Blog
About

139
views
0
recommends
+1 Recommend
1 collections
    8
    shares
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Cyber security analysis of Web-of-Cells energy architectures

      1 , 1 , 2

      5th International Symposium for ICS & SCADA Cyber Security Research 2018 (ICS-CSR 2018)

      ICS & SCADA Cyber Security Research

      29 - 30 August 2018

      Smart Grids, ICT Architectures, Cyber Security Assessment, Control Strategies, Distributed Energy Resources, We-of-Cells

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          The evolution of the power grid toward a distributed architecture requires rethinking of the traditional control strategies. From a hierarchical structure the future grid moves on to a decentralized organization where the Distributed Energy Resources are spread over the whole infrastructure. The control strategies need to implement new functionalities where the ICT (Information and Communication Technology) components represent essential assets and the cyber security issues have to be addressed very carefully. This paper presents a methodology for the cyber security analysis of an ICT architecture implementing the Web-of-Cells (WoC) concept for the control of the future power grid as proposed by the ELECTRA EU project. Starting from a WoC architecture, a realistic Cell network topology is modelled by the securiCAD tool. The model comprises cells where the main ICT assets (hosts, network nodes, programs, services and data flows) contain vulnerabilities allowing that possible attack steps are deployed to perform a cyber attack. To contrast the attack process, specific cyber security measures can be included in the model. The cyber security analysis is performed by means of the securiCAD tool implementing the proposed methodology for the evaluation of the attack graphs and the computation of the TTC (Time To Compromise) indicator. TTC represents the expected time an attacker would take to compromise every single asset in the modelled ICT infrastructure. The methodology allows to perform a sensitivity analysis estimating the efficacy of the applied mitigation measures by comparing the TTC values in the different model setups. The cyber security analysis described in this paper addresses the cyber threat assessment of a sample multi phase attack process by evaluating the possible attack paths and obtaining the TTC values for the attack target assets

          Related collections

          Most cited references 31

          • Record: found
          • Abstract: not found
          • Article: not found

          Shortest paths algorithms: Theory and experimental evaluation

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Cybersecurity for Critical Infrastructures: Attack and Defense Modeling

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Time-to-compromise model for cyber risk reduction estimation

                Bookmark

                Author and article information

                Contributors
                Conference
                August 2018
                August 2018
                : 41-50
                Affiliations
                [1 ]RSE SpA Italy
                [2 ]KTH Sweden
                Article
                10.14236/ewic/ICS2018.5
                © Terruggia et al. Published by BCS Learning and Development Ltd. Proceedings of ICS & SCADA 2018

                This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

                5th International Symposium for ICS & SCADA Cyber Security Research 2018
                ICS-CSR 2018
                5
                University of Hamburg, Germany
                29 - 30 August 2018
                Electronic Workshops in Computing (eWiC)
                ICS & SCADA Cyber Security Research
                Product
                Product Information: 1477-9358BCS Learning & Development
                Self URI (journal page): https://ewic.bcs.org/
                Categories
                Electronic Workshops in Computing

                Comments

                Comment on this article