http://iet.metastore.ingenta.com
1887

access icon openaccess ARCADES: analysis of risk from cyberattack against defensive strategies for the power grid

  • HTML
    141.607421875Kb
  • XML
    159.021484375Kb
  • PDF
    4.424530982971191MB
Loading full text...

Full text loading...

/deliver/fulltext/iet-cps/3/3/IET-CPS.2017.0118.html;jsessionid=62p3rhtmmp9dn.x-iet-live-01?itemId=%2fcontent%2fjournals%2f10.1049%2fiet-cps.2017.0118&mimeType=html&fmt=ahah

References

    1. 1)
      • 1. Electricy Information Sharing and Analysis Center (E-ISAC)/SANS Institute: ‘Analysis of the cyber attack on the Ukrainian power grid: defense use case’, March 2016.
    2. 2)
      • 2. Idaho National Laboratory (INL): ‘NSTB assessments summary report: common industrial control system cyber security weaknesses’, May 2010.
    3. 3)
      • 3. North American Electricity Reliability Council (NERC): ‘NERC critical infrastructure protection (CIP) reliability standards’, 2015.
    4. 4)
      • 4. North American Electricity Reliability Council (NERC): ‘NERC CIP-005-5 – cyber security – electronic security perimeter’, November 2013.
    5. 5)
      • 5. Pfleeger, S., Cunningham, R.: ‘Why measuring security is hard’, IEEE Secur. Priv., 2010, 8, (4), pp. 4654.
    6. 6)
      • 6. Patapanchala, P.S., Huo, C., Bobba, R.B., et al: ‘Exploring security metrics for electric grid infrastructures leveraging attack graphs’. IEEE Conf. on Technologies and Sustainability, Phoenix, AZ, USA, April 2016.
    7. 7)
      • 7. Chopade, P., Bikdash, M.: ‘New centrality measures for assessing smart grid vulnerabilities and predicting brownouts and blackouts’, Int. J. Crit. Infrastruct. Prot., 2016, 12, pp. 2945.
    8. 8)
      • 8. Hahn, A., Govindarasu, M.: ‘Cyber attack exposure evaluation framework for the smart grid’, IEEE Trans. Smart Grid, 2010, 2, (4), pp. 835843.
    9. 9)
      • 9. Dacier, M., Deswarte, Y., Kaniche, M.: ‘Quantitative assessment of operational security: Models and tools’. LAAS Research Report, 964493, May 1996.
    10. 10)
      • 10. Dacier, M., Deswarte, Y.: ‘Priviledge graph: An extension to the typed access matrix model’. Proc. European Symp. Research in Computer Security, Berlin, Germany, 1994, pp. 319334.
    11. 11)
      • 11. Wang, L., Singhal, A., Jajodia, S.: ‘Toward measuring network security using attack graphs’. Proc. of the ACM Workshop on Quality of Protection, Virginia, USA, 2007.
    12. 12)
      • 12. LeMay, E., Ford, M.D., Keefe, K., et al: ‘Model-based security metrics using adversary view security evaluation (advise)’. Eighth Int. Conf. on Quantitative Evaluation of Systems (QEST), Aachen, Germany, September 2011, pp. 191200.
    13. 13)
      • 13. Manadhata, P., Wing, J.: ‘An attack surface metric’, IEEE Trans. Softw. Eng., 2010, 37, pp. 371386.
    14. 14)
      • 14. Wang, L., Jajodia, S., Singhal, A., et al: ‘k-zero day safety: a network security metric for measuring the risk of unknown vulnerabilities’, IEEE Trans. Dependable Secur. Comput., 2014, 11, (1), pp. 3044.
    15. 15)
      • 15. Ten, C.-W., Manimaran, G., Liu, C.-C.: ‘Cybersecurity for critical infrastructures: attack and defense modeling’, IEEE Trans. Syst. Man Cybernet. A, Syst. Humans, 2008, 23, (4), pp. 18361846.
    16. 16)
      • 16. Kundur, D., Feng, X., Liu, S., et al: ‘Towards a framework for cyber attack impact analysis of the electric smart grid’, IEEE SmartGridComm, Gaithersburg, MD, USA, 2010.
    17. 17)
      • 17. Zonouz, S.A., Berthier, R., Khurana, H., et al: ‘Seclius: an information flow-based, consequence-centric security metric’, IEEE Trans. Parallel Distrib. Syst., 2015, 26, (2), pp. 562573.
    18. 18)
      • 18. Stamp, J., McIntyre, A., Ricardson, B.: ‘Reliability impacts from cyber attack on electric power systems’. IEEE/PES Power Systems Conf. and Exposition, Seattle, May 2009, pp. 18.
    19. 19)
      • 19. Oman, P., Schweitzer, E., Roberts, J.: ‘Safeguarding IEDs, substations, and SCADA systems against electronic intrusions’. Proc. of the 2001 Western Power Delivery Automation Conf., Pullman, WA, USA, 2001, pp. 912.
    20. 20)
      • 20. Vellaithurai, C., Srivastava, A., Zonouz, S., et al: ‘CPIndex: cyber-physical vulnerability assessment for power-grid infrastructures’, IEEE Trans. Smart Grid, 2015, 6, (2), pp. 566575.
    21. 21)
      • 21. Zonouz, S., Davis, C.M., Davis, K.R., et al: ‘Socca: a security-oriented cyber-physical contingency analysis in power infrastructures’, IEEE Trans. Smart Grid, 2014, 5, (1), pp. 313.
    22. 22)
      • 22. Xiang, Y., Wang, L., Yu, D., et al: ‘Coordinated attacks against power grids: load redistribution attack coordinating with generator and line attacks’. IEEE Power Energy Society General Meeting, Denver, USA, July 2015, pp. 15.
    23. 23)
      • 23. Ernster, T.A., Srivastava, A.K.: ‘Power system vulnerability analysis towards validation of centrality measures’. IEEE PES Transmission and Distribution Conf. and Exposition, Florida, USA, 2012.
    24. 24)
      • 24. Verendel, V.: ‘Quantified security is a weak hypothesis: A critical survey of results and assumptions’. Proc. of the ACM Workshop on New Security Paradigms, New York, NY, USA, 2009, pp. 3750.
    25. 25)
      • 25. North American Electricity Reliability Council (NERC): ‘NERC CIP-007-5 – cyber security – systems security management’, November 2013.
    26. 26)
      • 26. North American Electricity Reliability Council (NERC): ‘NERC CIP-003-7 – cyber security – security management controls’, October 2014.
    27. 27)
      • 27. National Institute of Standards and Technologies (NIST): ‘Framework and roadmap for smart grid interoperability standards ‘release v3.0’’ (NIST Special Publication, Gaithersburg, MD, 2014).
    28. 28)
      • 28. North American Electricity Reliability Council (NERC): ‘NERC CIP-002-1 – cyber security – critical cyber assets identification’, June 2006.
    29. 29)
      • 29. North American Electricity Reliability Council (NERC): ‘NERC reliability concept-version 1.0.2’, December 2007.
    30. 30)
      • 30. Ten, C.-W., Liu, C.-C., Manimaran, G.: ‘Vulnerability assessment of cybersecurity for SCADA systems’, IEEE Trans. Power Syst., 2010, 40, (4), pp. 853865.
    31. 31)
      • 31. Gordon, L., Loeb, M.: ‘The economics of information security investment’, ACM Trans. Inf. Syst. Secur. (TISSEC), 2002, 5, pp. 438457.
    32. 32)
      • 32. Gordon, L., Loeb, M., Lucyshyn, W., et al: ‘Externalities and the magnitude of cyber security underinvestment by private sector firms: a modification of the Gordon-Loeb model’, J. Inf. Secur., 2014, 6, pp. 2430.
    33. 33)
      • 33. Hughes, J.: ‘Harmonization of IEC 61970, 61968, and 61850 models’. Electric Power Research Initiative (EPRI), Palo Alto, CA, USA, December 2006.
    34. 34)
      • 34. Estrada, E., Hatano, N.: ‘Resistance distance, information centrality, node vulnerability and vibrations in complex networks’, ‘Network science’ (Springer, London, 2010), pp. 1329.
    35. 35)
      • 35. Klein, D.J., Randic, M.: ‘Resistance distance’, J. Math. Chem., 1993, 12, (1), pp. 8195.
    36. 36)
      • 36. Bompard, E., Pons, E., Wu, D.: ‘Extended topological metrics for the analysis of power grid vulnerability’, IEEE Syst. J., 2012, 6, (3), pp. 481487.
    37. 37)
      • 37. North American Electricity Reliability Council (NERC): ‘Guidance for secure interactive remote access’, July 2011.
    38. 38)
      • 38. Univ. Washington: ‘Power systems test case archive’, Seattle, WA, USA.
    39. 39)
      • 39. Wang, W., Lu, Z.: ‘Cybersecurity in the smart grid: survey and challenges’, Comput. Netw., 2013, 57, (5), pp. 13441371.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-cps.2017.0118
Loading

Related content

content/journals/10.1049/iet-cps.2017.0118
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address