Blog

Introducing Power IOCs: Beyond Network Signatures

Key Takeaways

  • Power IOCs are a new category of threat detection specific to operational technology and energy systems
  • Physics-based detection cannot be evaded by encrypted tunnels or credential theft
  • Sub-second detection latency compared to minutes or hours with traditional IOCs
  • DERSec Sentry is the first platform to operationalize Power IOCs for DER security

A New Category of Threat Detection

In traditional cybersecurity, Indicators of Compromise (IOCs) are artifacts — IP addresses, file hashes, domain names — that signal malicious activity on a network. They have served enterprise IT well for decades. But in the world of operational technology (OT) and distributed energy resources, traditional IOCs fall short.

The fundamental problem: attackers targeting DER infrastructure don’t need to use malware, known-bad IPs, or suspicious domains. They can compromise a solar inverter by sending perfectly valid IEEE 2030.5 commands that happen to destabilize the grid. The commands look legitimate. The network traffic looks clean. Traditional IOCs see nothing.

<1s
Detection Latency
93%
Fewer False Positives
Zero
Evasion via Encryption

What Makes Power IOCs Different

Power Indicators of Compromise (Power IOCs) represent a fundamentally different approach. Instead of looking at network artifacts, Power IOCs analyze the physics of the energy system itself.

Comparison table showing differences between Traditional IOCs and Power IOCs across six dimensions
Figure 1: Traditional IOCs vs Power IOCs — a paradigm shift in threat detection

Consider a compromised solar inverter. An attacker commands it to inject reactive power at maximum capacity during peak demand. From a network perspective, the command is properly authenticated, encrypted with TLS, and follows the IEEE 2030.5 specification exactly. No traditional IOC will flag it.

But the physics tell a different story. The power factor drops unexpectedly. The voltage at the point of interconnection deviates from the expected profile. The reactive power output doesn’t match the grid operator’s dispatch signal. These are Power IOCs — physical anomalies that reveal cyber-physical attacks.

You cannot fake physics. An attacker can steal credentials, encrypt their traffic, and use zero-day exploits. But they cannot change the laws of thermodynamics or make electrons behave in ways that violate power system equations.

The Detection Pipeline

DERSec Sentry implements a five-stage pipeline for Power IOC detection, from raw telemetry to actionable alerts:

Power IOC Detection Pipeline showing five stages from DER Telemetry to Alert and Response
Figure 2: The Power IOC detection pipeline processes telemetry in real-time

How the Pipeline Works

Stage 1 — DER Telemetry: Raw measurements from inverters, batteries, and EV chargers (voltage, current, power factor, frequency). Stage 2 — Physics Model: Expected behavior computed from grid conditions, weather data, and dispatch signals. Stage 3 — Anomaly Detection: Statistical comparison of observed vs. expected behavior. Stage 4 — Threat Classification: Machine learning categorizes anomalies as benign, suspicious, or hostile. Stage 5 — Alert & Response: Actionable intelligence delivered to SOC with recommended containment actions.

Categories of Power IOCs

DERSec Sentry monitors for several categories of Power IOCs across the DER fleet:

  • Power Factor Anomalies — Unexpected reactive power injection or absorption
  • Voltage Deviations — Voltage excursions at the point of interconnection
  • Frequency Response Violations — Devices not following frequency-watt response curves
  • Ramp Rate Anomalies — Power output changes faster than physics or firmware allow
  • Dispatch Divergence — Device behavior deviating from grid operator commands
  • Telemetry Spoofing — Reported values that violate conservation of energy equations

Critical Consideration

Power IOCs are not a replacement for traditional network security. They are a complementary layer that detects attacks invisible to IT-centric tools. A comprehensive DER security strategy requires both network monitoring and physics-based detection.

Getting Started

Power IOCs are built into every DERSec Sentry deployment. No additional configuration is required — the physics models are automatically calibrated during the initial learning period.

Learn more about DERSec Sentry and how Power IOCs can protect your DER fleet from cyber-physical attacks.

Download Document