The VIKING Project: An Initiative on Resilient Control of Power Networks
|
|
|
- Roland Harmon
- 10 years ago
- Views:
Transcription
1 The VIKING Project: An Initiative on Resilient Control of Power Networks Annarita Giani, Shankar Sastry Department of Electrical Engineering and Computer Sciences University of California at Berkeley Berkeley, CA USA {agiani, Karl H. Johansson, Henrik Sandberg School of Electrical Engineering Royal Institute of Technology (KTH) Stockholm, Sweden {kallej, Abstract This paper presents the work on resilient and secure power transmission and distribution developed within the VIKING (Vital Infrastructure, networks, INformation and control system ManaGement) project. VIKING receives funding from the European Community s Seventh Framework Program. We will present the consortium, the motivation behind this research, the main objective of the project together with the current status. I. INTRODUCTION AND MOTIVATION Supervisory control and data acquisition (SCADA) networks contain computers and applications that perform key functions in providing essential services. In this project we concentrate on SCADA networks for power systems. SCADA systems are continuously becoming more advanced and complex. Simply put, more effective infrastructure operation requires more accurate process models, which in turn require more advanced functionality and elaborate data collection and processing in the control systems. The result is increased internal technical complexity of the control systems. In addition to the external infrastructure operational requirements, the technical evolution of the systems is also driven by the technical evolution in IT in general; new services and solutions are constantly developed and existing ones are enhanced. This further increases the complexity of the overall systems. However, the increasing internal complexity of the systems is not the most challenging trend today. Instead, it is the fact that SCADA systems are no longer isolated but that they are extensively networked with other information systems of the company that forms the greatest challenge. These networks and corporate IT networks are often connected to enable engineers to monitor and control the system from points on the corporate network. Also corporate decision makers can obtain instant access to critical data about the system status. Examples of important security areas in modern integrated SCADA systems are for instance: communication networks to the process; control centers and their computers; connections for software maintenance and remote diagnostic from system vendors; communication to other control centers; the office LANs and their systems; firewalls separating different networks, including the Internet, see Figure 1. In VIKING we propose to address this challenge by developing cyber-physical models that specifically address the interaction between the (cyber-) IT systems and the (physical) power transmission and distribution systems, see Figure 1. We propose to use methods from the area of hybrid systems for this task. Hybrid systems [1] have been a topic of intense research for the past decade, in the boundary between computer science and control engineering. They provide a unified framework for jointly modeling continuous systems (like the power transmission and distribution processes) and discrete systems (like the SCADA systems). Our team is in a unique position to apply this methodology to the power transmission and distribution systems, since it brings together teams that have pioneered developments in the area of hybrid systems with teams that have extensive experience on the modeling of the physical and the IT systems themselves. The approach of VIKING is to enhance data integrity, reliability and robustness of SCADA systems through the development and application of such a rigorous modeling and analysis framework. This type of holistic approach with hybrid models has up to now not been used for modeling these types of system with the goal of examining security aspects of the complete and integrated system. The aim of VIKING is to advance the state of art from examining and testing existing systems for security problems to model-based analysis and prediction of the security state of SCADA systems. We are aware of other efforts in the same field. CRUTIAL (CRitical UTility InfrastracturAL resilience) [2] is a FP6-IST project funded by the European Commission that focus on the interaction between SCADA and power systems. However, their approaches are significantly different from ours. VIKING considers not only vulnerabilities in SCADA and power systems, but also the effects of the exploitation of these vulnerabilities in terms of the effects on electricity users, in terms of extent of potential outages, etc. as well as the costs of these effects. Also we will be employing modelling approaches that differ from CRUTIAL. Although CRUTIAL featured architectural modelling of SCADA systems, VIKING will combine these with probability-based security assessment approaches. VIKING will also explore the potential of cyberphysical modelling frameworks within the frame of SCADA system security. These hybrid system models integrate the
2 Fig. 1. Complex interconnected networks. logics and discrete events of the SCADA system with the continuous dynamics of the physical power transmission and distribution networks in a way that has not been done with previous models. A comprehensive detailed list of the European Electricity Projects can be found in [3]. Also the United States focuses in developing an effective critical infrastructure protection and resiliency plan. Academic organization work with the private sector to ensure that targets are protected against all hazards. TRUST [4] is a NSF project focused on the development of cyber security science and technology that will radically transform the ability of organizations to design, build, and operate trustworthy information systems for the nation s critical infrastructure. It addresses next generation SCADA and other networked embedded systems that control critical physical infrastructures and futuristic infrastructures such as smart buildings and structures (e.g., active-bridges whose structural integrity depends on dynamic control or actuators). At the University of Illinois at Urbana Champaign within the Information Trust Institute there is the TCIP (Trustworthy Cyber Infrastructure for the Power Grid) project [6]. TCIP s research plan is focused on securing the low-level devices, communications, and data systems that make up the power grid, to ensure trustworthy operation during normal conditions, cyber-attacks, and/or power emergencies. National labs concentrate on maintaining and upgrading the security and reliability of the energy infrastructure. Their efforts goes from building testbed used by vendors to test their products [5] to more theoretical challenges such as the analysis of wide-area, large-scale using hybrid systems [7]. II. THE CONSORTIUM Diverse backgrounds are needed to address the various challenges of the project. Industry brings the experience with real working systems while academia contribute with the theoretical work. For this reason the research team consists of representatives from the industry such as vendors, service providers and utilities as well as from academical institutions. The industrial partners are ABB [8], one of the worlds leading engineering companies. E.ON [9], one of the major public utility companies in Europe and the worlds largest investor-owned energy service provider with a target market in Central Europe, the United Kingdom, Northern Europe, and the Midwestern United States. MML Analys and Strategi AB [10], a small consulting firm focusing on management support through process development, decision-making support through mathematical analysis and simulation. Astron Informatics Ltd. [11], a Hungary based company with expertise in the area of power systems, engineering activities related to EMS/SCADA systems (data modeling, database population). The academic partners are KTH, ETH and University System of Maryland Foundation. An important member of the Quality Evaluation Group is the University of California at Berkeley. III. OBJECTIVE The vision of this project is to increase the understanding of vulnerabilities of integrated control systems and their impact on the electric power transmission and distribution system, as well as to devise solutions to eliminate or to mitigate these vulnerabilities. The overall goal of the VIKING project is to make the information and control systems robust against attacks and operational errors. The four strategic objectives are described below. 1) Provide a holistic framework for identification and assessment of vulnerabilities for SCADA systems. The framework should provide computational support for the prediction of system failure impacts and security risks.
3 2) Provide a reference model of potential consequences of misbehaving control systems in the power transmission and distribution network that can be used as a base for evaluating control system design solutions. 3) Develop and demonstrate new technical security and robustness solutions able to meet the specific operational requirements that are posed on control systems for our target area. 4) Increase the awareness of the dependencies and vulnerabilities of cyber-physical systems in the power industry. The security research and development process is cyclic and does not terminate, as new threats and system functions are continuously appearing. So the first step of security requirement analysis should be performed recurrently. The cyberphysical system, composed of the physical power transmission and distribution system and the associated SCADA system, gives rise to a large-scale hybrid model. Based on the requirements and the cyber-physical model, vulnerabilities can be identified. Their security and fault impacts are analyzed and assessed. The vulnerabilities can now be ranked in order to design appropriate protection mechanisms, considering cost and complexity on the one hand and the system performance and robustness on the other. These mechanisms are then evaluated with respect to the security requirements. The security risks and requirements of the improved system might now be reassessed and a new cycle can be started. This cycle is reported in Figure 2. Fig. 2. Cyclic approach to build resilient systems IV. SECURITY ISSUES IN POWER NETWORK CONTROL In Figure 3, a schematic block diagram of a modern power network control system is shown. Remote Terminal Units (RTUs) connected to the substations transmit and receive data from the control center using the SCADA system. The technology and the use of the SCADA systems have evolved quite a lot since the 1970 s when they were introduced. The early systems were mainly used for logging data from the power network. Today a modern system is supported by many Energy Management Systems (EMS) such as automatic generation control (AGC), optimal power flow analysis, and contingency analysis, as is indicated in the figure. With the advent of new sensors such as PMUs (Phasor Measurement Units), so-called Wide-Area Monitoring and Control Systems (WAMS/WAMC) have also been introduced [12]. This introduces yet another layer of control in the modern power network control systems. Even more important for the VIKING project is that the SCADA/EMS systems now are interconnected to office LANs, and through them they are connected to the internet. Hence, today there are more access points to the SCADA/EMS systems, and also more functionality to tamper with. Six possible types of attacks A0-A5 on the power network control system are indicated in Figure 3. The attack A0 is a physical attack on the power network or the SCADA system infrastructure. Such attacks are not considered in the VIKING project. Instead the focus is on cyber attacks. Somewhat arbitrary, we have split the cyber attacks into the categories A1-A5. By A1, A2, A3 we mean cyber attacks on the SCADA system itself. The SCADA system consists of front end computers at the substations and RTUs, a heterogenous communication network consisting of fibre optics, satellite, microwave connections etc., and finally a host computer at the control center ( SCADA master ). Possible attacks here could be Denial of Service (DoS) attacks on the RTUs or manipulation with sensors (A1), deception attacks on the communicated data (A2), or attacks directed to the SCADA master (A3). A deception attack on sent measurements will mainly affect the performance of the state observer, whereas a deception attack on sent commands could open circuit breakers in the power network. These type of attacks are of major interest in the VIKING project. By A4 we mean cyber attacks on the EMS and the state observer at the control center. The state observer estimates the state of the power network using communicated measurements and tries to locate faulty equipment, for example. The EMS systems use the state estimate to either automatically compute control actions or to suggest actions to a human operator. The latter is much more common than the former. In fact, the AGC is the only truly automatic control loop that is regularly being closed using the SCADA system. Its purpose is to regulate the grid frequency of the power network [13]. An attack on the AGC could destabilize the generation control in the power system. Another EMS application is optimal power flow that tells the operator how power flows should be directed to minimize losses. Possible attacks here could be manipulation of the state observer so that it gives a faulty estimate of the system state. The consequences of this could be that power flows are directed in a bad manner, which could have significant financial effects. Naturally, attacks A1-A3 on the SCADA system will also affect the EMS systems, since theses systems are then fed with bad data (deception attacks), or with no data at all (DoS attacks).
4 A3 A1 A2 RTUs SCADA Master. Power Network WAMS/WAMC A5 A0 AGC Optimal Power Flow A4. EMS x PMUs State Observer A1 RTUs SCADA Master Fig. 3. Block diagram of power network, SCADA, EMS, and WAMS/WAMC systems. Remote Terminal Units (RTUs) connected to the substations transmit and receive data from the control center using the SCADA system. At the control center, a state estimate is computed and is used by Energy Management Systems (EMS) to send out commands to the power network. The human figures indicate where a human is needed in the control loop. A0-A5 indicate some of the possible attacks on the system. By A5 we mean cyber attacks on WAMS/WAMC systems. WAMS/WAMC systems can be used to detect and to attenuate inter-area oscillations in the power network, for example, since PMU measurements are taken at a high frequency [12]. Not many WAMS/WAMC systems are in operation today, but they are likely to become more common in the future. Since these systems have a large degree of autonomy and process large amounts of data, they are potential targets of future cyber attacks. It is also possible that they will be integrated with the SCADA/EMS systems, and PMUs are sometimes already today used to improve the state observer, as is shown in Figure 3. V. VIKING APPROACH TO SECURITY The project is divided into seven work packages. Each of them comprises all activities related to a particular task to be addressed. Work package 0 (Management) acts as coordination of the technical work of VIKING and it is lead by ABB Germany. Work package 1 (Requirement Study) deals with understanding security requirements on SCADA systems for transmission and distribution networks. The requirements are classified in terms of their origin. In each of the categories requirements are further classified in terms of their criticality. It is proposed a rough classification of requirements into: must (critical requirements that must be absolutely fulfilled), should (important requirements that need to be fulfilled if at all possible) and could A2 A3 (secondary requirements to be fulfilled whenever higher priority requirements permit). The main work in this package will be done by ABB Sweden. KTH, Astron and E.ON will support, especially on the requirement specification from the physical process. Work package 2 (Modeling) provides the necessary modelling foundations on which threat assessment and mitigation methodologies can be based. The main objectives identifying threats and vulnerabilities of the power transmission and distribution systems, developing architectural models over SCADA system designs, and developing mathematical and computational models for the interaction between the physical transmission and distribution processes and the IT infrastructure. ETH is work package leader, in the modelling work. This is mainly an academic group. Work package 3 (Risk assessment and evaluation methodologies) develops methods to identify and predict the impact of system failures and security risks. The group is lead by KTH with support from ETH. Work package 4 (Mitigation and protection) develops methodologies and protocols for the mitigation and protection of critical infrastructures. The focus will be on systemic and architectural aspects, with development of new methods and protocols for anomaly and threat detection and countermeasures through secure resource management and communication protocols. KTH will lead in cooperation with ETH. The universities of Maryland and Berkley have an important role to play here with expertise and these specific areas. Work package 5 (Case studies and test-bed) evaluates some of the methodologies on a VIKING test-bed that can be configured to simulate the critical infrastructure of a power network and a wide range of attacks. To demonstrate the impact of the proposed solutions in different parts of a SCADA system for a power network, a test-bed for the simulation of systems at local (substation) level, network level and central level including wide and local area communication will be integrated with a commercial SCADA system. The test bed will be located at KTH. ABB Sweden, as development centre for ABB s SCADA system, will be supporting Astron. Work package 6 (Public awareness, exploitation and dissemination) brings together all the activities related to the interaction of VIKING with the outside world. The project involves two different types of outreach activities: Plans for follow-on exploitation of the project results by the industrial partners and public dissemination of the results by the academic partners. The leader is E.On Sverige. The diagram in Figure 4 summarizes the interdependencies between the various work packages. Yellow arrows indicate logical relationships between work packages. The black arrows refer to activities which will lead to dissemination and exploitation.
5 VIKING will develop methodologies applicable to a variety of critical infrastructures, but the evaluation and testing will be focused on power distribution and transmission networks. VI. CURRENT STATUS Fig. 4. Interdependency between work packages The project focuses on the following areas. Modelling and assessment of vulnerabilities of SCADA systems and their effects. Attacks and failure in SCADA systems may result in complex processes of interconnected events. Our goal is to detect these processes and track their evolution. An effective approach involves accurate process modelling. A model is an abstract description of how the system evolves in time. In particular, the situation in complex environments is even more complex, since all the information to infer the actual state of the system is not available at any single node. There are in fact cases in which the observable data from SCADA system does not represent the state of the physical system. Methods for anomaly and threat detection. New standards and recommendations are further away from being implemented in operational systems. Furthermore, cryptographic schemes work under the assumption that an attacker is not able to physically access hardware. This assumption may fail in the case of SCADA systems, since the network and the connected hardware systems are generally left unattended after deployment. In addition, currently used sensory hardware is not resistant to physical tampering. If an adversary captures a sensor, he can easily extract the cryptographic primitives and keys, as well as exploit the shortcomings of the software implementation [14]. Even if the hardware that emits sensor data is kept secure, a skilful attacker can intercept this stream and perform decryption. Once the adversary has obtained the cryptographic keys, he is able to access the sensory data in order to modify or exploit it. Therefore, we cannot exclusively rely on traditional cryptographic protocols to protect the security of SCADA systems. This motivates the need for an Intrusion Detection System (IDS), i.e., an application-level module able to detect and to take the right countermeasures against an attacker who is trying to forge the cryptographic scheme. We will investigate and develop techniques for the detection of data anomalies and suspicious traffic due to malicious tampering, or sensing node malfunction and provide models for expected system behaviours under such conditions. We are now six months into the project and we just delivered a document representing the requirements study made for the first work package. The document contains known and expected threats to the Cyber Security of Control Systems. Threats were collected through a web application that was developed and published to the members of VIKING. Among the submitted threats there were a significant number of similar threats with only slight differences in for example location of the attack. The raw data has been refined such that revised threat descriptions are provided to cover multiple of those collected. Each new description have a reference to the original threats for cross-reference purposes. Examples of threats are: 1) RT-0001: Mistakes/vulnerabilities due to lack of training or experience. 2) RT-0002: Access to process communication channels. 3) RT-0003: Access to control system LAN. 4) RT-0004: Manipulation of master process engineering data. The collected threats will be assessed in subsequent work packages. ACKNOWLEDGMENT This work has been supported by the European Community s Seventh Framework Programme (FP7/ ) under grant agreement no The authors would like to thank the other members of the projects, Gunnar Björkman, Erik Johansson from ABB, John Lygeros, Manfred Morari, Göran Andersson from ETH, Mats BO Larsson from MML, Rita Lenander, Gitte Bergknut from E.ON, Attila Kovács, Attila K. Mergl from Astron, Pontus Johnson, Torsten Cegrell, Lars Nordström, Gunnar Karlsson, André Teixeira from KTH, John Baras, Tao Jiang from Maryland for their team work. REFERENCES [1] J. Lygeros, K. H. Johansson, S. Simic, J. Zhang, and S. Sastry, Dynamical properties of hybrid automata IEEE Transactions on Automatic Control, 48:1, 2-17, [2] [3] electricity en.pdf [4] [5] [6] cyber infrastructure power grid [7] widearea.html [8] [9] [10] [11] [12] M. Zima, M. Larsson, P. Korba, C. Rehtanz, and G. Andersson, Design Aspects for Wide-Area Monitoring and Control Systems, Proceedings of the IEEE, pp , vol. 93, no. 5, May [13] P. Kundur, Power System Stability and Control, McGraw-Hill, [14] C. Hartung, J. Balasalle, and R. Han, Node Compromise in Sensor Networks: The Need for Secure Systems, Department of Computer Science University of Colorado at Boulder, 2005.
Models for Cyber Security Analysis
Enterprise Architecture t Models for Cyber Security Analysis Teodor Sommestad Royal Institute of Technology KTH Stockholm, Sweden 1 Consequences of Cyber Security Incidents (?) CIA senior analyst Tom Donahue:
SCADA Security Measures
Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA SCADA Security Measures
SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID
SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID ZBIGNIEW KALBARCZYK EMAIL: [email protected] UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN JANUARY 2014
Improving SCADA Control Systems Security with Software Vulnerability Analysis
Improving SCADA Control Systems Security with Software Vulnerability Analysis GIOVANNI CAGALABAN, TAIHOON KIM, SEOKSOO KIM Department of Multimedia Hannam University Ojeong-dong, Daedeok-gu, Daejeon 306-791
Cyber-Physical System Security of the Power Grid
Course on: Cyber-Physical System Security of the Power Grid April 9-11, 2013 at KTH Royal Institute of Technology, Stockholm, Sweden Background Cyber Security is essential to today s power grid operation
Evolution of Control for the Smart Transmission Grid
Evolution of Control for the Smart Transmission Grid Anjan Bose Washington State University Pullman, WA SCE Smart Grid Research Symposium California Institute Of Technology October, 2011 The Past (before
Summary of VIKING results
(Vital Infrastructure, NetworKs, INformation and Control System ManaGement) Summary of VIKING results Project co-funded by the European Community within the 7 th Framework Programme. Table of Contents
The Cyber Security Modeling Language and Cyber Security research at department for Industrial Information and Control Systems
The Cyber Security Modeling Language and Cyber Security research at department for Industrial Information and Control Systems Mathias Ekstedt, Associate Prof. KTH Royal Institute of Technology, Stockholm
How To Protect Power System From Attack From A Power System (Power System) From A Fault Control System (Generator) From An Attack From An External Power System
Network Security in Power Systems Maja Knezev and Zarko Djekic Introduction Protection control Outline EMS, SCADA, RTU, PLC Attacks using power system Vulnerabilities Solution Conclusion Introduction Generator
Opportunities to Overcome Key Challenges
The Electricity Transmission System Opportunities to Overcome Key Challenges Summary Results of Breakout Group Discussions Electricity Transmission Workshop Double Tree Crystal City, Arlington, Virginia
Cyber security. Protecting critical infrastructure in a changing world
Cyber security Protecting critical infrastructure in a changing world Sebastian Obermeier, Sascha Stoeter, Ragnar Schierholz, Markus Braendle Twenty years ago, the cyber security of systems and devices
Risk and Security Assessment. Zbigniew Kalbarczyk
Risk and Security Assessment Zbigniew Kalbarczyk 1 TCIPG Cluster Arrangement Communication and Data Delivery for Wide-Area Monitoring and Control Trustworthy cyber infrastructure and technologies for wide-area
SCADA System Overview
Introduction SCADA systems are critical to the control and monitoring of complex cyber-physical systems. Now with advanced computer and communications technologies, SCADA systems are connected to networks
Document ID. Cyber security for substation automation products and systems
Document ID Cyber security for substation automation products and systems 2 Cyber security for substation automation systems by ABB ABB addresses all aspects of cyber security The electric power grid has
LOGIIC Remote Access. Final Public Report. June 2015 1 LOGIIC - APPROVED FOR PUBLIC DISTRIBUTION
LOGIIC Remote Access June 2015 Final Public Report Document Title LOGIIC Remote Monitoring Project Public Report Version Version 1.0 Primary Author A. McIntyre (SRI) Distribution Category LOGIIC Approved
CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A.
21, rue d Artois, F-75008 PARIS D2-102 CIGRE 2012 http : //www.cigre.org CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS Massimo Petrini (*), Emiliano Casale
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
Cyber Physical System Security for the Electric Power Grid
INVITED PAPER Cyber Physical System Security for the Electric Power Grid Control in power systems that may be vulnerable to security attacks is discussed in this paper as are control loop vulnerabilities,
Threat Modeling Framework for Electrical Distribution Scada Networks
Middle-East Journal of Scientific Research 23 (9): 2318-2325, 2015 ISSN 1990-9233 IDOSI Publications, 2015 DOI: 10.5829/idosi.mejsr.2015.23.09.22715 Threat Modeling Framework for Electrical Distribution
Update On Smart Grid Cyber Security
Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats
Symphony Plus Cyber security for the power and water industries
Symphony Plus Cyber security for the power and water industries Symphony Plus Cyber Security_3BUS095402_(Oct12)US Letter.indd 1 01/10/12 10:15 Symphony Plus Cyber security for the power and water industries
Information Services for Smart Grids
Smart Grid and Renewable Energy, 2009, 8 12 Published Online September 2009 (http://www.scirp.org/journal/sgre/). ABSTRACT Interconnected and integrated electrical power systems, by their very dynamic
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
What is Really Needed to Secure the Internet of Things?
What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs [email protected] The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices
EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project
EEI Business Continuity Conference Threat Scenario (TSP) April 4, 2012 EEI Threat Scenario 1 Background EEI, working with a group of CIOs and Subject Matter Experts, conducted a survey with member companies
IEEE-Northwest Energy Systems Symposium (NWESS)
IEEE-Northwest Energy Systems Symposium (NWESS) Paul Skare Energy & Environment Directorate Cybersecurity Program Manager Philip Craig Jr National Security Directorate Sr. Cyber Research Engineer The Pacific
NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives
NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives Center of excellence for secure integration, deployment and sustainment of Industrial Control Systems and Operational Technology
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile
!! "# $%!& $!$ +) * ', -./01.//1233/ "4, -./01.//12223 *, 565
!! "# $%!& '(!)**+* $!$ +) * ', -./01.//1233/ "4, -./01.//12223 *, 565 1 Content CRUTIAL testbeds - objectives The Telecontrol Testbed platform Critical scenarios - plotted demo Experimental results The
future data and infrastructure
White Paper Smart Grid Security: Preparing for the Standards-Based Future without Neglecting the Needs of Today Are you prepared for future data and infrastructure security challenges? Steve Chasko Principal
Risk Management, Equipment Protection, Monitoring and Incidence Response, Policy/Planning, and Access/Audit
Page 1 of 10 Events Partners Careers Contact Facebook Twitter LinkedIn Pike Research Search search... Home About Research Consulting Blog Newsroom Media My Pike Logout Overview Smart Energy Clean Transportation
Fail-Safe IPS Integration with Bypass Technology
Summary Threats that require the installation, redeployment or upgrade of in-line IPS appliances often affect uptime on business critical links. Organizations are demanding solutions that prevent disruptive
7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008
U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October
Integrating Cyber Security into Nuclear Power Plant Safety Systems Design
Integrating Cyber Security into Nuclear Power Plant Safety Systems Design Deanna Zhang U.S. Nuclear Regulatory Commission Document Date: 05/21/2010 Objectives To provide methods for utilizing safety features,
Communication and Embedded Systems: Towards a Smart Grid. Radu Stoleru, Alex Sprintson, Narasimha Reddy, and P. R. Kumar
Communication and Embedded Systems: Towards a Smart Grid Radu Stoleru, Alex Sprintson, Narasimha Reddy, and P. R. Kumar Alex Sprintson Smart grid communication Key enabling technology Collecting data Control
Design and Implementation of SCADA System Based Power Distribution for Primary Substation ( Monitoring System)
Design and Implementation of SCADA System Based Power Distribution for Primary Substation ( Monitoring System) Aye Min Zaw 1, Hla Myo Tun 2 Department of Electronic Engineering, Mandalay Technological
PROJECT BOEING SGS. Interim Technology Performance Report 3. Company Name: The Boeing Company. Contract ID: DE-OE0000191
Interim Techlogy Performance Report 3 PROJECT BOEING SGS Contract ID: DE-OE0000191 Project Type: Revision: V1 Company Name: The Boeing Company November 19, 2013 1 Interim Techlogy Performance Report 3
Wireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
Data Security Concerns for the Electric Grid
Data Security Concerns for the Electric Grid Data Security Concerns for the Electric Grid The U.S. power grid infrastructure is a vital component of modern society and commerce, and represents a critical
Cyber Security of the Power Grid
Cyber Security of the Power Grid Chen-Ching Ching Liu Professor of Power Systems University College Dublin Research for Ireland s Future Ireland -Country of natural beauty -Quality of life ranked among
Considerations for Hybrid Communications Network Technology for Pipeline Monitoring
Considerations for Hybrid Communications Network Technology for Pipeline Monitoring Craig Held White Paper April 2012 Abstract The concept of automation (and its corresponding technologies) is a primary
SCADA SYSTEMS AND SECURITY WHITEPAPER
SCADA SYSTEMS AND SECURITY WHITEPAPER Abstract: This paper discusses some of the options available to companies concerned with the threat of cyber attack on their critical infrastructure, who as part of
Understanding SCADA System Security Vulnerabilities
Understanding SCADA System Security Vulnerabilities Talking Points Executive Summary Common Misconceptions about SCADA System Security Common Vulnerabilities Affecting SCADA Networks Tactics to Strengthen
data integration/exchange part 2: future technical and business opportunities
techtorial M. Kezunovic, A. Abur, A. Edris, D. Sobajic data integration/exchange part 2: future technical and business opportunities IIN THE UTILITY INDUSTRY, LIKE in many other major industries, it is
Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice
Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice Introduction There are numerous statistics published by security vendors, Government
Security Issues in SCADA Networks
Security Issues in SCADA Networks by V. M. Igure, S. A. Laughter, and R. D. Williams Computers & Security, 25(7): 498-506, 2006 presented by Ruilong Deng Postdoctoral Research Fellow School of Electrical
PFP Technology White Paper
PFP Technology White Paper Summary PFP Cybersecurity solution is an intrusion detection solution based on observing tiny patterns on the processor power consumption. PFP is capable of detecting intrusions
How To Protect Your Network From Attack
NextGen SCADA security Erwin Kooi Setting the stage This talk is not An introduction to SCADA security AIC versus CIA The latest blinky-lights SCADA security appliance How to use IT security in OT envrionments
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network
WP 1004HE Part 5 1. Cyber Security White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network Table of Contents 1. Cyber Security... 1 1.1 What
Multi-vendor Penetration Testing in the Advanced Metering Infrastructure: Future Challenges
Multi-vendor Penetration Testing in the Advanced ing Infrastructure: Future Challenges DIMACS Workshop on Algorithmic Decision Theory for the Smart Grid Stephen McLaughlin - Penn State University 1 Data
Performance Evaluation of Intrusion Detection Systems
Performance Evaluation of Intrusion Detection Systems Waleed Farag & Sanwar Ali Department of Computer Science at Indiana University of Pennsylvania ABIT 2006 Outline Introduction: Intrusion Detection
Network Cyber Security. Presented by: Motty Anavi RFL Electronics
Network Cyber Security Presented by: Motty Anavi RFL Electronics Agenda Cyber Security Threats Defense Strategy & Consequences Next Generation Networking ICS Vulnerabilities Liabilities Next Gen Networking
Intrusion Detection for SCADA Systems
Intrusion Detection for SCADA Systems Dr Kieran McLaughlin CSIT, Queen s University Belfast Outline Background & Motivation Experience with IEC 60870-5-104 SCADA-IDS approach SPARKS mini-project targeting
Wireless Network Security
Wireless Network Security Bhavik Doshi Privacy and Security Winter 2008-09 Instructor: Prof. Warren R. Carithers Due on: February 5, 2009 Table of Contents Sr. No. Topic Page No. 1. Introduction 3 2. An
SCADA System Security, Complexity, and Security Proof
SCADA System Security, Complexity, and Security Proof Reda Shbib, Shikun Zhou, Khalil Alkadhimi School of Engineering, University of Portsmouth, Portsmouth, UK {reda.shbib,shikun.zhou,khalil.alkadhimi}@port.ac.uk
Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.
Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim
SPARKS Cybersecurity Technology and the NESCOR Failure Scenarios
SPARKS Cybersecurity Technology and the NESCOR Failure Scenarios Lucie Langer and Paul Smith [email protected] AIT Austrian Institute of Technology ComForEn Workshop Monday 29 th September,
INSPIRE: INcreasing Security and Protection through Infrastructure REsilience
INSPIRE: INcreasing Security and Protection through Infrastructure REsilience Salvatore D Antonio Consorzio Interuniversitario Nazionale per l Informatica [email protected] CRITIS 2008 - Frascati (Italy)
Fujitsu s Approach to Cloud-related Information Security
Fujitsu s Approach to Cloud-related Information Security Masayuki Okuhara Takuya Suzuki Tetsuo Shiozaki Makoto Hattori Cloud computing opens up a variety of possibilities but at the same time it raises
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Meeting Cyber Security Challenges
Meeting Cyber Security Challenges Presented to Naval Postgraduate School Cyber Summit 29 October 2009 Cynthia Irvine, PhD, Professor Naval Postgraduate School UNCLASSIFIED Overview Challenges in Cyber
Security Issues with Integrated Smart Buildings
Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern
Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 2.0 to 3.0
Payment Card Industry (PCI) Data Security Standard Summary of s from Version 2.0 to 3.0 November 2013 Introduction This document provides a summary of changes from v2.0 to v3.0. Table 1 provides an overview
Dr. Raheem Beyah Georgia Tech. Cyber-Physical Modeling & Simulation for Situational Awareness (CYMSA)
Seth Walters Dr. Sakis Meliopoulos Dr. Santiago Grijalva Dr. Raheem Beyah Georgia Tech Cyber-Physical Modeling & Simulation for Situational Awareness (CYMSA) Cybersecurity for Energy Delivery Systems Peer
Next Generation Grid Data Architecture & Analytics Required for the Future Grid
& Analytics Required for the Future Grid Arjun Shankar and Russell Robertson Team: Lin Zhu, Frank Liu, Jim Nutaro, Yilu Liu, and Tom King 1 2 2 Project Purpose PURPOSE To foster open collaboration on issues,
IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]
IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System
Transforming industries: energy and utilities. How the Internet of Things will transform the utilities industry
Transforming industries: energy and utilities How the Internet of Things will transform the utilities industry GETTING TO KNOW UTILITIES Utility companies are responsible for managing the infrastructure
This is a preview - click here to buy the full publication
TECHNICAL REPORT IEC/TR 62443-3-1 Edition 1.0 2009-07 colour inside Industrial communication networks Network and system security Part 3 1: Security technologies for industrial automation and control systems
DNP Serial SCADA to SCADA Over IP: Standards, Regulations Security and Best Practices
DNP SCADA to SCADA Over : Standards, Regulations Security and Best Practices Earl Emerson, Director Systems Engineering RAD Data Communications 2014 Utilities Telecom Council of Canada Motivations for
Wide Area Monitoring Current Continental Europe TSOs Applications Overview
Wide Area Monitoring Current Continental Europe TSOs Applications Overview Version 5 System Protection & Dynamics Working Group 20th September 2015 1. Content 1. Content... 2 2. Introduction... 3 3. Main
Cloud Computing for SCADA
Cloud Computing for SCADA Moving all or part of SCADA applications to the cloud can cut costs significantly while dramatically increasing reliability and scalability. A White Paper from InduSoft Larry
Electric Energy Systems
Electric Energy Systems Electric Energy Systems seeks to explore methods at the frontier of understanding of the future electric power and energy systems worldwide. The track will focus on the electric
Oil and Gas Industry A Comprehensive Security Risk Management Approach. www.riskwatch.com
Oil and Gas Industry A Comprehensive Security Risk Management Approach www.riskwatch.com Introduction This white paper explores the key security challenges facing the oil and gas industry and suggests
Hybrid Simulation von Kommunikationsnetzen für das Smart Grid
für das Smart rid Hanno eorg 15.11.2013 Faculty of Electrical Engineering & Information Technology Communication Networks Institute Prof. Dr.-Ing. Christian Wietfeld für das Smart rid Overview Motivation
CPNI VIEWPOINT CYBER SECURITY ASSESSMENTS OF INDUSTRIAL CONTROL SYSTEMS
CPNI VIEWPOINT CYBER SECURITY ASSESSMENTS OF INDUSTRIAL CONTROL SYSTEMS MARCH 2011 Acknowledgements This Viewpoint is based upon the Cyber Security Assessments of Industrial Control Systems Good Practice
PEER-TO-PEER NETWORK
PEER-TO-PEER NETWORK February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Design Document. Team Members: Tony Gedwillo James Parrott David Ryan. Faculty Advisor: Dr. Manimaran Govindarasu
12/6/2010 SDMAY11-11 CYBER SECURITY OF SCADA SYSTEMS TEST BED Design Document Team Members: Tony Gedwillo James Parrott David Ryan Faculty Advisor: Dr. Manimaran Govindarasu Design Document Tony Gedwillo
HANDBOOK 8 NETWORK SECURITY Version 1.0
Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: [email protected] HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives
Cyber-physical Systems Security An Experimental Approach
Cyber-physical Systems Security An Experimental Approach Dieter Gollmann, Marina Krotofil Security in Distributed Applications, Hamburg University of Technology helped by Pavel Gurikov, Alexander Isakov,
Including Threat Actor Capability and Motivation in Risk Assessment for Smart Grids
CPSR-SG 2016: Joint International Workshop on Cyber-Physical Security and Resilience in Smart Grids, 12th April 2016, Vienna Security for smart Electricity GRIDs Including Threat Actor Capability and Motivation
The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.
1 Cyber-attacks frequently take advantage of software weaknesses unintentionally created during development. This presentation discusses some ways that improved acquisition practices can reduce the likelihood
Cyber Security and Privacy - Program 183
Program Program Overview Cyber/physical security and data privacy have become critical priorities for electric utilities. The evolving electric sector is increasingly dependent on information technology
