Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics - Publication - Bridge of Knowledge

Search

Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics

Abstract

The contemporary electric power system is highly dependent on Information and Communication Technologies which results in its exposure to new types of threats, such as Advanced Persistent Threats (APT) or Distributed-Denial-of-Service (DDoS) attacks. The most exposed components are Industrial Control Systems in substations and Distributed Control Systems in power plants. Therefore, it is necessary to ensure the cyber security of this critical infrastructure and develop new cyber security technologies able to protect from advanced cyber threats. In this paper a pioneering Situation Awareness Network for the electric power system is presented together with a set of metrics for its testing..

Citations

  • 2

    CrossRef

  • 0

    Web of Science

  • 6

    Scopus

Cite as

Full text

download paper
downloaded 34 times
Publication version
Accepted or Published Version
License
Creative Commons: CC-BY open in new tab

Keywords

Details

Category:
Conference activity
Type:
materiały konferencyjne indeksowane w Web of Science
Published in:
Annals of Computer Science and Information Systems no. 8, pages 743 - 749,
ISSN: 2300-5963
Title of issue:
Proceedings of the 2016 Federated Conference on Computer Science and Information Systems strony 743 - 749
Publication year:
2016
Bibliographic description:
Bolzoni D., Leszczyna R., Wróbel M..: Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics, W: Proceedings of the 2016 Federated Conference on Computer Science and Information Systems, 2016, ,.
DOI:
Digital Object Identifier (open in new tab) 10.15439/2016f50
Bibliography: test
  1. R. Kyusakov, J. Eliasson, J. Van Deventer, J. Delsing, and R. Cragie, "Emerging energy management standards and technologies -Chal- lenges and application prospects," in IEEE International Conference on Emerging Technologies and Factory Automation, ETFA, 2012. doi: 10.1109/ETFA.2012.6489674. ISBN 9781467347372 open in new tab
  2. F. Maturana, R. Staron, K. Loparo, R. Ambre, and D. Carnahan, "Simulation-based environment for modeling distributed agents for smart grid energy management," in IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2011, 2011. doi: 10.1109/ETFA.2011.6059124. ISBN 9781457700187. ISSN 1946-0740 open in new tab
  3. G. Dini and M. Tiloca, "On simulative analysis of attack impact in Wireless Sensor Networks," in IEEE International Conference on Emerging Technologies and Factory Automation, ETFA, 2013. doi: 10.1109/ETFA.2013.6648059. ISBN 9781479908622. ISSN 19460740 open in new tab
  4. Y. Aillerie, S. Kayal, J.-p. Mennella, R. Samani, S. Sauty, and L. Schmitt, "Smart Grid Cyber Security," 2013.
  5. Y. Yan, Y. Qian, H. Sharif, and D. Tipper, "A Survey on Cyber Security for Smart Grid Communications," IEEE Communications Surveys & Tutorials, vol. 14, no. 4, pp. 998-1010, 2012. doi: 10.1109/SURV.2012.010912.00035. [Online]. Available: http: //ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6141833 open in new tab
  6. W. Wang and Z. Lu, "Cyber security in the Smart Grid: Survey and challenges," Computer Networks, vol. 57, no. 5, pp. 1344-1371, apr 2013. doi: 10.1016/j.comnet.2012.12.017. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S1389128613000042 open in new tab
  7. N. Falliere, L. O. Murchu, and E. Chien, "W32.Stuxnet Dossier," Symantec Security Response, Tech. Rep., 2011. open in new tab
  8. D. Kushner, "The real story of stuxnet," IEEE Spectrum, vol. 50, pp. 48-53, 2013. doi: 10.1109/MSPEC.2013.6471059 open in new tab
  9. P. Shakarian, J. Shakarian, and A. Ruef, Introduction to Cyber-warfare. Elsevier, 2013. ISBN 9780124078147. [Online]. Available: http: //www.sciencedirect.com/science/article/pii/B9780124078147000087 open in new tab
  10. P. Technologies, "SCADA Safety in Numbers," Tech. Rep., 2012.
  11. N. Virvilis and D. Gritzalis, "The Big Four -What We Did Wrong in Advanced Persistent Threat Detection?" in 2013 International Conference on Availability, Reliability and Security. IEEE, sep 2013. doi: 10.1109/ARES.2013.32. ISBN 978-0-7695-5008-4 pp. 248-254. [Online]. Available: http://ieeexplore.ieee.org/lpdocs/epic03/ wrapper.htm?arnumber=6657248 open in new tab
  12. ICS-CERT, "Alert (ICS-ALERT-14-281-01B) Ongoing Sophisticated Malware Campaign Compromising ICS (Update B)," 2014.
  13. A. Carcano, A. Coletta, M. Guglielmi, M. Masera, I. N. Fovino, and A. Trombetta, "A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems," Industrial Informatics, IEEE Transactions on, vol. 7, no. 2, pp. 179-186, 2011. doi: 10.1109/TII.2010.2099234 open in new tab
  14. A. Felkner and A. Kozakiewicz, "More Practical Application of Trust Management Credentials," in Proceedings of the 2015 Federated Conference on Computer Science and Information Systems, ser. Annals of Computer Science and Information Systems, M. Ganzha, L. Maciaszek, and M. Paprzycki, Eds., vol. 5. IEEE, 2015. doi: 10.15439/2015F95 pp. 1125-1134. [Online]. Available: http: //dx.doi.org/10.15439/2015F95 open in new tab
  15. O. Rysavy, J. Rab, and M. Sveda, "Improving security in SCADA systems through firewall policy analysis," in Proceedings of the 2013
  16. Federated Conference on Computer Science and Information Systems, M. P. M. Ganzha L. Maciaszek, Ed. IEEE, 2013, pp. pages 1423-- 1428. open in new tab
  17. M. Chakraborty, N. Chaki, and A. Cortesi, "A New Intrusion Prevention System for Protecting Smart Grids from ICMPv6 Vulnerabilities," in Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, ser. Annals of Computer Science and Information Systems, M. P. M. Ganzha L. Maciaszek, Ed., vol. 2. IEEE, 2014. doi: 10.15439/2014F287 pp. pages 1539--1547. [Online]. open in new tab
  18. Available: http://dx.doi.org/10.15439/2014F287 open in new tab
  19. A. Bialas, "Experimentation tool for critical infrastructures risk management," in Proceedings of the 2015 Federated Conference on Computer Science and Information Systems, ser. Annals of Computer Science and Information Systems, M. Ganzha, L. Maciaszek, and M. Paprzycki, Eds., vol. 5. IEEE, 2015. doi: 10.15439/2015F77 pp. 1099-1106. [Online]. Available: http://dx.doi.org/10.15439/2015F77 open in new tab
  20. H. Khurana, M. Hadley, and D. Frincke, "Smart-grid security issues," IEEE Security & Privacy Magazine, vol. 8, no. 1, pp. 81-85, jan 2010. doi: 10.1109/MSP.2010.49. [Online]. Available: http: //ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5403159 open in new tab
  21. "DEnSeK (Distributed Energy Security Knowledge) -project website." [Online]. Available: http://www.densek.eu/ open in new tab
  22. M. R. Endsley and D. J. Garland, Situation Awareness Analysis and Measurement. CRC Press, Inc., 2000. open in new tab
  23. "Snort Home Page." [Online]. Available: http://www.snort.org/ open in new tab
  24. Z. Zhou, "The study on network intrusion detection system of Snort," in 2010 International Conference on Networking and Digital Society, vol. 2. IEEE, may 2010. doi: 10.1109/ICNDS.2010.5479341. ISBN 978-1-4244-5162-3 pp. 194-196. open in new tab
  25. OISF, "Suricata -Open Source IDS / IPS / NSM engine." [Online]. Available: http://suricata-ids.org/
  26. "The Bro Network Security Monitor," 2016. [Online]. Available: https://www.bro.org/ open in new tab
  27. G. K. Varadarajan, "Web Application Attack Analysis Using Bro IDS," 2012. [Online]. Available: http://www.sans.org/reading-room/ whitepapers/detection/web-application-attack-analysis-bro-ids-34042
  28. "Argos," 2016. [Online]. Available: https://sourceforge.net/projects/ argos-scada-en/ open in new tab
  29. [27] "Apache Kafka: a high-throughput distributed messaging system," 2016. [Online]. Available: http://kafka.apache.org/ open in new tab
  30. "Druid." [Online]. Available: http://druid.io/ [29] A. September, "IEEE Standard Glossary of Software Engineering Terminology/IEEE Std 610.12-1990," p. 96, 1990. [Online]. open in new tab
  31. J. Radatz, A. Geraci, and F. Katki, "IEEE standard glossary of software engineering terminology," IEEE Std, vol. 610121990, p. 121990, 1990. open in new tab
  32. I. Burnstein, T. Suwanassart, and R. Carlson, "Developing a testing maturity model for sofiware test process evaluation," in Test Conference, 1996, 1996. ISBN 0780335406 pp. 581-589. open in new tab
  33. R. Leszczyna, R. Małkowski, and M. R. Wróbel, "Testing Situation Awareness Network for the Electrical Power Infrastructure," Acta Ener- getica, vol. 1, pp. 270-276, 2015. open in new tab
  34. P. Goodman, The Practical Implementation of Software Metrics. McGraw-Hill, Inc., 1993.
  35. S. Quadri and S. Farooq, "Notable Metrics in Software Testing," 5th Na- tional Conference on Computing For Nation Development -INDIACom- 2011, pp. 273-276, 2011.
  36. A. Kaur, B. Suri, and A. Sharma, "Software testing product metrics- A Survey," in National Conference on Challenges & Opportunities in Information Technology, 2007, pp. 1-6.
  37. A. Jaquith, Security Metrics, Replacing Fear, Uncertainty, and Doubt. Addison-Wesley Professional, 2007.
  38. Y. Chen, R. L. Probert, and K. Robeson, "Effective test metrics for test strategy evolution," pp. 111-123, 2004. open in new tab
  39. D. Kang, D. Fuller, and V. Honavar, "Learning classifiers for misuse and anomaly detection using a bag of system calls representation," Sixth Annual IEEE SMC Information Assurance Workshop, 2005. doi: 10.1109/IAW.2005.1495942 open in new tab
  40. J. L. Bayuk and A. Mostashari, "Measuring cyber security in intelligent urban infrastructure systems," in 2011 8th International Conference & Expo on Emerging Technologies for a Smarter World. Ieee, nov 2011. doi: 10.1109/CEWIT.2011.6135873. ISBN 978-1-4577-1591-4 pp. 1-6. open in new tab
  41. W. Albert and T. Tullis, Measuring the user experience: collecting, analyzing, and presenting usability metrics. Newnes, 2013. ISBN
Verified by:
Gdańsk University of Technology

seen 104 times

Recommended for you

Meta Tags