Abstract
The contemporary electric power system is highly dependent on Information and Communication Technologies which results in its exposure to new types of threats, such as Advanced Persistent Threats (APT) or Distributed-Denial-of-Service (DDoS) attacks. The most exposed components are Industrial Control Systems in substations and Distributed Control Systems in power plants. Therefore, it is necessary to ensure the cyber security of this critical infrastructure and develop new cyber security technologies able to protect from advanced cyber threats. In this paper a pioneering Situation Awareness Network for the electric power system is presented together with a set of metrics for its testing..
Citations
-
2
CrossRef
-
0
Web of Science
-
6
Scopus
Authors (3)
Cite as
Full text
- Publication version
- Accepted or Published Version
- License
- open in new tab
Keywords
Details
- Category:
- Conference activity
- Type:
- materiały konferencyjne indeksowane w Web of Science
- Published in:
-
Annals of Computer Science and Information Systems
no. 8,
pages 743 - 749,
ISSN: 2300-5963 - Title of issue:
- Proceedings of the 2016 Federated Conference on Computer Science and Information Systems strony 743 - 749
- Publication year:
- 2016
- Bibliographic description:
- Bolzoni D., Leszczyna R., Wróbel M..: Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics, W: Proceedings of the 2016 Federated Conference on Computer Science and Information Systems, 2016, ,.
- DOI:
- Digital Object Identifier (open in new tab) 10.15439/2016f50
- Bibliography: test
-
- R. Kyusakov, J. Eliasson, J. Van Deventer, J. Delsing, and R. Cragie, "Emerging energy management standards and technologies -Chal- lenges and application prospects," in IEEE International Conference on Emerging Technologies and Factory Automation, ETFA, 2012. doi: 10.1109/ETFA.2012.6489674. ISBN 9781467347372 open in new tab
- F. Maturana, R. Staron, K. Loparo, R. Ambre, and D. Carnahan, "Simulation-based environment for modeling distributed agents for smart grid energy management," in IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2011, 2011. doi: 10.1109/ETFA.2011.6059124. ISBN 9781457700187. ISSN 1946-0740 open in new tab
- G. Dini and M. Tiloca, "On simulative analysis of attack impact in Wireless Sensor Networks," in IEEE International Conference on Emerging Technologies and Factory Automation, ETFA, 2013. doi: 10.1109/ETFA.2013.6648059. ISBN 9781479908622. ISSN 19460740 open in new tab
- Y. Aillerie, S. Kayal, J.-p. Mennella, R. Samani, S. Sauty, and L. Schmitt, "Smart Grid Cyber Security," 2013.
- Y. Yan, Y. Qian, H. Sharif, and D. Tipper, "A Survey on Cyber Security for Smart Grid Communications," IEEE Communications Surveys & Tutorials, vol. 14, no. 4, pp. 998-1010, 2012. doi: 10.1109/SURV.2012.010912.00035. [Online]. Available: http: //ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6141833 open in new tab
- W. Wang and Z. Lu, "Cyber security in the Smart Grid: Survey and challenges," Computer Networks, vol. 57, no. 5, pp. 1344-1371, apr 2013. doi: 10.1016/j.comnet.2012.12.017. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S1389128613000042 open in new tab
- N. Falliere, L. O. Murchu, and E. Chien, "W32.Stuxnet Dossier," Symantec Security Response, Tech. Rep., 2011. open in new tab
- D. Kushner, "The real story of stuxnet," IEEE Spectrum, vol. 50, pp. 48-53, 2013. doi: 10.1109/MSPEC.2013.6471059 open in new tab
- P. Shakarian, J. Shakarian, and A. Ruef, Introduction to Cyber-warfare. Elsevier, 2013. ISBN 9780124078147. [Online]. Available: http: //www.sciencedirect.com/science/article/pii/B9780124078147000087 open in new tab
- P. Technologies, "SCADA Safety in Numbers," Tech. Rep., 2012.
- N. Virvilis and D. Gritzalis, "The Big Four -What We Did Wrong in Advanced Persistent Threat Detection?" in 2013 International Conference on Availability, Reliability and Security. IEEE, sep 2013. doi: 10.1109/ARES.2013.32. ISBN 978-0-7695-5008-4 pp. 248-254. [Online]. Available: http://ieeexplore.ieee.org/lpdocs/epic03/ wrapper.htm?arnumber=6657248 open in new tab
- ICS-CERT, "Alert (ICS-ALERT-14-281-01B) Ongoing Sophisticated Malware Campaign Compromising ICS (Update B)," 2014.
- A. Carcano, A. Coletta, M. Guglielmi, M. Masera, I. N. Fovino, and A. Trombetta, "A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems," Industrial Informatics, IEEE Transactions on, vol. 7, no. 2, pp. 179-186, 2011. doi: 10.1109/TII.2010.2099234 open in new tab
- A. Felkner and A. Kozakiewicz, "More Practical Application of Trust Management Credentials," in Proceedings of the 2015 Federated Conference on Computer Science and Information Systems, ser. Annals of Computer Science and Information Systems, M. Ganzha, L. Maciaszek, and M. Paprzycki, Eds., vol. 5. IEEE, 2015. doi: 10.15439/2015F95 pp. 1125-1134. [Online]. Available: http: //dx.doi.org/10.15439/2015F95 open in new tab
- O. Rysavy, J. Rab, and M. Sveda, "Improving security in SCADA systems through firewall policy analysis," in Proceedings of the 2013
- Federated Conference on Computer Science and Information Systems, M. P. M. Ganzha L. Maciaszek, Ed. IEEE, 2013, pp. pages 1423-- 1428. open in new tab
- M. Chakraborty, N. Chaki, and A. Cortesi, "A New Intrusion Prevention System for Protecting Smart Grids from ICMPv6 Vulnerabilities," in Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, ser. Annals of Computer Science and Information Systems, M. P. M. Ganzha L. Maciaszek, Ed., vol. 2. IEEE, 2014. doi: 10.15439/2014F287 pp. pages 1539--1547. [Online]. open in new tab
- Available: http://dx.doi.org/10.15439/2014F287 open in new tab
- A. Bialas, "Experimentation tool for critical infrastructures risk management," in Proceedings of the 2015 Federated Conference on Computer Science and Information Systems, ser. Annals of Computer Science and Information Systems, M. Ganzha, L. Maciaszek, and M. Paprzycki, Eds., vol. 5. IEEE, 2015. doi: 10.15439/2015F77 pp. 1099-1106. [Online]. Available: http://dx.doi.org/10.15439/2015F77 open in new tab
- H. Khurana, M. Hadley, and D. Frincke, "Smart-grid security issues," IEEE Security & Privacy Magazine, vol. 8, no. 1, pp. 81-85, jan 2010. doi: 10.1109/MSP.2010.49. [Online]. Available: http: //ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5403159 open in new tab
- "DEnSeK (Distributed Energy Security Knowledge) -project website." [Online]. Available: http://www.densek.eu/ open in new tab
- M. R. Endsley and D. J. Garland, Situation Awareness Analysis and Measurement. CRC Press, Inc., 2000. open in new tab
- "Snort Home Page." [Online]. Available: http://www.snort.org/ open in new tab
- Z. Zhou, "The study on network intrusion detection system of Snort," in 2010 International Conference on Networking and Digital Society, vol. 2. IEEE, may 2010. doi: 10.1109/ICNDS.2010.5479341. ISBN 978-1-4244-5162-3 pp. 194-196. open in new tab
- OISF, "Suricata -Open Source IDS / IPS / NSM engine." [Online]. Available: http://suricata-ids.org/
- "The Bro Network Security Monitor," 2016. [Online]. Available: https://www.bro.org/ open in new tab
- G. K. Varadarajan, "Web Application Attack Analysis Using Bro IDS," 2012. [Online]. Available: http://www.sans.org/reading-room/ whitepapers/detection/web-application-attack-analysis-bro-ids-34042
- "Argos," 2016. [Online]. Available: https://sourceforge.net/projects/ argos-scada-en/ open in new tab
- [27] "Apache Kafka: a high-throughput distributed messaging system," 2016. [Online]. Available: http://kafka.apache.org/ open in new tab
- "Druid." [Online]. Available: http://druid.io/ [29] A. September, "IEEE Standard Glossary of Software Engineering Terminology/IEEE Std 610.12-1990," p. 96, 1990. [Online]. open in new tab
- J. Radatz, A. Geraci, and F. Katki, "IEEE standard glossary of software engineering terminology," IEEE Std, vol. 610121990, p. 121990, 1990. open in new tab
- I. Burnstein, T. Suwanassart, and R. Carlson, "Developing a testing maturity model for sofiware test process evaluation," in Test Conference, 1996, 1996. ISBN 0780335406 pp. 581-589. open in new tab
- R. Leszczyna, R. Małkowski, and M. R. Wróbel, "Testing Situation Awareness Network for the Electrical Power Infrastructure," Acta Ener- getica, vol. 1, pp. 270-276, 2015. open in new tab
- P. Goodman, The Practical Implementation of Software Metrics. McGraw-Hill, Inc., 1993.
- S. Quadri and S. Farooq, "Notable Metrics in Software Testing," 5th Na- tional Conference on Computing For Nation Development -INDIACom- 2011, pp. 273-276, 2011.
- A. Kaur, B. Suri, and A. Sharma, "Software testing product metrics- A Survey," in National Conference on Challenges & Opportunities in Information Technology, 2007, pp. 1-6.
- A. Jaquith, Security Metrics, Replacing Fear, Uncertainty, and Doubt. Addison-Wesley Professional, 2007.
- Y. Chen, R. L. Probert, and K. Robeson, "Effective test metrics for test strategy evolution," pp. 111-123, 2004. open in new tab
- D. Kang, D. Fuller, and V. Honavar, "Learning classifiers for misuse and anomaly detection using a bag of system calls representation," Sixth Annual IEEE SMC Information Assurance Workshop, 2005. doi: 10.1109/IAW.2005.1495942 open in new tab
- J. L. Bayuk and A. Mostashari, "Measuring cyber security in intelligent urban infrastructure systems," in 2011 8th International Conference & Expo on Emerging Technologies for a Smarter World. Ieee, nov 2011. doi: 10.1109/CEWIT.2011.6135873. ISBN 978-1-4577-1591-4 pp. 1-6. open in new tab
- W. Albert and T. Tullis, Measuring the user experience: collecting, analyzing, and presenting usability metrics. Newnes, 2013. ISBN
- Verified by:
- Gdańsk University of Technology
seen 104 times
Recommended for you
Security Information Sharing for the Polish Power System
- R. Leszczyna,
- M. Łosiński,
- R. Małkowski