Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack

نویسندگان

  • Daniel Conte
  • Axel Krings
چکیده

In this paper, we present a model developed for Electric Power Management Systems (EPMS) and Supervisory Control and Data Acquisition (SCADA) systems that allows us to calculate device vulnerability and help power substation operators and administrators identify and harden those portions of the control system that are most vulnerable to cyber attack. We use graph theory to model electric power control and protection devices, and their associated connectivity. We introduce the concept of a device visibility path and use a small Prolog application to calculate a device vulnerability level for a target device within a hypothetical power substation. Our model sets the basis for a prototype expert system capable of answer questions about EPMS and SCADA systems such as: “Which is the most vulnerable device of our power substation under an attack scenario?” and “Why is this device highly vulnerable?” Although our focus and examples center on electric power control systems, our work has application in all real-time complex control systems, especially those found within critical infrastructures supporting today’s modern digital societies.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Effective Attack-Resilient Kalman Filter-Based Approach for Dynamic State Estimation of Synchronous Machine

Kalman filtering has been widely considered for dynamic state estimation in smart grids. Despite its unique merits, the Kalman Filter (KF)-based dynamic state estimation can be undesirably influenced by cyber adversarial attacks that can potentially be launched against the communication links in the Cyber-Physical System (CPS). To enhance the security of KF-based state estimation, in this paper...

متن کامل

A Methodology for Unified Assessment of Physical and Geographical Dependencies of Wide Area Measurement Systems in Smart Grids

Wide Area Measurement Systems (WAMS) enable real time monitoring and control of smart grids by combining digital measurement devices, communication and control systems. As WAMS consist of various infrastructures, they imply complex dependencies among their underlying systems and components of different types, such as cyber, physical and geographical dependencies. Although several works exist in...

متن کامل

Modeling and Designing Network Defense against Control Channel Jamming Attacks: A Passivity-Based Approach

Cyber-physical systems rely on distributed embedded wireless nodes for sensing, computation, and control, often leaving them vulnerable to intelligent attacks. Detecting and mitigating such attacks in a resource-efficient manner requires the network to identify the components under attack and adapt its response based on the observed network performance and attack impact. In this paper, we prese...

متن کامل

Modeling and Vulnerability Analysis of Cyber-Physical Power Systems Considering Network Topology and Power Flow Properties

Conventional power systems are developing into cyber-physical power systems (CPPS) with wide applications of communication, computer and control technologies. However, multiple practical cases show that the failure of cyber layers is a major factor leading to blackouts. Therefore, it is necessary to discuss the cascading failure process considering cyber layer failures and analyze the vulnerabi...

متن کامل

Accessible Remote Testbed for Cyber-Physical Systems Security of the Smart Grid

With growing concerns for cyber security of critical infrastructures like the power grid, Cyber-Physical Systems (CPS) security testbeds are essential in providing controlled testing environments for evaluating and validating novel CPS security tools and technologies, thereby accelerating the transition of research to industrial practice. The engineering of such testbeds requires significant in...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002