Modeling Security of Power Communication Systems Using Defense Graphs and Influence Diagrams

被引:26
作者
Sommestad, Teodor [1 ]
Ekstedt, Mathias [1 ]
Nordstrom, Lars [1 ]
机构
[1] Royal Inst Technol, S-10044 Stockholm, Sweden
关键词
Communication system security; power system communication systems; supervisory control and data-acquisition (SCADA) systems;
D O I
10.1109/TPWRD.2009.2028796
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The purpose of this paper is to present a framework for assessing the security of wide-area networks(WANs) used to operate electrical power systems. The framework is based on the formalism influence diagrams and the concept of defense graphs and facilitates a so-called consequence-based analysis of the security problem. The framework is also capable of managing uncertainties, both related to the efficacy of countermeasures and the actual posture of the supervisory control and data-acquisition system. A model over WAN attacks and countermeasures and experiences from applying the framework are described.
引用
收藏
页码:1801 / 1808
页数:8
相关论文
共 34 条
[1]  
Ammann P, 2005, 21ST ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, P64
[2]  
Ammann P., 2002, P 9 ACM C COMP COMM, P217, DOI DOI 10.1145/586110.586140
[3]  
[Anonymous], DOBBS J DEC
[4]  
[Anonymous], 2006, Securing SCADA Systems
[5]  
[Anonymous], P WORKSH FORM METH C
[6]  
[Anonymous], 2002, Writing Secure Code
[7]  
[Anonymous], 2000, 17799 ISOIEC
[8]  
BETTATI R, 2003, P 23 INT C DISTR COM, P340
[9]  
Bistarelli S, 2007, LECT NOTES COMPUT SC, V4691, P1
[10]   Defense trees for economic evaluation of security investments [J].
Bistarelli, Stefano ;
Fioravanti, Fabio ;
Peretti, Pamela .
FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, :416-+