Collaborative, trust-based security mechanisms for a regional Utility Intranet

被引:16
作者
Coates, Gregory M. [1 ]
Hopkinson, Kenneth M. [1 ]
Graham, Scott R. [1 ]
Kurkowski, Stuart H. [1 ]
机构
[1] USAF, Inst Technol, Dept Elect & Comp Engn, Wright Patterson AFB, OH 45433 USA
关键词
computer network security; computer networks; power system security; supervisory control and data acquisition (SCADA) systems;
D O I
10.1109/TPWRS.2008.926456
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper investigates network policies and mechanisms to enhance security in SCADA networks using a mix of TCP and UDP transport protocols over IP. It recommends creating a trust system that can be added in strategic locations to protect existing legacy architectures and to accommodate a transition to IP through the introduction of equipment based on modern standards such as IEC 61850. The trust system is based on a best-of-breed application of standard information technology (IT) network security mechanisms and IP protocols. The trust system provides seamless, automated command and control for the suppression of network attacks and other suspicious events. It also supplies access control, format validation, event analysis, alerting, blocking, and event logging at any network-level and can do so on behalf of any system that does not have the resources to perform these functions itself. Latency calculations are used to estimate limits of applicability within a company and between geographically separated company and area control centers, scalable to hierarchical regional implementations.
引用
收藏
页码:831 / 844
页数:14
相关论文
共 11 条
  • [1] Wide area protection - Technology and infrastructures
    Adamiak, MG
    Apostolov, AP
    Begovic, MM
    Heriville, CF
    Martin, KE
    Michel, GL
    Phadke, AG
    Thorp, JS
    [J]. IEEE TRANSACTIONS ON POWER DELIVERY, 2006, 21 (02) : 601 - 609
  • [2] [Anonymous], 2005, SECURING SCADA SYSTE
  • [3] Bailey D., 2003, Practical SCADA for Industry: Elsevier Science
  • [4] Overcoming communications challenges in software for monitoring and controlling power systems
    Birman, KP
    Chen, J
    Hopkinson, EM
    Thomas, RJ
    Thorp, JS
    Van Renesse, R
    Vogels, W
    [J]. PROCEEDINGS OF THE IEEE, 2005, 93 (05) : 1028 - 1041
  • [5] Bishop Matt, 2012, Computer Security: Art and Science
  • [6] Next generation SCADA security: Best practices and client puzzles
    Bowen, CL
    Buennemeyer, TK
    Thomas, RW
    [J]. Proceedings from the Sixth Annual IEEE Systems, Man and Cybernetics Information Assurance Workshop, 2005, : 426 - 427
  • [7] GRIMES M, 2005, P TOORCON 7 SAND DIE
  • [8] HOPKINSON KM, 2007, QUALITY SERVICE CONS
  • [9] Kurose J.F., 2004, COMPUTER NETWORKING, V3rd
  • [10] NIEDERMAYER H, 2006, P 13 GI ITG C MEAS M