Abstrakt
The contemporary electric power system is highly dependent on Information and Communication Technologies which results in its exposure to new types of threats, such as Advanced Persistent Threats (APT) or Distributed-Denial-of-Service (DDoS) attacks. The most exposed components are Industrial Control Systems in substations and Distributed Control Systems in power plants. Therefore, it is necessary to ensure the cyber security of this critical infrastructure and develop new cyber security technologies able to protect from advanced cyber threats. In this paper a pioneering Situation Awareness Network for the electric power system is presented together with a set of metrics for its testing..
Cytowania
-
2
CrossRef
-
0
Web of Science
-
6
Scopus
Autorzy (3)
Cytuj jako
Pełna treść
- Wersja publikacji
- Accepted albo Published Version
- Licencja
- otwiera się w nowej karcie
Słowa kluczowe
Informacje szczegółowe
- Kategoria:
- Aktywność konferencyjna
- Typ:
- materiały konferencyjne indeksowane w Web of Science
- Opublikowano w:
-
Annals of Computer Science and Information Systems
nr 8,
strony 743 - 749,
ISSN: 2300-5963 - Tytuł wydania:
- Proceedings of the 2016 Federated Conference on Computer Science and Information Systems strony 743 - 749
- Rok wydania:
- 2016
- Opis bibliograficzny:
- Bolzoni D., Leszczyna R., Wróbel M..: Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics, W: Proceedings of the 2016 Federated Conference on Computer Science and Information Systems, 2016, ,.
- DOI:
- Cyfrowy identyfikator dokumentu elektronicznego (otwiera się w nowej karcie) 10.15439/2016f50
- Bibliografia: test
-
- R. Kyusakov, J. Eliasson, J. Van Deventer, J. Delsing, and R. Cragie, "Emerging energy management standards and technologies -Chal- lenges and application prospects," in IEEE International Conference on Emerging Technologies and Factory Automation, ETFA, 2012. doi: 10.1109/ETFA.2012.6489674. ISBN 9781467347372 otwiera się w nowej karcie
- F. Maturana, R. Staron, K. Loparo, R. Ambre, and D. Carnahan, "Simulation-based environment for modeling distributed agents for smart grid energy management," in IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2011, 2011. doi: 10.1109/ETFA.2011.6059124. ISBN 9781457700187. ISSN 1946-0740 otwiera się w nowej karcie
- G. Dini and M. Tiloca, "On simulative analysis of attack impact in Wireless Sensor Networks," in IEEE International Conference on Emerging Technologies and Factory Automation, ETFA, 2013. doi: 10.1109/ETFA.2013.6648059. ISBN 9781479908622. ISSN 19460740 otwiera się w nowej karcie
- Y. Aillerie, S. Kayal, J.-p. Mennella, R. Samani, S. Sauty, and L. Schmitt, "Smart Grid Cyber Security," 2013.
- Y. Yan, Y. Qian, H. Sharif, and D. Tipper, "A Survey on Cyber Security for Smart Grid Communications," IEEE Communications Surveys & Tutorials, vol. 14, no. 4, pp. 998-1010, 2012. doi: 10.1109/SURV.2012.010912.00035. [Online]. Available: http: //ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6141833 otwiera się w nowej karcie
- W. Wang and Z. Lu, "Cyber security in the Smart Grid: Survey and challenges," Computer Networks, vol. 57, no. 5, pp. 1344-1371, apr 2013. doi: 10.1016/j.comnet.2012.12.017. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S1389128613000042 otwiera się w nowej karcie
- N. Falliere, L. O. Murchu, and E. Chien, "W32.Stuxnet Dossier," Symantec Security Response, Tech. Rep., 2011. otwiera się w nowej karcie
- D. Kushner, "The real story of stuxnet," IEEE Spectrum, vol. 50, pp. 48-53, 2013. doi: 10.1109/MSPEC.2013.6471059 otwiera się w nowej karcie
- P. Shakarian, J. Shakarian, and A. Ruef, Introduction to Cyber-warfare. Elsevier, 2013. ISBN 9780124078147. [Online]. Available: http: //www.sciencedirect.com/science/article/pii/B9780124078147000087 otwiera się w nowej karcie
- P. Technologies, "SCADA Safety in Numbers," Tech. Rep., 2012.
- N. Virvilis and D. Gritzalis, "The Big Four -What We Did Wrong in Advanced Persistent Threat Detection?" in 2013 International Conference on Availability, Reliability and Security. IEEE, sep 2013. doi: 10.1109/ARES.2013.32. ISBN 978-0-7695-5008-4 pp. 248-254. [Online]. Available: http://ieeexplore.ieee.org/lpdocs/epic03/ wrapper.htm?arnumber=6657248 otwiera się w nowej karcie
- ICS-CERT, "Alert (ICS-ALERT-14-281-01B) Ongoing Sophisticated Malware Campaign Compromising ICS (Update B)," 2014.
- A. Carcano, A. Coletta, M. Guglielmi, M. Masera, I. N. Fovino, and A. Trombetta, "A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems," Industrial Informatics, IEEE Transactions on, vol. 7, no. 2, pp. 179-186, 2011. doi: 10.1109/TII.2010.2099234 otwiera się w nowej karcie
- A. Felkner and A. Kozakiewicz, "More Practical Application of Trust Management Credentials," in Proceedings of the 2015 Federated Conference on Computer Science and Information Systems, ser. Annals of Computer Science and Information Systems, M. Ganzha, L. Maciaszek, and M. Paprzycki, Eds., vol. 5. IEEE, 2015. doi: 10.15439/2015F95 pp. 1125-1134. [Online]. Available: http: //dx.doi.org/10.15439/2015F95 otwiera się w nowej karcie
- O. Rysavy, J. Rab, and M. Sveda, "Improving security in SCADA systems through firewall policy analysis," in Proceedings of the 2013
- Federated Conference on Computer Science and Information Systems, M. P. M. Ganzha L. Maciaszek, Ed. IEEE, 2013, pp. pages 1423-- 1428. otwiera się w nowej karcie
- M. Chakraborty, N. Chaki, and A. Cortesi, "A New Intrusion Prevention System for Protecting Smart Grids from ICMPv6 Vulnerabilities," in Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, ser. Annals of Computer Science and Information Systems, M. P. M. Ganzha L. Maciaszek, Ed., vol. 2. IEEE, 2014. doi: 10.15439/2014F287 pp. pages 1539--1547. [Online]. otwiera się w nowej karcie
- Available: http://dx.doi.org/10.15439/2014F287 otwiera się w nowej karcie
- A. Bialas, "Experimentation tool for critical infrastructures risk management," in Proceedings of the 2015 Federated Conference on Computer Science and Information Systems, ser. Annals of Computer Science and Information Systems, M. Ganzha, L. Maciaszek, and M. Paprzycki, Eds., vol. 5. IEEE, 2015. doi: 10.15439/2015F77 pp. 1099-1106. [Online]. Available: http://dx.doi.org/10.15439/2015F77 otwiera się w nowej karcie
- H. Khurana, M. Hadley, and D. Frincke, "Smart-grid security issues," IEEE Security & Privacy Magazine, vol. 8, no. 1, pp. 81-85, jan 2010. doi: 10.1109/MSP.2010.49. [Online]. Available: http: //ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5403159 otwiera się w nowej karcie
- "DEnSeK (Distributed Energy Security Knowledge) -project website." [Online]. Available: http://www.densek.eu/ otwiera się w nowej karcie
- M. R. Endsley and D. J. Garland, Situation Awareness Analysis and Measurement. CRC Press, Inc., 2000. otwiera się w nowej karcie
- "Snort Home Page." [Online]. Available: http://www.snort.org/ otwiera się w nowej karcie
- Z. Zhou, "The study on network intrusion detection system of Snort," in 2010 International Conference on Networking and Digital Society, vol. 2. IEEE, may 2010. doi: 10.1109/ICNDS.2010.5479341. ISBN 978-1-4244-5162-3 pp. 194-196. otwiera się w nowej karcie
- OISF, "Suricata -Open Source IDS / IPS / NSM engine." [Online]. Available: http://suricata-ids.org/
- "The Bro Network Security Monitor," 2016. [Online]. Available: https://www.bro.org/ otwiera się w nowej karcie
- G. K. Varadarajan, "Web Application Attack Analysis Using Bro IDS," 2012. [Online]. Available: http://www.sans.org/reading-room/ whitepapers/detection/web-application-attack-analysis-bro-ids-34042
- "Argos," 2016. [Online]. Available: https://sourceforge.net/projects/ argos-scada-en/ otwiera się w nowej karcie
- [27] "Apache Kafka: a high-throughput distributed messaging system," 2016. [Online]. Available: http://kafka.apache.org/ otwiera się w nowej karcie
- "Druid." [Online]. Available: http://druid.io/ [29] A. September, "IEEE Standard Glossary of Software Engineering Terminology/IEEE Std 610.12-1990," p. 96, 1990. [Online]. otwiera się w nowej karcie
- J. Radatz, A. Geraci, and F. Katki, "IEEE standard glossary of software engineering terminology," IEEE Std, vol. 610121990, p. 121990, 1990. otwiera się w nowej karcie
- I. Burnstein, T. Suwanassart, and R. Carlson, "Developing a testing maturity model for sofiware test process evaluation," in Test Conference, 1996, 1996. ISBN 0780335406 pp. 581-589. otwiera się w nowej karcie
- R. Leszczyna, R. Małkowski, and M. R. Wróbel, "Testing Situation Awareness Network for the Electrical Power Infrastructure," Acta Ener- getica, vol. 1, pp. 270-276, 2015. otwiera się w nowej karcie
- P. Goodman, The Practical Implementation of Software Metrics. McGraw-Hill, Inc., 1993.
- S. Quadri and S. Farooq, "Notable Metrics in Software Testing," 5th Na- tional Conference on Computing For Nation Development -INDIACom- 2011, pp. 273-276, 2011.
- A. Kaur, B. Suri, and A. Sharma, "Software testing product metrics- A Survey," in National Conference on Challenges & Opportunities in Information Technology, 2007, pp. 1-6.
- A. Jaquith, Security Metrics, Replacing Fear, Uncertainty, and Doubt. Addison-Wesley Professional, 2007.
- Y. Chen, R. L. Probert, and K. Robeson, "Effective test metrics for test strategy evolution," pp. 111-123, 2004. otwiera się w nowej karcie
- D. Kang, D. Fuller, and V. Honavar, "Learning classifiers for misuse and anomaly detection using a bag of system calls representation," Sixth Annual IEEE SMC Information Assurance Workshop, 2005. doi: 10.1109/IAW.2005.1495942 otwiera się w nowej karcie
- J. L. Bayuk and A. Mostashari, "Measuring cyber security in intelligent urban infrastructure systems," in 2011 8th International Conference & Expo on Emerging Technologies for a Smarter World. Ieee, nov 2011. doi: 10.1109/CEWIT.2011.6135873. ISBN 978-1-4577-1591-4 pp. 1-6. otwiera się w nowej karcie
- W. Albert and T. Tullis, Measuring the user experience: collecting, analyzing, and presenting usability metrics. Newnes, 2013. ISBN
- Weryfikacja:
- Politechnika Gdańska
wyświetlono 104 razy
Publikacje, które mogą cię zainteresować
Security Information Sharing for the Polish Power System
- R. Leszczyna,
- M. Łosiński,
- R. Małkowski