Copyright (c) 2008, All Rights Reserved. Iowa State University G. Manimaran & Chen-Ching LiuCPS-Energy Workshop-2009Page  1 SCADA control network.

Slides:



Advertisements
Similar presentations
The Threat Within September Copyright © 2004 Q1 Labs. All Rights Reserved Agenda Customer Pain Industry Solutions Network Behavior Enforcement Example.
Advertisements

Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
DARPA OASIS PI Meeting – Santa Fe – July 24-27, 2001Slide 1 Aegis Research Corporation Not for Public Release Survivability Validation Framework for Intrusion.
Xanthus Consulting International Smart Grid Cyber Security: Support from Power System SCADA and EMS Frances Cleveland
Team Dec13_11: Cole Hoven Jared Pixley Derek Reiser Rick Sutton Adviser/Client: Prof. Manimaran Govindarasu Graduate Assistant: Aditya Ashok PowerCyber.
Introducing Computer and Network Security
Trust, Privacy, and Security Moderator: Bharat Bhargava Purdue University.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
6. Analytical Techniques in EE Economic Impact Analysis (EIA) Environmental Impact Analysis (EIA) Regulatory Impact Analysis (RIA) Cost-Effectiveness Analysis.
(Geneva, Switzerland, September 2014)
Randy Marchany VA Tech Computing Center
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Cyber Threats/Security and System Security of Power Sector Workshop on Crisis & Disaster Management of Power Sector P.K.Agarwal, AGM Power System Operation.
Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats Mingkui Wei, Wenye Wang Department of Electrical and Computer.
K E M A, I N C. Current Status of Cyber Security Issues 2004 Keynote Address Joe Weiss January 20, 2004.
A project under the 7th Framework Programme CPS Workshop Stockholm 12/04/2010 Gunnar Björkman Project Coordinator A Security Project for the Protection.
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
Securing Information Systems
Cyber Security of Smart Grid Systems
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
CIS 2200 Kannan Mohan Department of CIS Zicklin School of Business, Baruch College.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design.
Thursday, January 23, :00 am – 11:30 am. Agenda  Cyber Security Center of Excellence  Project Phase  Implementation  Next Steps 2.
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
By Jim White WiredCity, Div. of OSIsoft Copyright c 2004 OSIsoft Inc. All rights reserved. Cyber Security Tools.
Cyber Terrorism Shawn Carpenter Computer Security Analyst
Project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Business Convergence WS#2 Smart Grid Technologies.
Cyber Security, Internet, and Wireless Networks Shigang Chen, Associate Professor Dept of Computer & Information Science & Engineering University of Florida.
CIP 2015 Smart Grid Vulnerability Assessment Using National Testbed Networks IHAB DARWISHOBINNA IGBETAREQ SAADAWI.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
Decision Support Systems: Modern information systems on the modern battlefield Steven P. Frysinger, Ph.D. Integrated Science and Technology and Computer.
Session title: Protection of Smart Utility Grids Group edited strategy.
Michael Oehler. This is Hard We are an equal opportunity intrusion detector. –Alerts occur irrespective of the mission impact. We are still incident focused.
Internet2 Abilene & REN-ISAC Arbor Networks Peakflow SP Identification and Response to DoS Joint Techs Winter 2006 Albuquerque Doug Pearson.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
By, CA K RAGHU, PAST PRESIDENT – INSTITUTE OF CHARTERED ACCOUNTANTS OF INDIA.
© 2006, iPolicy Networks, Inc. All rights reserved. Security Technology Correlation Proneet Biswas Sr. Security Architect iPolicy Networks
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Keynote 9: Cyber Security in Emerging C4I Systems: Deployment and Implementation Perspectives By Eric J. Eifert, Sr. VP of DarkMatter’s Managed Security.
Security and Resilience Pat Looney Brookhaven National Laboratory April 2016.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
A Layered Solution to Cybersecurity Dr. Erfan Ibrahim Cyber-Physical Systems Security & Resilience Center National Renewable Energy Laboratory.
Sensing and Measurements Tom King Oak Ridge National Laboratory April 2016.
Cyber Security of SCADA Systems Testbed Development May1013 Group Members: Ben Kregel Justin Fitzpatrick Michael Higdon Rafi Adnan Adviser: Dr. Manimaran.
Surveillance and Security Systems Cyber Security Integration.
Securing Information Systems
ISSeG Integrated Site Security for Grids WP2 - Methodology
Agenda Control systems defined
Detection and Analysis of Threats to the Energy Sector (DATES)
DISASTER MANAGEMENT – WITH SPECIAL EMPHASIS ON EARTHQUAKE
Securing Information Systems
Information Security CIS 9002 Kannan Mohan Department of CIS
Secure Control Systems - A Quantitative Risk Management Approach
Cyber Defense Matrix Cyber Defense Matrix
Four Generations of Security Devices Putting IDS in Context
Security as Risk Management
Cyber Risk & Cyber Insurance - Overview
Security Management Platform
Networking for Home and Small Businesses – Chapter 8
Wenyu Ren, Timothy Yardley, Klara Nahrstedt
M.Eng. Alessandro Mancuso Supervisor: Dr. Piotr Żebrowski
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Presentation transcript:

Copyright (c) 2008, All Rights Reserved. Iowa State University G. Manimaran & Chen-Ching LiuCPS-Energy Workshop-2009Page  1 SCADA control network

Copyright (c) 2008, All Rights Reserved. Iowa State UniversityPage  2 Cyber-Security Threats to Power Grid Internet-Based Attacks Protocol Attacks Intrusions Worms / Trojan Horse / Spyware Routing Attacks Denial of Service (DoS)

Copyright (c) 2008, All Rights Reserved. Iowa State UniversityPage  3 SCADA Network – Denial of service attack (model) Schematic of SCADA System Control Model of SCADA System Latency increase impact the real-time operation of the system

Copyright (c) 2008, All Rights Reserved. Iowa State University G. Manimaran & Chen-Ching LiuCPS-Energy Workshop-2009Page  4 Cyber-Physical Risk Modeling & Mitigation Framework Anomaly Detection Real-Time MonitoringResponses Impact Analysis

Copyright (c) 2008, All Rights Reserved. Iowa State UniversityPage  5 Research Challenges Real-time temporal and spatial correlations from substation level and control center networks Comprehensive validation using analytical and simulation, and test bed evaluations for directed and intelligent attacks Integrated modeling of attacks and their impacts in terms of load loss, equipment damage, and economic loss Relevant information from geographically dispersed substation network about potential suspicious activities, intrusions, in terms of severity A Comprehensive vulnerability assessment framework includes