Endre søk
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Analyzing the effectiveness of attack countermeasures in a SCADA system
KTH, Skolan för elektro- och systemteknik (EES), Nätverk och systemteknik.ORCID-id: 0000-0001-7386-7471
KTH, Skolan för elektro- och systemteknik (EES), Nätverk och systemteknik.ORCID-id: 0000-0003-1464-6163
KTH, Skolan för elektro- och systemteknik (EES), Elkraftteknik.
KTH, Skolan för elektro- och systemteknik (EES), Nätverk och systemteknik.ORCID-id: 0000-0003-3922-9606
Vise andre og tillknytning
2017 (engelsk)Inngår i: Proceedings - 2017 2nd Workshop on Cyber-Physical Security and Resilience in Smart Grids, CPSR-SG 2017 (part of CPS Week), Association for Computing Machinery, Inc , 2017, s. 73-78Konferansepaper (Fagfellevurdert)
Abstract [en]

The SCADA infrastructure is a key component for power grid operations. Securing the SCADA infrastructure against cyber intrusions is thus vital for a well-functioning power grid. However, the task remains a particular challenge, not the least since not all available security mechanisms are easily deployable in these reliability-critical and complex, multi-vendor environments that host modern systems alongside legacy ones, to support a range of sensitive power grid operations. This paper examines how effective a few countermeasures are likely to be in SCADA environments, including those that are commonly considered out of bounds. The results show that granular network segmentation is a particularly effective countermeasure, followed by frequent patching of systems (which is unfortunately still difficult to date). The results also show that the enforcement of a password policy and restrictive network configuration including whitelisting of devices contributes to increased security, though best in combination with granular network segmentation.

sted, utgiver, år, opplag, sider
Association for Computing Machinery, Inc , 2017. s. 73-78
Emneord [en]
Cyber security, SCADA system, Security controls, Threat modeling, Vulnerability assessment, Electric power system security, Electric power transmission networks, Legacy systems, SCADA systems, Smart power grids, Multi-vendor environment, Network configuration, Network segmentation, Power grid operations, Vulnerability assessments, Network security
HSV kategori
Identifikatorer
URN: urn:nbn:se:kth:diva-216532DOI: 10.1145/3055386.3055393Scopus ID: 2-s2.0-85019036296ISBN: 9781450349789 (tryckt)OAI: oai:DiVA.org:kth-216532DiVA, id: diva2:1160937
Konferanse
2nd Workshop on Cyber-Physical Security and Resilience in Smart Grids, CPSR-SG 2017, 21 April 2017
Merknad

QC 20171128

Tilgjengelig fra: 2017-11-28 Laget: 2017-11-28 Sist oppdatert: 2017-11-28bibliografisk kontrollert

Open Access i DiVA

Fulltekst mangler i DiVA

Andre lenker

Forlagets fulltekstScopus

Personposter BETA

Korman, MatusVälja, MargusBjörkman, GunnarEkstedt, MathiasVernotte, AlexandreLagerström, Robert

Søk i DiVA

Av forfatter/redaktør
Korman, MatusVälja, MargusBjörkman, GunnarEkstedt, MathiasVernotte, AlexandreLagerström, Robert
Av organisasjonen

Søk utenfor DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric

doi
isbn
urn-nbn
Totalt: 681 treff
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf