M.; Larsson, V.; Fredriksson, J. Charge Planning and Thermal Management of Battery Electric Vehicles. IEEE Trans. Veh. Technol. 2023, 72, 14141–14154. [Google Scholar] [CrossRef]
- Jia, Z.; Li, J.; Zhang, X.-P.; Zhang, R. Review on Optimization of Forecasting and Coordination Strategies for Electric Vehicle Charging. J. Mod. Power Syst. Clean Energy 2023, 11, 389–400. [Google Scholar] [CrossRef]
- Alasali, F.; AlMajali, A.; Abudayyeh, M.; Aldeiri, B.; El-Naily, N.; Zarour, E. Enhancing Cyber-Physical Threat Assessment in Power Distribution Networks. In Proceedings of the 11th International Conference on ENERGY and ENVIRONMENT (CIEM), Bucharest, Romania, 26–27 October 2023. [Google Scholar]
- Jambi, J.R.A.; Wong, W.K.; Juwono, F.H.; Motalebi, F. Smart Energy Meter Implementation: Security Challenges and Opportunities. In Proceedings of the 2023 International Conference on Digital Applications, Transformation & Economy (ICDATE), Miri, Sarawak, Malaysia, 14–16 July 2023. [Google Scholar]
- Keller, J.; Paul, S.; Hutto, K.; Grijalva, S.; Mooney, V.J. Developing Simulation Capabilities for Supply Chain Cybersecurity of the Electricity Grid. In Proceedings of the IEEE PES Innovative Smart Grid Technologies Latin America (ISGT-LA), San Juan, PR, USA, 6–9 November 2023. [Google Scholar]
- Elrawy, M.F.; Tekki, E.; Hadjidemetriou, L.; Laoudias, C.; Michael, M.K. Protection and Communication Model of Intelligent Electronic Devices to Investigate Security Threats. In Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT), Washington, DC, USA, 16–19 January 2023. [Google Scholar]
- Fu, R.; Lichtenwalner, M.E.; Johnson, T.J. A Review of Cybersecurity in Grid-Connected Power Electronics Converters: Vulnerabilities, Countermeasures, and Testbeds. IEEE Access 2023, 11, 113543–113559. [Google Scholar] [CrossRef]
- Hu, D.; Dong, Y.; Wang, J.; Shi, D. Detection of False Data Injection Attacks in Smart Grids Under Power Fluctuation Uncertainty Based on Deep Learning. In Proceedings of the International Conference on Power System Technology (PowerCon), Jinan, China, 21–22 September 2023. [Google Scholar]
- Ahn, B.; Kim, T.; Ahmad, S.; Mazumder, S.K.; Johnson, J.; Mantooth, H.A.; Farnell, C. An Overview of Cyber-Resilient Smart Inverters based on Practical Attack Models. IEEE Trans. Power Electron. 2023, 39, 4657–4673. [Google Scholar] [CrossRef]
- Ryan, J.T.; Mehrasa, M.; Selvaraj, D.F. Supervised Learning for DC-Link Protection of Dual-Active Bridge Converter against Cyber-Attacks. In Proceedings of the North American Power Symposium (NAPS), Asheville, NC, USA, 15–17 October 2023. [Google Scholar]
- Ye, J.; Guo, L.; Yang, B.; Li, F.; Du, L.; Guan, L.; Song, W. Cyber–Physical Security of Powertrain Systems in Modern Electric Vehicles: Vulnerabilities, Challenges, and Future Visions. IEEE J. Emerg. Sel. Top. Power Electron. 2021, 9, 4639–4657. [Google Scholar] [CrossRef]
- Amin, M.; El-Sousy, F.F.; Aziz, G.A.A.; Gaber, K.; Mohammed, O.A. CPS Attacks Mitigation Approaches on Power Electronic Systems with Security Challenges for Smart Grid Applications: A Review. IEEE Access 2021, 9, 38571–38601. [Google Scholar] [CrossRef]
- Dobrea, M.A.; Vasluianu, M.; Neculoiu, G.; Bichiu, S. Data Security in Smart Grid. In Proceedings of the 2020 12th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), Bucharest, Romania, 25–27 June 2020; pp. 1–6. [Google Scholar]
- Li, F.; Li, Q.; Zhang, J.; Kou, J.; Ye, J.; Song, W.; Mantooth, H.A. Detection and Diagnosis of Data Integrity Attacks in Solar Farms Based on Multilayer Long Short-Term Memory Network. IEEE Trans. Power Electron. 2021, 36, 2495–2498. [Google Scholar] [CrossRef]
- Bogosyan, S.; Gokasan, M. Novel Strategies for Security-hardened BMS for Extremely Fast Charging of BEVs. In Proceedings of the 2020 IEEE 23rd International Conference on Intelligent Transportation Systems (ITSC), Rhodes, Greece, 20–23 September 2020; pp. 1–7. [Google Scholar]
- Guzmán, R.E.P.; Rivera, M.; Wheeler, P.; Mirzaeva, G.; Espinosa, E.; Rohten, J.A. Microgrid Power Sharing Framework for Software Defined Networking and Cybersecurity Analysis. IEEE Access 2022, 10, 111389–111405. [Google Scholar] [CrossRef]
- Kharlamova, N.; Hashemi, S.; Træholt, C. The Cyber Security of Battery Energy Storage Systems and Adoption of Data-driven Methods. In Proceedings of the 2020 IEEE Third International Conference on Artificial Intelligence and Knowledge Engineering (AIKE), Laguna Hills, CA, USA, 9–13 December 2020; pp. 188–192. [Google Scholar]
- De Dutta, S.; Prasad, R. Cybersecurity for Microgrid. In Proceedings of the 2020 23rd International Symposium on Wireless Personal Multimedia Communications (WPMC), Okayama, Japan, 19–26 October 2020; pp. 1–5. [Google Scholar]
- Xu, S.; Xia, Y.; Shen, H.L. Analysis of Malware-Induced Cyber Attacks in Cyber-Physical Power Systems. IEEE Trans. Circuits Syst. II Express Briefs 2020, 67, 3482–3486. [Google Scholar] [CrossRef]
- Tu, H.; Xia, Y.; Tse, C.; Chen, X. A Hybrid Cyber Attack Model for Cyber-Physical Power Systems. IEEE Access 2020, 8, 114876–114883. [Google Scholar] [CrossRef]
- Hosseinzadeh, M.; Sinopoli, B. Active Attack Detection and Control in Constrained Cyber-Physical Systems Under Prevented Actuation Attack. In Proceedings of the 2021 American Control Conference (ACC), New Orleans, LA, USA, 25–28 May 2021; pp. 3242–3247. [Google Scholar]
- Bergs, C.J.; Bruiners, J.; Fakier, F.; Stofile, L. Cyber Security and Wind Energy: A Fault-Tolerance Analysis of DDoS Attacks. In Proceedings of the 16th International Conference on Cyber Warfare and Cecurity (ICCWS 2021), Tennessee Tech, Cookeville, ST, USA, 25–26 February 2021; pp. 443–453. [Google Scholar]
- Tuyen, N.D.; Quan, N.; Linh, V.; Van Tuyen, V.; Fujita, G. A Comprehensive Review of Cybersecurity in Inverter-Based Smart Power System Amid the Boom of Renewable Energy. IEEE Access 2022, 10, 35846–35875. [Google Scholar] [CrossRef]
- Kim, T.; Ochoa, J.; Faika, T.; Mantooth, H.A.; Di, J.; Li, Q.; Lee, Y. An Overview of Cyber-Physical Security of Battery Management Systems and Adoption of Blockchain Technology. IEEE J. Emerg. Sel. Top. Power Electron. 2022, 10, 1270–1281. [Google Scholar] [CrossRef]
- Gumrukcu, E.; Arsalan, A.; Muriithi, G.; Joglekar, C.; Aboulebdeh, A.; Zehir, M.A. Impact of Cyber-attacks on EV Charging Coordination: The Case of Single Point of Failure. In Proceedings of the 2022 4th Global Power, Energy and Communication Conference (GPECOM), Nevsehir, Turkey, 14–17 June 2022; pp. 506–511. [Google Scholar]
- Arsoon, M.M.; Moghaddas-Tafreshi, S.M. Modeling Data Intrusion Attacks on Energy Storage for Vulnerability Assessment of Smart Microgrid Operation. In Proceedings of the 2021 11th Smart Grid Conference (SGC), Tabriz, Iran, 7–9 December 2021; pp. 1–5. [Google Scholar]
- Pasetti, M.; Ferrari, P.; Bellagente, P.; Sisinni, E.; de Sá, A.O.; do Prado, C.B. Artificial Neural Network-Based Stealth Attack on Battery Energy Storage Systems. IEEE Trans. Smart Grid 2021, 12, 5310–5321. [Google Scholar] [CrossRef]
- Kali Linux Documentation. Available online: https://www.kali.org/docs/ (accessed on 27 January 2024).
- Capsa Free Network Analyzer. Available online: https://www.colasoft.com/capsa-free/ (accessed on 27 January 2024).
- Nmap Network Scanning. The Official Nmap Project Guide to Network Discovery and Security Scanning. Available online: https://nmap.org/book/toc.html (accessed on 27 January 2024).
- hping3. Available online: https://www.kali.org/tools/hping3/ (accessed on 27 January 2024).
- Wireshark User Guide. Available online: https://www.wireshark.org/docs/wsug_html_chunked/ (accessed on 27 January 2024).
- Burp Suite Documentation. Available online: https://portswigger.net/burp/documentation/desktop (accessed on 27 January 2024).
- Colasoft Ping Tool. Available online: https://www.colasoft.com/ping_tool/ (accessed on 27 January 2024).
- Marinov, M.B.; Nikolov, N.; Dimitrov, S.; Todorov, T.; Stoyanova, Y.; Nikolov, G.T. Linear Interval Approximation for Smart Sensors and IoT Devices. Sensors 2022, 22, 949. [Google Scholar] [CrossRef]
- Marinov, M.B.; Nikolov, N.; Dimitrov, S.; Ganev, B.; Nikolov, G.T.; Stoyanova, Y.; Todorov, T.; Kochev, L. Linear Interval Approximation of Sensor Characteristics with Inflection Points. Sensors 2023, 23, 2933. [Google Scholar] [CrossRef]
- Nmap Scripts. Available online: https://nmap.org/book/nse-usage.html#nse-categories (accessed on 27 January 2024).
- Ivanov, I.; Andreev, K.; Vetova, S.; Arnaudov, R. Cryptographic algorithm for protection of communication in drones control. J. Reason.-Based Intell. Syst. 2021, 13, 32–38. [Google Scholar] [CrossRef]
- Cherneva, G.P.; Hristova, V.I. Evaluation of FHSSS Stability against Intentional Disturbances. In Proceedings of the 28th National Conference with International Participation (TELECOM), Sofia, Bulgaria, 29–30 October 2020. [Google Scholar]
- Dimitrov, W.; Spasov, K.; Trenchev, I.; Syarova, S. Complexity Assessment of Research Space for Smart City Cybersecurity*. IFAC-PapersOnLine 2022, 55, 1–6. [Google Scholar] [CrossRef]
- Jekov, B.; Dimitrov, W.; Panayotova, G.S.; Kovatcheva, E. Intelligent protection of Internet of things systems. In Proceedings of the 2022 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), Maldives, Maldives, 16–18 November 2022. [Google Scholar]
- Popov, G.; Popova, A. Application of System Diversity for Increasing Security and Reliability of Distributed Systems. In Proceedings of the 2022 XXXI International Scientific Conference Electronics (ET), Sozopol, Bulgaria, 13–15 September 2022; pp. 1–4. [Google Scholar]
- TCP SYN Flood Attack. Available online: https://www.imperva.com/learn/ddos/syn-flood/ (accessed on 8 March 2024).
- What Is an ACK Flood DDoS Attack? Available online: https://www.cloudflare.com/learning/ddos/what-is-an-ack-flood/ (accessed on 8 March 2024).
- RST Flood. Available online: https://kb.mazebolt.com/knowledgebase/rst-flood/ (accessed on 8 March 2024).
- FIN Flood. Available online: https://kb.mazebolt.com/knowledgebase/fin-flood/ (accessed on 8 March 2024).
- ACK–PUSH Flooding. Available online: https://kb.mazebolt.com/knowledgebase/ack-psh-flood/ (accessed on 8 March 2024).
- TCP RFC. Available online: https://www.ietf.org/rfc/rfc793.txt (accessed on 27 January 2024).
- URG Flood. Available online: https://kb.mazebolt.com/knowledgebase/urg-flood/ (accessed on 8 March 2024).
Abbreviation | Definition | Abbreviation | Definition |
---|---|---|---|
TCP | Transmission Control Protocol | DoS | Denial of Service |
PED | Power Electronic Device | PDU | Power Distribution Unit |
IP | Internet Protocol | DC | Direct Current |
Wi-Fi | Wireless Fidelity | RTD | Round Trip Delay |
HTTP | Hyper Text Transfer Protocol | ICMP | Internet Control Message Protocol |
VLAN | Virtual Local Area Networks | VPN | Virtual Private Network |
HTML | Hyper Text Markup Language |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Nedyalkov, I. Study the Level of Network Security and Penetration Tests on Power Electronic Device. Computers 2024, 13, 81. https://doi.org/10.3390/computers13030081
Nedyalkov I. Study the Level of Network Security and Penetration Tests on Power Electronic Device. Computers. 2024; 13(3):81. https://doi.org/10.3390/computers13030081
Chicago/Turabian StyleNedyalkov, Ivan. 2024. "Study the Level of Network Security and Penetration Tests on Power Electronic Device" Computers 13, no. 3: 81. https://doi.org/10.3390/computers13030081
APA StyleNedyalkov, I. (2024). Study the Level of Network Security and Penetration Tests on Power Electronic Device. Computers, 13(3), 81. https://doi.org/10.3390/computers13030081