Securing Communication and Identifying Threats in RTUs: A Vulnerability Analysis

被引:2
|
作者
Ling, Engla Rencelj [1 ]
Cabus, Jose Eduardo Urrea [1 ]
Butun, Ismail [1 ]
Lagerstrom, Robert [1 ]
Olegard, Johannes [2 ]
机构
[1] KTH Royal Inst Technol, Div Network & Syst Engn, Stockholm, Sweden
[2] Stockholm Univ, Dept Comp & Syst Sci, Kista, Sweden
关键词
SCADA; smart grid; power grid; RTU; threat modelling; attack graph; penetration testing;
D O I
10.1145/3538969.3544483
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper investigates methods to secure Remote Terminal Units (RTUs) which are the building blocks of a smart grid systems - the next generation version to replace the power grid systems that are being used today. RTUs are identified as the heart of automation and control (SCADA) systems by the systems engineers. As such, security and maintaining nominal operability of such devices has prime importance, especially for the industrial automation networks such as the smart grid. A way of measuring the security of systems and networks is executing a series of cybersecurity weakness assessment tests called penetration testing. Another way of such an assessment is called vulnerability analysis by threat modelling which involves careful investigation and modelling of each and every component of a network/system under investigation. This article, aims at marrying these two methodologies for the vulnerability assessment of the RTUs in a methodological and scientific way.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Identifying Email Threats Using Predictive Analysis
    Zeng, Yuanyuan Grace
    2017 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), 2017,
  • [2] Securing IMS Against Novel Threats
    Wahl, Stefan
    Rieck, Konrad
    Laskov, Pavel
    Domschitz, Peter
    Mueller, Klaus-Robert
    BELL LABS TECHNICAL JOURNAL, 2009, 14 (01) : 243 - 257
  • [3] Systems Analysis of Vulnerability to Hydrometeorological Threats: An Exploratory Study of Vulnerability Drivers in Northern Zimbabwe
    Mavhura, Emmanuel
    INTERNATIONAL JOURNAL OF DISASTER RISK SCIENCE, 2019, 10 (02) : 204 - 219
  • [4] Systems Analysis of Vulnerability to Hydrometeorological Threats: An Exploratory Study of Vulnerability Drivers in Northern Zimbabwe
    Emmanuel Mavhura
    International Journal of Disaster Risk Science, 2019, 10 (02) : 204 - 219
  • [5] Systems Analysis of Vulnerability to Hydrometeorological Threats: An Exploratory Study of Vulnerability Drivers in Northern Zimbabwe
    Emmanuel Mavhura
    International Journal of Disaster Risk Science, 2019, 10 : 204 - 219
  • [6] Identifying Hotspots for Threats to Koalas Using Spatial Analysis
    Preece, H. J.
    MODSIM 2007: INTERNATIONAL CONGRESS ON MODELLING AND SIMULATION: LAND, WATER AND ENVIRONMENTAL MANAGEMENT: INTEGRATED SYSTEMS FOR SUSTAINABILITY, 2007, : 1294 - 1300
  • [7] AN ANALYSIS OF SECURITY THREATS IN VoIP COMMUNICATION SYSTEMS
    Neacsu, Eugen
    Schiopu, Paul
    PROCEEDINGS OF THE 2020 12TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTERS AND ARTIFICIAL INTELLIGENCE (ECAI-2020), 2020,
  • [8] Analysis of Security Threats and Vulnerability for Cyber-physical Systems
    Gao, Yang
    Peng, Yong
    Xie, Feng
    Zhao, Wei
    Wang, Dejin
    Han, Xuefeng
    Lug, Tianbo
    Lie, Zhao
    2013 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), 2013, : 50 - 55
  • [9] IDENTIFYING EXTINCTION THREATS
    SISK, TD
    LAUNER, AE
    SWITKY, KR
    EHRLICH, PR
    BIOSCIENCE, 1994, 44 (09) : 592 - 604
  • [10] Securing the Internet of Things: Challenges, threats and solutions
    Grammatikis, Panagiotis I. Radoglou
    Sarigiannidis, Panagiotis G.
    Moscholios, Ioannis D.
    INTERNET OF THINGS, 2019, 5 : 41 - 70