Cyber security of the smart grid: Attack exposure analysis, detection algorithms, and testbed evaluation

作者: Adam Hahn

DOI: 10.31274/ETD-180810-3239

关键词:

摘要: While smart grid technologies are deployed to help achieve improved resiliency and efficiency, they also present an increased dependency on cyber resources which may be vulnerable attack. This dissertation introduces three components that provide new methods enhancing the security of grid. First, a quantitative exposure analysis model is presented assess risks inherited from communication computation critical information. An attack metric then means analyze model. The metric's utility demonstrated by analyzing environments contrast effectiveness various protection mechanisms evaluate impact vulnerabilities. Second, model-based intrusion detection system introduced identify attacks against electric substations. expands previous research incorporate temporal spatial substation control events in order differentiate normal communications. method incorporates hierarchical approach improve correlation physical sophisticated coordinated attacks. Finally, PowerCyber testbed as accurate cyber-physical environment facilitate future needs. implements layered control, communication, power layers while incorporating both industry standard along with simulation emulation techniques. testbed's efficacy evaluated performing exploring their simulations.

参考文章(68)
Bruno Dutertre, Steven Cheung, Martin Fong, Alfonso Valdes, Ulf Lindqvist, Keith Skinner, Using Model-based Intrusion Detection for SCADA Networks ,(2006)
Tim Yardley, Dong Jin, David C. Bergman, David M. Nicol, The virtual power system testbed and inter-testbed integration usenix security symposium. pp. 5- 5 ,(2009)
Marc Dacier, Yves Deswarte Mohamed Kaâniche, Quantitative Assessment of Operational Security: Models and Tools * ,(1996)
Giovanna Dondossola, Geert Deconinck, Fabrizio Garrone, Hakem Beitollahi, Testbeds for Assessing Critical Scenarios in Power Control Systems critical information infrastructures security. ,vol. 5508, pp. 223- 234 ,(2009) , 10.1007/978-3-642-03552-4_20
M. Dacier, Y. Deswarte, M. Kaâniche, Models and tools for quantitative assessment of operational security information security. pp. 177- 186 ,(1996) , 10.1007/978-1-5041-2919-0_15
Eric Cornelius, Mark Fabro, Recommended Practice: Creating Cyber Forensics Plans for Control Systems Idaho National Laboratory. ,(2008) , 10.2172/944209
Prem Uppuluri, R. Sekar, Experiences with Specification-Based Intrusion Detection recent advances in intrusion detection. pp. 172- 189 ,(2001) , 10.1007/3-540-45474-8_11
Richard C Dorf, None, The Electrical Engineering Handbook ,(1993)
Vaiman, Bell, Chen, Chowdhury, Dobson, Hines, Papic, Miller, Zhang, Risk Assessment of Cascading Outages: Methodologies and Challenges IEEE Transactions on Power Systems. ,vol. 27, pp. 631- 641 ,(2012) , 10.1109/TPWRS.2011.2177868