Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2459976.2460046acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Intrinsically resilient energy control systems

Published: 08 January 2013 Publication History

Abstract

To preserve critical energy control functions while under attack, it is necessary to perform comprehensive analysis on the root cause and impact of an ongoing cyber intrusion without sacrificing the availability of energy delivery. In this position paper, we present a proof of concept of an intrinsically resilient energy control system, with the ultimate goal of ensuring availability/resiliency of energy delivery functions, along with the capability to assess root causes and impacts of cyber intrusions.

References

[1]
Aissa, A. B., Abercrombie, R. K., Sheldon, F. T., and Mili, A. 2010. Quantifying security threats and their potential impacts: a case study. Innovations in Systems and Software Engineering, Vol. 6, No. 4, pp. 269--281.
[2]
Amir, Y., Coan, B., Kirsch, J., and Lane, J. 2011. Prime: Byzantine Replication Under Attack. IEEE Transactions on Dependable and Secure Computing, Vol. 8 Issue 4.
[3]
Hieb, J., Graham, J., and Guan, J. 2009. An Ontology for Identifying Cyber Intrusion Induced Faults in Process Control Systems. Critical Infrastructure Protection III, IFIP AICT 311, pp. 125--138.
[4]
Kirsch, J., Goose, S., Amir, Y., and Skare, P. Toward Survivable SCADA. Proc. 7th Annual Cyber Security and Information Intelligence Research Workshop, Oak Ridge, TN, October 2011.
[5]
Sheldon, F. T., Abercrombie, R. K., and Mili, A. 2009. Methodology for Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission. Proc. the 42nd Hawaii International Conference on System Sciences.

Cited By

View all
  • (2014)Cyber situational awareness – A systematic review of the literatureComputers & Security10.1016/j.cose.2014.06.00846(18-31)Online publication date: Oct-2014

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
CSIIRW '13: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
January 2013
282 pages
ISBN:9781450316873
DOI:10.1145/2459976

Sponsors

  • Los Alamos National Labs: Los Alamos National Labs
  • Sandia National Labs: Sandia National Laboratories
  • DOE: Department of Energy
  • Oak Ridge National Laboratory
  • Lawrence Livermore National Lab.: Lawrence Livermore National Laboratory
  • BERKELEYLAB: Lawrence National Berkeley Laboratory
  • Argonne Natl Lab: Argonne National Lab
  • Idaho National Lab.: Idaho National Laboratory
  • Pacific Northwest National Laboratory
  • Nevada National Security Site: Nevada National Security Site

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 January 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. cybersecurity
  2. data integration
  3. energy control system
  4. intrusion-tolerant scada
  5. knowledge base
  6. ontology
  7. root cause analysis
  8. semantic annotation
  9. situational awareness

Qualifiers

  • Research-article

Funding Sources

Conference

CSIIRW '13
Sponsor:
  • Los Alamos National Labs
  • Sandia National Labs
  • DOE
  • Lawrence Livermore National Lab.
  • BERKELEYLAB
  • Argonne Natl Lab
  • Idaho National Lab.
  • Nevada National Security Site
CSIIRW '13: Cyber Security and Information Intelligence
January 8 - 10, 2013
Tennessee, Oak Ridge, USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2014)Cyber situational awareness – A systematic review of the literatureComputers & Security10.1016/j.cose.2014.06.00846(18-31)Online publication date: Oct-2014

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media