An authorization framework to mitigate insider threat in CIM-based smart grid

被引:0
|
作者
Mahmoudi-Nasr, Payam [1 ]
机构
[1] Univ Mazandaran, Comp Engn Dept, Babolsar, Iran
来源
关键词
CIM; Smart grid; Anomaly detection; Access control; AUTHENTICATION;
D O I
10.1016/j.segan.2024.101572
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
A smart grid (SG) is based on integrated data from distributed information systems, and the common information model (CIM) provides standard data infrastructure. In the SG, a malicious insider operator can lead to widespread failures in the power system by disrupting the system processes. The severity of the attack increases when he/she can access integrated data with legal permissions and steal, delete or modify them. This paper proposes an authorization framework to mitigate data access permissions of an insider operator who does not perform its duties properly in a CIM-based SG. In the proposed method, the accessibility of a CIM class is determined based on the operator trust and the criticality level of the issued SQL command. The value of the operator trust is calculated using its performance periodically or when an anomaly is detected. The proposed method is also able to detect anomalies in operator performance.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] A Multi-version CIM-Based Database Platform for Smart Grid
    Wang, Lan
    Murayama, Hiroshi
    IEEJ TRANSACTIONS ON ELECTRICAL AND ELECTRONIC ENGINEERING, 2015, 10 (03) : 330 - 339
  • [2] CIM-Based Smart Pose Detection Sensors
    Chou, Jyun-Jhe
    Chang, Ting-Wei
    Liu, Xin-You
    Wu, Tsung-Yen
    Chen, Yu-Kai
    Hsu, Ying-Tuan
    Chen, Chih-Wei
    Liu, Tsung-Te
    Shih, Chi-Sheng
    SENSORS, 2022, 22 (09)
  • [3] A conceptual framework for building CIM-based ontologies
    Lavinal, E
    Desprats, T
    Raynaud, Y
    INTEGRATED NETWORK MANAGEMENT VIII: MANAGING IT ALL, 2003, 118 : 135 - 138
  • [4] CIM-based integration in smart grids: Slovenian use cases
    Souvent, Andrej
    Kodek, Timotej
    Suljanovic, Nermin
    2019 18TH INTERNATIONAL SYMPOSIUM INFOTEH-JAHORINA (INFOTEH), 2019,
  • [5] Extraction of CIM-Based Distribution Grid Topology Information for Observability
    Shahid, Kamal
    Schiavone, Enrico
    Drenjanac, Domagoj
    Baeklund, Rasmus Pedersen
    Olsen, Rasmus L.
    Schwefel, Hans-Peter
    2019 15TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2019), 2019, : 165 - 170
  • [6] A Framework of Opportunity-Reducing Techniques to Mitigate the Insider Threat
    Padayachee, Keshnee
    2015 INFORMATION SECURITY FOR SOUTH AFRICA - PROCEEDINGS OF THE ISSA 2015 CONFERENCE, 2015,
  • [7] BLITHE: Behavior Rule-Based Insider Threat Detection for Smart Grid
    Bao, Haiyong
    Lu, Rongxing
    Li, Beibei
    Deng, Ruilong
    IEEE INTERNET OF THINGS JOURNAL, 2016, 3 (02): : 190 - 205
  • [8] Supervision of the CORBA environment with SUMO:: a WBEM/CIM-based management framework
    Bénech, D
    Jocteur-Monrozier, F
    Rivière, AI
    DOA'00: INTERNATIONAL SYMPOSIUM ON DISTRIBUTED OBJECTS AND APPL ICATIONS, PROCEEDINGS, 2000, : 241 - 250
  • [9] An authorization framework for a Grid based component architecture
    Ramakrishnan, L
    Rehn, H
    Alameda, J
    Ananthakrishnan, R
    Govindaraju, M
    Slominski, A
    Connelly, K
    Welch, V
    Gannon, D
    Bramley, R
    Hampton, S
    GRID COMPUTING - GRID 2002, 2002, 2536 : 169 - 180
  • [10] A Graph Based Framework for Malicious Insider Threat Detection
    Gamachchi, Anagi
    Sun, Li
    Boztas, Serdar
    PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 2638 - 2647