Ändra sökning
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Analyzing the effectiveness of attack countermeasures in a SCADA system
KTH, Skolan för elektro- och systemteknik (EES), Nätverk och systemteknik.ORCID-id: 0000-0001-7386-7471
KTH, Skolan för elektro- och systemteknik (EES), Nätverk och systemteknik.ORCID-id: 0000-0003-1464-6163
KTH, Skolan för elektro- och systemteknik (EES), Elkraftteknik.
KTH, Skolan för elektro- och systemteknik (EES), Nätverk och systemteknik.ORCID-id: 0000-0003-3922-9606
Visa övriga samt affilieringar
2017 (Engelska)Ingår i: Proceedings - 2017 2nd Workshop on Cyber-Physical Security and Resilience in Smart Grids, CPSR-SG 2017 (part of CPS Week), Association for Computing Machinery, Inc , 2017, s. 73-78Konferensbidrag (Refereegranskat)
Abstract [en]

The SCADA infrastructure is a key component for power grid operations. Securing the SCADA infrastructure against cyber intrusions is thus vital for a well-functioning power grid. However, the task remains a particular challenge, not the least since not all available security mechanisms are easily deployable in these reliability-critical and complex, multi-vendor environments that host modern systems alongside legacy ones, to support a range of sensitive power grid operations. This paper examines how effective a few countermeasures are likely to be in SCADA environments, including those that are commonly considered out of bounds. The results show that granular network segmentation is a particularly effective countermeasure, followed by frequent patching of systems (which is unfortunately still difficult to date). The results also show that the enforcement of a password policy and restrictive network configuration including whitelisting of devices contributes to increased security, though best in combination with granular network segmentation.

Ort, förlag, år, upplaga, sidor
Association for Computing Machinery, Inc , 2017. s. 73-78
Nyckelord [en]
Cyber security, SCADA system, Security controls, Threat modeling, Vulnerability assessment, Electric power system security, Electric power transmission networks, Legacy systems, SCADA systems, Smart power grids, Multi-vendor environment, Network configuration, Network segmentation, Power grid operations, Vulnerability assessments, Network security
Nationell ämneskategori
Datorsystem
Identifikatorer
URN: urn:nbn:se:kth:diva-216532DOI: 10.1145/3055386.3055393Scopus ID: 2-s2.0-85019036296ISBN: 9781450349789 (tryckt)OAI: oai:DiVA.org:kth-216532DiVA, id: diva2:1160937
Konferens
2nd Workshop on Cyber-Physical Security and Resilience in Smart Grids, CPSR-SG 2017, 21 April 2017
Anmärkning

QC 20171128

Tillgänglig från: 2017-11-28 Skapad: 2017-11-28 Senast uppdaterad: 2017-11-28Bibliografiskt granskad

Open Access i DiVA

Fulltext saknas i DiVA

Övriga länkar

Förlagets fulltextScopus

Personposter BETA

Korman, MatusVälja, MargusBjörkman, GunnarEkstedt, MathiasVernotte, AlexandreLagerström, Robert

Sök vidare i DiVA

Av författaren/redaktören
Korman, MatusVälja, MargusBjörkman, GunnarEkstedt, MathiasVernotte, AlexandreLagerström, Robert
Av organisationen
Nätverk och systemteknikElkraftteknik
Datorsystem

Sök vidare utanför DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetricpoäng

doi
isbn
urn-nbn
Totalt: 681 träffar
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf