1,338
views
0
recommends
+1 Recommend
1 collections
    4
    shares
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Improving SCADA security of a local process with a power grid model

      proceedings-article

      , ,

      4th International Symposium for ICS & SCADA Cyber Security Research 2016 (ICS-CSR)

      Cyber Security Research

      23 - 25 August 2016

      SCADA security, IDS, intrusion detection, process-awareness

      Bookmark

            Abstract

            Security of networks controlling smart grids is an important subject. The shift of the power grid towards a smart grid results in more distributed control functions, while intrusion detection of the control network mostly remains centrally based. Moreover, existing local (host-based) intrusion detection systems do not yet take into account the physical process itself. Therefore, this work proposes a local intrusion detection system, which considers the outcome of control commands on the physical process. Using two sce

            Content

            Author and article information

            Contributors
            Conference
            August 2016
            August 2016
            : 114-123
            Affiliations
            [0001]University of Twente, the Netherlands
            [0002]University of Twente, the Netherlands

            University of Münster, Germany
            Article
            10.14236/ewic/ICS2016.13
            eb471a06-7c52-4549-84b9-79b0350df48c
            © Chromik et al. Published by BCS Learning & Development Ltd. Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            4th International Symposium for ICS & SCADA Cyber Security Research 2016
            ICS-CSR
            4
            Queen’s Belfast University, UK
            23 - 25 August 2016
            Electronic Workshops in Computing (eWiC)
            Cyber Security Research
            Product
            Product Information: 1477-9358BCS Learning & Development
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            REFERENCES

            1. et al 2013 Flow whitelisting in scada networks International journal of critical infrastructure protection 6 3 150 158

            2. et al 2003 Safeguarding SCADA systems with anomaly detection Computer Network Security Springer 171 182

            3. 2011 Integration of distributed generation in the power system 80 John Wiley & Sons

            4. CENELEC 1988 Harmonisation Document: Nominal voltage for low voltage public electricity supply systems HD 472 S1

            5. et al 2016 What’s under the hood? Improving SCADA security with process awareness Joint Workshop on Cyber-Physical Security and Resilience in SmartGrids (CPSR-SG2016)

            6. EN 50160 2010 NEN-EN 50160:2010 Voltage characteristics of electricity supplied by public distribution networks

            7. et al 2016 SGsim: Co-simulation Framework for ICT-Enabled Power Distribution Grids Measurement, Modelling and Evaluation of Dependable Computer and Communication Systems 9629 60 76

            8. ICS-CERT 2016 25 Feb Alert (IR-ALERT-H-16-056-01) Cyber-Attack Against Ukrainian Critical Infrastructure ext-link-type="uri" xlink: href="https://ics-cert.us-cert.gov/alerts/IR-ALERT-H-16-056-01">https://ics-cert.us-cert.gov/alerts/IR-ALERT-H-16-056-01

            9. IEA 2011 Technology Roadmap: Smart Grids. International Energy Agency ext-link-type="uri" xlink: href="https://www.iea.org/publications/freepublications/">https://www.iea.org/publications/freepublications/publication/smartgrids_roadmap.pdf

            10. IEC 2015 International Electrotechnical Commission (IEC) IEC 62443 Industrial communication networks - Network and system security

            11. et al 2014 On detection of cyber attacks against voltage control in distribution power grids SmartGrid Communications (SmartGrid-Comm), 2014 IEEE International Conference on 842 847

            12. 2016 Contextual anomaly detection for cyber-physicalsecurity in Smart Grids based on an artificial neuralnetwork model Joint Workshop on Cyber-Physical Security and Resilience in SmartGrids (CPSR-SG2016)

            13. et al 2011 False data injection attacks against state estimation in electric power grids ACM Transactions on Information and System Security (TISSEC) 14 1 13

            14. 2013 European Union Agency for Network and Information Security (ENISA): Smart Grid Threat Landscape and Good Practice Guide

            15. et al 2013 Effect of intrusion detection and response on reliability of cyber physical systems Reliability, IEEE Transactions on, 62 1 199 210

            16. 2014 Distributed detection of cyber attacks and faults for power systems IFAC Proceedings Volumes 47 3 11932 11937

            17. NIST 2010 Guidelines for Smart Grid Cyber Security Technical Report 7628 National Institute of Standards and Technology (NIST) Gaithersburg, MD, USA

            18. et al 2011 Distributed fault detection for interconnected second-order systems Automatica 47 12 2757 2764

            19. et al 2011 NIST guide to industrial control systems (ICS) Security, Second Public Draft NIST Special Publication 800 82

            20. et al 2010 A cyber security study of a SCADA energy management system: Stealthy deception attacks on the state estimator arXiv preprint arXiv: 1011.1828.

            21. et al 2014 Distributed fault detection and isolation resilient to network model uncertainties IEEE transactions on cybernetics, 44 11 2024 2037

            22. et al 2015 Jan D2.3 Reference Taxonomy on Industrial Control Systems Networks for Utilities Technical report. Technical Report, PREEMPTIVE

            23. 2011 Myth or reality – does the aurora vulnerability pose a risk to my generator? Protective Relay Engineers, 2011 64th Annual Conference for 130 136

            24. et al 2011 A taxonomy of cyber attacks on SCADA systems Internet of things (iThings/CPSCom), 2011 international conference on and 4th international conference on cyber, physical and social computing 380 388

            Comments

            Comment on this article