Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics - Publikacja - MOST Wiedzy

Wyszukiwarka

Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics

Abstrakt

The contemporary electric power system is highly dependent on Information and Communication Technologies which results in its exposure to new types of threats, such as Advanced Persistent Threats (APT) or Distributed-Denial-of-Service (DDoS) attacks. The most exposed components are Industrial Control Systems in substations and Distributed Control Systems in power plants. Therefore, it is necessary to ensure the cyber security of this critical infrastructure and develop new cyber security technologies able to protect from advanced cyber threats. In this paper a pioneering Situation Awareness Network for the electric power system is presented together with a set of metrics for its testing..

Cytowania

  • 2

    CrossRef

  • 0

    Web of Science

  • 6

    Scopus

Cytuj jako

Pełna treść

pobierz publikację
pobrano 34 razy
Wersja publikacji
Accepted albo Published Version
Licencja
Creative Commons: CC-BY otwiera się w nowej karcie

Słowa kluczowe

Informacje szczegółowe

Kategoria:
Aktywność konferencyjna
Typ:
materiały konferencyjne indeksowane w Web of Science
Opublikowano w:
Annals of Computer Science and Information Systems nr 8, strony 743 - 749,
ISSN: 2300-5963
Tytuł wydania:
Proceedings of the 2016 Federated Conference on Computer Science and Information Systems strony 743 - 749
Rok wydania:
2016
Opis bibliograficzny:
Bolzoni D., Leszczyna R., Wróbel M..: Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics, W: Proceedings of the 2016 Federated Conference on Computer Science and Information Systems, 2016, ,.
DOI:
Cyfrowy identyfikator dokumentu elektronicznego (otwiera się w nowej karcie) 10.15439/2016f50
Bibliografia: test
  1. R. Kyusakov, J. Eliasson, J. Van Deventer, J. Delsing, and R. Cragie, "Emerging energy management standards and technologies -Chal- lenges and application prospects," in IEEE International Conference on Emerging Technologies and Factory Automation, ETFA, 2012. doi: 10.1109/ETFA.2012.6489674. ISBN 9781467347372 otwiera się w nowej karcie
  2. F. Maturana, R. Staron, K. Loparo, R. Ambre, and D. Carnahan, "Simulation-based environment for modeling distributed agents for smart grid energy management," in IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2011, 2011. doi: 10.1109/ETFA.2011.6059124. ISBN 9781457700187. ISSN 1946-0740 otwiera się w nowej karcie
  3. G. Dini and M. Tiloca, "On simulative analysis of attack impact in Wireless Sensor Networks," in IEEE International Conference on Emerging Technologies and Factory Automation, ETFA, 2013. doi: 10.1109/ETFA.2013.6648059. ISBN 9781479908622. ISSN 19460740 otwiera się w nowej karcie
  4. Y. Aillerie, S. Kayal, J.-p. Mennella, R. Samani, S. Sauty, and L. Schmitt, "Smart Grid Cyber Security," 2013.
  5. Y. Yan, Y. Qian, H. Sharif, and D. Tipper, "A Survey on Cyber Security for Smart Grid Communications," IEEE Communications Surveys & Tutorials, vol. 14, no. 4, pp. 998-1010, 2012. doi: 10.1109/SURV.2012.010912.00035. [Online]. Available: http: //ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6141833 otwiera się w nowej karcie
  6. W. Wang and Z. Lu, "Cyber security in the Smart Grid: Survey and challenges," Computer Networks, vol. 57, no. 5, pp. 1344-1371, apr 2013. doi: 10.1016/j.comnet.2012.12.017. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S1389128613000042 otwiera się w nowej karcie
  7. N. Falliere, L. O. Murchu, and E. Chien, "W32.Stuxnet Dossier," Symantec Security Response, Tech. Rep., 2011. otwiera się w nowej karcie
  8. D. Kushner, "The real story of stuxnet," IEEE Spectrum, vol. 50, pp. 48-53, 2013. doi: 10.1109/MSPEC.2013.6471059 otwiera się w nowej karcie
  9. P. Shakarian, J. Shakarian, and A. Ruef, Introduction to Cyber-warfare. Elsevier, 2013. ISBN 9780124078147. [Online]. Available: http: //www.sciencedirect.com/science/article/pii/B9780124078147000087 otwiera się w nowej karcie
  10. P. Technologies, "SCADA Safety in Numbers," Tech. Rep., 2012.
  11. N. Virvilis and D. Gritzalis, "The Big Four -What We Did Wrong in Advanced Persistent Threat Detection?" in 2013 International Conference on Availability, Reliability and Security. IEEE, sep 2013. doi: 10.1109/ARES.2013.32. ISBN 978-0-7695-5008-4 pp. 248-254. [Online]. Available: http://ieeexplore.ieee.org/lpdocs/epic03/ wrapper.htm?arnumber=6657248 otwiera się w nowej karcie
  12. ICS-CERT, "Alert (ICS-ALERT-14-281-01B) Ongoing Sophisticated Malware Campaign Compromising ICS (Update B)," 2014.
  13. A. Carcano, A. Coletta, M. Guglielmi, M. Masera, I. N. Fovino, and A. Trombetta, "A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems," Industrial Informatics, IEEE Transactions on, vol. 7, no. 2, pp. 179-186, 2011. doi: 10.1109/TII.2010.2099234 otwiera się w nowej karcie
  14. A. Felkner and A. Kozakiewicz, "More Practical Application of Trust Management Credentials," in Proceedings of the 2015 Federated Conference on Computer Science and Information Systems, ser. Annals of Computer Science and Information Systems, M. Ganzha, L. Maciaszek, and M. Paprzycki, Eds., vol. 5. IEEE, 2015. doi: 10.15439/2015F95 pp. 1125-1134. [Online]. Available: http: //dx.doi.org/10.15439/2015F95 otwiera się w nowej karcie
  15. O. Rysavy, J. Rab, and M. Sveda, "Improving security in SCADA systems through firewall policy analysis," in Proceedings of the 2013
  16. Federated Conference on Computer Science and Information Systems, M. P. M. Ganzha L. Maciaszek, Ed. IEEE, 2013, pp. pages 1423-- 1428. otwiera się w nowej karcie
  17. M. Chakraborty, N. Chaki, and A. Cortesi, "A New Intrusion Prevention System for Protecting Smart Grids from ICMPv6 Vulnerabilities," in Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, ser. Annals of Computer Science and Information Systems, M. P. M. Ganzha L. Maciaszek, Ed., vol. 2. IEEE, 2014. doi: 10.15439/2014F287 pp. pages 1539--1547. [Online]. otwiera się w nowej karcie
  18. Available: http://dx.doi.org/10.15439/2014F287 otwiera się w nowej karcie
  19. A. Bialas, "Experimentation tool for critical infrastructures risk management," in Proceedings of the 2015 Federated Conference on Computer Science and Information Systems, ser. Annals of Computer Science and Information Systems, M. Ganzha, L. Maciaszek, and M. Paprzycki, Eds., vol. 5. IEEE, 2015. doi: 10.15439/2015F77 pp. 1099-1106. [Online]. Available: http://dx.doi.org/10.15439/2015F77 otwiera się w nowej karcie
  20. H. Khurana, M. Hadley, and D. Frincke, "Smart-grid security issues," IEEE Security & Privacy Magazine, vol. 8, no. 1, pp. 81-85, jan 2010. doi: 10.1109/MSP.2010.49. [Online]. Available: http: //ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5403159 otwiera się w nowej karcie
  21. "DEnSeK (Distributed Energy Security Knowledge) -project website." [Online]. Available: http://www.densek.eu/ otwiera się w nowej karcie
  22. M. R. Endsley and D. J. Garland, Situation Awareness Analysis and Measurement. CRC Press, Inc., 2000. otwiera się w nowej karcie
  23. "Snort Home Page." [Online]. Available: http://www.snort.org/ otwiera się w nowej karcie
  24. Z. Zhou, "The study on network intrusion detection system of Snort," in 2010 International Conference on Networking and Digital Society, vol. 2. IEEE, may 2010. doi: 10.1109/ICNDS.2010.5479341. ISBN 978-1-4244-5162-3 pp. 194-196. otwiera się w nowej karcie
  25. OISF, "Suricata -Open Source IDS / IPS / NSM engine." [Online]. Available: http://suricata-ids.org/
  26. "The Bro Network Security Monitor," 2016. [Online]. Available: https://www.bro.org/ otwiera się w nowej karcie
  27. G. K. Varadarajan, "Web Application Attack Analysis Using Bro IDS," 2012. [Online]. Available: http://www.sans.org/reading-room/ whitepapers/detection/web-application-attack-analysis-bro-ids-34042
  28. "Argos," 2016. [Online]. Available: https://sourceforge.net/projects/ argos-scada-en/ otwiera się w nowej karcie
  29. [27] "Apache Kafka: a high-throughput distributed messaging system," 2016. [Online]. Available: http://kafka.apache.org/ otwiera się w nowej karcie
  30. "Druid." [Online]. Available: http://druid.io/ [29] A. September, "IEEE Standard Glossary of Software Engineering Terminology/IEEE Std 610.12-1990," p. 96, 1990. [Online]. otwiera się w nowej karcie
  31. J. Radatz, A. Geraci, and F. Katki, "IEEE standard glossary of software engineering terminology," IEEE Std, vol. 610121990, p. 121990, 1990. otwiera się w nowej karcie
  32. I. Burnstein, T. Suwanassart, and R. Carlson, "Developing a testing maturity model for sofiware test process evaluation," in Test Conference, 1996, 1996. ISBN 0780335406 pp. 581-589. otwiera się w nowej karcie
  33. R. Leszczyna, R. Małkowski, and M. R. Wróbel, "Testing Situation Awareness Network for the Electrical Power Infrastructure," Acta Ener- getica, vol. 1, pp. 270-276, 2015. otwiera się w nowej karcie
  34. P. Goodman, The Practical Implementation of Software Metrics. McGraw-Hill, Inc., 1993.
  35. S. Quadri and S. Farooq, "Notable Metrics in Software Testing," 5th Na- tional Conference on Computing For Nation Development -INDIACom- 2011, pp. 273-276, 2011.
  36. A. Kaur, B. Suri, and A. Sharma, "Software testing product metrics- A Survey," in National Conference on Challenges & Opportunities in Information Technology, 2007, pp. 1-6.
  37. A. Jaquith, Security Metrics, Replacing Fear, Uncertainty, and Doubt. Addison-Wesley Professional, 2007.
  38. Y. Chen, R. L. Probert, and K. Robeson, "Effective test metrics for test strategy evolution," pp. 111-123, 2004. otwiera się w nowej karcie
  39. D. Kang, D. Fuller, and V. Honavar, "Learning classifiers for misuse and anomaly detection using a bag of system calls representation," Sixth Annual IEEE SMC Information Assurance Workshop, 2005. doi: 10.1109/IAW.2005.1495942 otwiera się w nowej karcie
  40. J. L. Bayuk and A. Mostashari, "Measuring cyber security in intelligent urban infrastructure systems," in 2011 8th International Conference & Expo on Emerging Technologies for a Smarter World. Ieee, nov 2011. doi: 10.1109/CEWIT.2011.6135873. ISBN 978-1-4577-1591-4 pp. 1-6. otwiera się w nowej karcie
  41. W. Albert and T. Tullis, Measuring the user experience: collecting, analyzing, and presenting usability metrics. Newnes, 2013. ISBN
Weryfikacja:
Politechnika Gdańska

wyświetlono 104 razy

Publikacje, które mogą cię zainteresować

Meta Tagi