Modelling SCADA and Corporate Network of a Medium Voltage Power Grid under Cyber Attacks
E. Ciancamerla, M. Minichino, S. Palmieri
2013
Abstract
There is an increasing concern over the cyber security of Critical Infrastructures (CI) due to the increasing ability of cyber attackers to cause even catastrophic failures. It is mainly due to the pervasiveness of ICT (Information and Communication Technologies) and to the consequent de isolation of SCADA (Supervision, Control and Data Acquisition) system, which represents the nervous system of most CIs. Cyber attacks could block the connection between SCADA Control Centre and its remote devices or insert fake commands/measurements in the equipment communications. With reference to an actual case study, constituted by a SCADA system controlling a portion of a medium voltage power grid and a corporate network, we discuss how cyber threats, vulnerabilities and attacks might degrade the functionalities of SCADA and corporate network, which, in turn, might lead to outages of the electrical grid. We represent SCADA and corporate network under malware propagation, Denial of Service and Man In The Middle attacks and predict their consequent performance degradation. Particularly, we use NetLogo to identify possible malware propagation in relation to SCADA & corporate security policies adopted from the utility and NS2 simulator to compute the consequences of the attacks on SCADA and in turn on power grid.
References
- Stamp J., Dillinger J., Young W., and DePoy J. 2003 Common vulnerabilities in critical infrastructure control systems. Technical report, Sandia National Laboratories, SAND2003-1772C.
- Shaw W.2004. SCADA system vulnerabilities to cyber attack. In Electric Energy Online. http://www.electricenergyonline.com/
- NARUC. 2012 Cybersecurity for state regulators.
- Kim HJ.2012. Security and vulnerability of SCADA systems over IP-based wireless sensor networks. International Journal of Distributed Sensor Networks, Volume 2012 (2012), Article ID 268478, 10 pages, 2012. doi:10.1155/2012/268478.
- Fuloria S., Anderson R., McGrath K., Hansen K., and Alvarez F. 2010. The protection of substation communications. SCADA Security
- Scientific Symposium, Jan 2010, http://www.cl.cam.ac.uk/
- American Gas Association 2006. Cryptographic protection of SCADA communications part 1: Background, policies and test plan. AGA Report no.12, Part. 1, http://scadahacker.com/library/Documents/Standards/
- Ahmed I., Obermeier S., Naedele M. and Richard G. 2012. Scada systems: Challenges for forensic investigators. IEEE Computer, 12/2012, pp 42-49 45(12).
- Byres E., Lissimore D., and Kube N. 2006. Who turned out the lights? - security testing for SCADA and control systems. In CanSecWest,, Vancouver, British Columbia, April, 2006.
- Tassier T. 2005. SIR model of epidemic. Epidemics and Development Policy, Fordham University NY. 2005
- Dua S. and Du X. 2011. Data Mining and Machine Learning in Cybersecurity, Boca Raton:CRC Press.
- Ciancamerla E., Minichino M, Palmieri S. 2012. On prediction of QoS of SCADA accounting cyber attacks Probabilistic Safety Assessment and Management Conference (PSAM11) and the Annual European Safety and Reliability Conference (ESREL 2012)
- IEC 60870-5-101 Telecontrol equipment and systems - Part 5-101: Transmission protocols - Companion standard for basic telecontrol tasks
- Queiroz C., Mahmood A., Hu J., Tari Z. and Yu X. 2009, Building a SCADA security testbed,Proceedings of the Third International Conference on Network and System Security, pp. 357-19364, 2009.
Paper Citation
in Harvard Style
Ciancamerla E., Minichino M. and Palmieri S. (2013). Modelling SCADA and Corporate Network of a Medium Voltage Power Grid under Cyber Attacks . In Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013) ISBN 978-989-8565-73-0, pages 123-134. DOI: 10.5220/0004523501230134
in Bibtex Style
@conference{secrypt13,
author={E. Ciancamerla and M. Minichino and S. Palmieri},
title={Modelling SCADA and Corporate Network of a Medium Voltage Power Grid under Cyber Attacks},
booktitle={Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)},
year={2013},
pages={123-134},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004523501230134},
isbn={978-989-8565-73-0},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)
TI - Modelling SCADA and Corporate Network of a Medium Voltage Power Grid under Cyber Attacks
SN - 978-989-8565-73-0
AU - Ciancamerla E.
AU - Minichino M.
AU - Palmieri S.
PY - 2013
SP - 123
EP - 134
DO - 10.5220/0004523501230134