DocumentCode :
1507975
Title :
Cybersecurity for Critical Infrastructures: Attack and Defense Modeling
Author :
Ten, Chee-Wooi ; Manimaran, Govindarasu ; Liu, Chen-Ching
Author_Institution :
Sch. of Electr., Electron. & Mech. Eng., Univ. Coll. Dublin, Dublin, Ireland
Volume :
40
Issue :
4
fYear :
2010
fDate :
7/1/2010 12:00:00 AM
Firstpage :
853
Lastpage :
865
Abstract :
Disruption of electric power operations can be catastrophic on national security and the economy. Due to the complexity of widely dispersed assets and the interdependences among computer, communication, and power infrastructures, the requirement to meet security and quality compliance on operations is a challenging issue. In recent years, the North American Electric Reliability Corporation (NERC) established a cybersecurity standard that requires utilities´ compliance on cybersecurity of control systems. This standard identifies several cyber-related vulnerabilities that exist in control systems and recommends several remedial actions (e.g., best practices). In this paper, a comprehensive survey on cybersecurity of critical infrastructures is reported. A supervisory control and data acquisition security framework with the following four major components is proposed: (1) real-time monitoring; (2) anomaly detection; (3) impact analysis; and (4) mitigation strategies. In addition, an attack-tree-based methodology for impact analysis is developed. The attack-tree formulation based on power system control networks is used to evaluate system-, scenario -, and leaf-level vulnerabilities by identifying the system´s adversary objectives. The leaf vulnerability is fundamental to the methodology that involves port auditing or password strength evaluation. The measure of vulnerabilities in the power system control framework is determined based on existing cybersecurity conditions, and then, the vulnerability indices are evaluated.
Keywords :
SCADA systems; critical infrastructures; electricity supply industry; power engineering computing; power system control; security of data; trees (mathematics); North American Electric Reliability Corporation; anomaly detection; attack-tree formulation; communication infrastructure; computer infrastructure; critical infrastructure; cybersecurity standard; electric power operation; leaf vulnerability; mitigation strategy; national security; password strength evaluation; port auditing; power infrastructure; power system control network; real-time monitoring; supervisory control and data acquisition security; vulnerability index; Attack tree; cybersecurity; defense systems; power system control; security vulnerability;
fLanguage :
English
Journal_Title :
Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions on
Publisher :
ieee
ISSN :
1083-4427
Type :
jour
DOI :
10.1109/TSMCA.2010.2048028
Filename :
5477189
Link To Document :
بازگشت