Challenges in Power System Information Security
read more
Citations
Integrated Anomaly Detection for Cyber Security of the Substations
Intrusion detection in SCADA systems using machine learning techniques
Smart grid sensor data collection, communication, and networking: a tutorial
A Cybersecurity Detection Framework for Supervisory Control and Data Acquisition Systems
Security Challenges in Control Network Protocols: A Survey
References
Power System State Estimation : Theory and Implementation
False data injection attacks against state estimation in electric power grids
Stealth Attacks and Protection Schemes for State Estimators in Power Systems
Related Papers (5)
A Proposal for Key Policy of Symmetric Encryption Application to Cyber Security of KEPCO SCADA Network
Frequently Asked Questions (17)
Q2. How can one achieve an integrated security analysis mechanism for system architecture models?
By combining the Bayesian attack graphs with a system architecture modeling language one can achieve an integrated security analysis mechanism for system architecture models.
Q3. What is the main reason for using ICCP?
ICCP can operate on top of a variety of transport layer protocols, both connectionless and connection oriented, but most often it is used on top of TCP/IP.
Q4. What is the goal of the standardization efforts today?
The standardization efforts today focus mainly on power system models like the Common Information Model (CIM) with the goal to ease the exchange of engineering data between and within utilities.
Q5. What is the way to mitigate attacks?
One possible solution to mitigate the attacks even in the presence of compromised control centers is to use anonymity networks to establish overlay routing paths among the control centers.
Q6. What is the rationale for maintaining several associations?
The rationale for maintaining several associations is that the service level requirements of the information exchanged between two nodes spans a wide range, from realtime data exchange with stringent delay requirements to the bulk exchange of planning data and schedules.
Q7. What is the main idea behind the concept of attack graphs?
More detailed attack graphs require quantified conditional probabilities, which is an important area of ongoing work with some initial results in, e.g., [4].
Q8. What is the requirement for the modeling language?
An important requirement for this modeling language is that the assessment delivered by it should take a holistic approach to cyber security.
Q9. Why were security extensions standardized for S2CC?
Motivated by the increased use of shared communication channels and the spread of unmanned substations, security extensions that provide confidentiality, integrity and authentication were standardized for these protocols recently, such as the IEC62351-5 for IEC60870-5.
Q10. What is the way to mitigate traffic analysis attacks?
An attacker that monitors the data traffic of encrypted ICCP associations can use traffic analysis to extract information from the traffic patterns, e.g., it can detect the increase of data rates, which is typically a sign of abnormal system state, and can disable communications when it is most needed.
Q11. How can the deployment of new equipment be leveraged to improve system security?
Through the example of power system state estimation the authors showed how the deployment of new equipment can be leveraged to improve system security.
Q12. What are some of the common security practices used in power system control and operation systems?
The list of security mechanisms or practices can be made long; firewalls, access control, authentication mechanisms, hardened operating systems, secure communication, intrusion detection systems, just to mention a few.
Q13. What is the challenge of security design in power system control and operation systems?
in practice the challenge of security design in power system control and operation systems implies finding a proper level of trade-off between security, system properties like performance and reliability, and cost.
Q14. What is the trend in power system security?
Another trend is the use of standard communication interfaces to ensure interoperability between components from different vendors.
Q15. What is the typical life of a power system control and operation system?
A schematic figure of a power system control and operation system is shown in Fig. 1.A particular challenge when studying the security of power system control and operation systems is the mix of modern and legacy system components that are in operation.
Q16. What are some of the popular standards and reference reports?
There exist a number of standards and reference reports that cover several aspects of system security, some with a focus on industrial control systems.
Q17. What is the challenge of designing system security solutions?
a great challenge when designing system security solutions is to comprehend how all the implementable security measures affect and depend on each other: while some measures might complement each other, others might be counterproductive.