Open Access Open Access  Restricted Access Subscription or Fee Access

Advance Defense Modeling for SCADA Systems

Suma Christal Mary, Renjini Jose

Abstract


The supervisory control and data acquisition (SCADA) systems are widely used in the industry for monitoring and control of the power grid. These systems include computer and communication devices. The computers used in SCADA systems are vulnerable to malicious attacks or other cyber impacts which subsequently will adversely affect the power infrastructure. The main objective of this work is to provide better cyber security for these computer systems. In this paper a supervisory control and data acquisition (SCADA) security framework with the following five components is proposed: 1) Real-time Monitoring; 2) Online monitoring; 3) Anomaly detection; 4) Impact analysis; and 5) Mitigation Strategies. For impact analysis an attack tree based methodology is used. Thus with these key features a fault-proof cyber security can be provided for SCADA system.

Keywords


Attack Tree, Cyber Security, SCADA, Vulnerability

Full Text:

PDF

References


A.Creery, E.J Byres(2005), ―Industrial Cyber Security for Power System and SCADA System‖, in IEEE PAPER

C.-C. Liu, C.-W. Ten, and G. Manimaran (2007), ―Vulnerability assessment of cyber security for SCADA systems using attack trees,‖ Proc. IEEE Power Eng. Soc. Gen. Meeting, Tampa, pp. 1–8

C.-C. Liu, C.-W. Ten, and G. Manimaran (2008), ―Vulnerability assessment of cyber security for SCADA systems,‖ IEEE Trans. Power Syst., vol. 23, no. 4, pp. 1836–1846.

Chee-WooiTen, Chen-Ching, Liu.Maimaran Govindarasu(2010),‖Cybersecurity for Critical Infrastructures: Attack and Defense Modeling‖, IEEE Trans. Systems, man, and cybernetics—part a: systems and humans, vol. 40.

J. Depoy, J. Phelan, P. Sholander, B. Smith, G. Varna do, and G. Wyss(2005), ―Risk assessment for physical and cyber-attacks on critical infrastructures, ―Proc. IEEE MILCOM, Oct. 17–20, vol. 3, pp. 1961–1969 2

W. L. McGill and B. M. Ayyub(2007), ―The meaning of vulnerability in the context of critical infrastructure protection,‖ in Critical Infrastructure Protection: Elements of Risk. Arlington, VA: School of Laws, George.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.