270
views
0
recommends
+1 Recommend
1 collections
    8
    shares
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Cyber security analysis of Web-of-Cells energy architectures

      proceedings-article

      1 , 1 , 2

      5th International Symposium for ICS & SCADA Cyber Security Research 2018 (ICS-CSR 2018)

      ICS & SCADA Cyber Security Research

      29 - 30 August 2018

      Smart Grids, ICT Architectures, Cyber Security Assessment, Control Strategies, Distributed Energy Resources, We-of-Cells

      Bookmark

            Content

            Author and article information

            Contributors
            Conference
            August 2018
            August 2018
            : 41-50
            Affiliations
            [1 ]RSE SpA Italy
            [2 ]KTH Sweden
            Article
            10.14236/ewic/ICS2018.5
            d501ed4d-c3a4-4690-ae7e-2333e492efdc
            © Terruggia et al. Published by BCS Learning and Development Ltd. Proceedings of ICS & SCADA 2018

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            5th International Symposium for ICS & SCADA Cyber Security Research 2018
            ICS-CSR 2018
            5
            University of Hamburg, Germany
            29 - 30 August 2018
            Electronic Workshops in Computing (eWiC)
            ICS & SCADA Cyber Security Research
            Product
            Product Information: 1477-9358BCS Learning & Development
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            REFERENCES

            1. ELECTRA IRP EU project available at http://www.electrairp.eu

            2. SecuriCAD Cyber Thread Modeling and Risk Management – securiCAD by foreseeti More information available and community edition of the tool at: https://www.foreseeti.com/

            3. “Analyzing the effectiveness of attack countermeasures in a SCADA system”, In: Proceedings - 2017 2nd Workshop on Cyber-Physical Security and Resilience in Smart Grids, CPSR-SG 2017 Association for Computing Machinery, Inc 2017 73 78

            4. : “Smart Energy Grid - Coordination Group Cyber Security & Privacy (SEG-CG/CSP Report)”, CEN-CENELEC-ETSI - CCMC 1 1 69 ftp://ftp.cencenelec.eu/EN/EuropeanStandardization/Fields/EnergySustainability/SmartGrid/CyberSecurity-Privacy-Report.pdf

            5. “The grid of the future and the need for a decentralized control architecture: the Web-of-Cells concept” CIRED 2017 24th International Conference on Electricity Distribution Glasgow 12 15 June 2017

            6. “Foundations of Attack-Defense Trees”, In Formal Aspects of Security and Trust (FAST’10) 6561 of LNCS 80 95 Springer 2011

            7. 2012 “A framework and theory for cyber security assessments”, PhD Thesis, Industrial information and control systems Royal Institute of Technology Stockholm, Sweden

            8. ELECTRA Deliverable 5.3 “The Web-of-Cells control architecture for operating future power systems”, http://www.electrairp.eu

            9. ELECTRA Deliverable 4.4 “ELECTRA Web-Of- Cells Cyber Security Analysis Report”, http://www.electrairp.eu

            10. “Time-to-compromise model for cyber risk reduction estimation”, Quality of Protection Workshop, ESORICS 2006

            11. “Shortest paths algorithms: Theory and experimental evaluation” Mathematical Programming 1996 73 2 129 174

            12. “Quantitative Evaluation of Attack/Defense Scenarios through Decision Network Modelling and Analysis”, Proc. IEEE Intern. Carnhan Conference on Security Technology (ICCST 2014) 432 437 13 16 Oct 2014

            13. “Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains”, 6th Annual International Conference on Information Warfare and Security Washington, DC 2011

            14. 2004 The use of attack trees in assessing vulnerabilities in SCADA systems Proceedings of the International Infrastructure Survivability Workshop Lisbon

            15. 2010 Cybersecurity for critical infrastructures: Attack and defense modeling IEEE Trans. Syst. Man Cybernet. Part A 40 2010 853 65 4

            16. Attack defense trees The Journal of Logic and Computation 2012

            17. Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees Proc. 42nd Int. Conf. on Dependable Systems and Networks Boston, MA 2012

            18. Cyber security risks assessment with bayesian defense graphs and architectural models Proc. 42nd HICSS ’09 1 10 2009

            19. SCADA system vulnerabilities to cyber attack 2012 Electric Energy online.com Available at http://www.electricenergyonline.com/show_article.php?mag=&article=181

            20. Critical infrastructures at risk: a need for a new conceptual approach and extended analytical tools Reliab. Eng. Syst. Safety 93 2008 1781 1787

            21. B. Attack trees Dr. Dobb Journal of Software Tools 24 12 1999 21 29

            22. A methodology for qualitative/quantitative analysis of weighted attack trees IFAC Proceedings Volumes 46 22 2013 133 138

            23. , Weighted attack trees for the cybersecurity analysis of SCADA systems 3rd International Defense and Homeland Security Simulation Workshop, DHSS 2013, Held at the International Multidisciplinary Modeling and Simulation Multiconference I3M 2013 33 40

            24. US-CERT https://www.us-cert.gov/ncas/alerts/TA18-074A

            25. 2011 “Modelling of cyber attacks for assessing smart grid security”, Proceedings Cigré D2 2011 Colloquium Buenos Aires 19-20 October 2011

            26. E-ISAC SANS-ICS ICS Defense Use Case No. 6: Modular ICS Malware August 2017

            Comments

            Comment on this article