Digital Forensic Readiness in Critical Infrastructures: A Case of Substation Automation in the Power Sector

被引:9
作者
Iqbal, Asif [1 ,2 ]
Ekstedt, Mathias [1 ]
Alobaidli, Hanan [2 ]
机构
[1] KTH Royal Inst Technol, Sch Elect Engn, Stockholm, Sweden
[2] Athena Labs, Dubai, U Arab Emirates
来源
DIGITAL FORENSICS AND CYBER CRIME, ICDF2C 2017 | 2018年 / 216卷
关键词
Digital forensics; Forensic readiness; Substation automation; Smart grid; Forensic investigation; Critical infrastructures; SCADA SYSTEMS;
D O I
10.1007/978-3-319-73697-6_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The proliferation of intelligent devices has provisioned more functionality in Critical Infrastructures. But the same automation also brings challenges when it comes to malicious activity, either internally or externally. One such challenge is the attribution of an attack and to ascertain who did what, when and how? Answers to these questions can only be found if the overall underlying infrastructure supports answering such queries. This study sheds light on the power sector specifically on smart grids to learn whether current setups support digital forensic investigations or no. We also address several challenges that arise in the process and a detailed look at the literature on the subject. To facilitate such a study our scope of work revolves around substation automation and devices called intelligent electronic devices (IEDs) in smart grids.
引用
收藏
页码:117 / 129
页数:13
相关论文
共 34 条
  • [1] SCADA Systems: Challenges for Forensic Investigators
    Ahmed, Irfan
    Obermeier, Sebastian
    Naedele, Martin
    Richard, Golden G., III
    [J]. COMPUTER, 2012, 45 (12) : 44 - 51
  • [2] Critical infrastructure protection: Requirements and challenges for the 21st century
    Alcaraz, Cristina
    Zeadally, Sherali
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2015, 8 : 53 - 66
  • [3] Almas MS, 2018, IEEE T SMART GRID, V9, P4601, DOI [10.1109/TSG.2017.2665461, 10.1109/PESGM.2018.8586667]
  • [4] Almassalkhi Mads R., 2016, 2016 Power Systems Computation Conference (PSCC), P1, DOI 10.1109/PSCC.2016.7540981
  • [5] Ammann R., 2012, Network Forensic Readiness: a bottom-up approach for IPv6 networks
  • [6] [Anonymous], 2015, REP CYB CRIT INFR AM
  • [7] [Anonymous], 2016, CRITICAL INFRASTRUCT
  • [8] [Anonymous], 2011, StandardC37.118.1-2011, DOI [DOI 10.1109/IEEESTD.2011.6111219, 10.1109/IEEESTD.2011.6111219]
  • [9] [Anonymous], 2016, Analysis of the cyber attack on the Ukrainian power grid
  • [10] [Anonymous], 2011, IEEE Std C37.118.2-2011 (Revision of IEEE Std C37.118-2005), P1