Securing Communication and Identifying Threats in RTUs: A Vulnerability Analysis

被引:2
|
作者
Ling, Engla Rencelj [1 ]
Cabus, Jose Eduardo Urrea [1 ]
Butun, Ismail [1 ]
Lagerstrom, Robert [1 ]
Olegard, Johannes [2 ]
机构
[1] KTH Royal Inst Technol, Div Network & Syst Engn, Stockholm, Sweden
[2] Stockholm Univ, Dept Comp & Syst Sci, Kista, Sweden
关键词
SCADA; smart grid; power grid; RTU; threat modelling; attack graph; penetration testing;
D O I
10.1145/3538969.3544483
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper investigates methods to secure Remote Terminal Units (RTUs) which are the building blocks of a smart grid systems - the next generation version to replace the power grid systems that are being used today. RTUs are identified as the heart of automation and control (SCADA) systems by the systems engineers. As such, security and maintaining nominal operability of such devices has prime importance, especially for the industrial automation networks such as the smart grid. A way of measuring the security of systems and networks is executing a series of cybersecurity weakness assessment tests called penetration testing. Another way of such an assessment is called vulnerability analysis by threat modelling which involves careful investigation and modelling of each and every component of a network/system under investigation. This article, aims at marrying these two methodologies for the vulnerability assessment of the RTUs in a methodological and scientific way.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] On the Application of IOT (Internet of Things) for Securing Industrial Threats
    Usman, Muhammad
    Abbas, Nazar
    PROCEEDINGS OF 2014 12TH INTERNATIONAL CONFERENCE ON FRONTIERS OF INFORMATION TECHNOLOGY, 2014, : 37 - 40
  • [22] Securing Web Access-DNS Threats and Remedies
    Sehgal, Anchal
    Dixit, Abhishek
    EMERGING TRENDS IN EXPERT APPLICATIONS AND SECURITY, 2019, 841 : 337 - 345
  • [23] Analysis of Security Vulnerability in Cooperative Communication Networks
    Kim, Ki Hong
    PROCEEDINGS OF ICNS 2011: THE SEVENTH INTERNATIONAL CONFERENCE ON NETWORKING AND SERVICES, 2011, : 80 - 84
  • [24] Securing unmanned autonomous systems from cyber threats
    Madan, Bharat B.
    Banik, Manoj
    Bein, Doina
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2019, 16 (02): : 119 - 135
  • [25] THE VULNERABILITY OF STEEL PRODUCTION TO MILITARY THREATS
    KEARTON, C
    MARTIN, B
    MATERIALS AND SOCIETY, 1990, 14 (01): : 11 - 44
  • [26] Vulnerability Analysis of Electric Power Communication Network
    Wu, Yucong
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 185 - 190
  • [27] Securing Distributed SGD Against Gradient Leakage Threats
    Wei, Wenqi
    Liu, Ling
    Zhou, Jingya
    Chow, Ka-Ho
    Wu, Yanzhao
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2023, 34 (07) : 2040 - 2054
  • [28] Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures
    Barrowclough, John Patrick
    Asif, Rameez
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [29] Vulnerability of chemical installations to external threats
    Heikkila, A. -M.
    Schabel, J.
    RISK, RELIABILITY AND SOCIETAL SAFETY, VOLS 1-3: VOL 1: SPECIALISATION TOPICS; VOL 2: THEMATIC TOPICS; VOL 3: APPLICATIONS TOPICS, 2007, : 2565 - 2570
  • [30] Communication - New threats
    不详
    ECONOMIC AND POLITICAL WEEKLY, 1996, 31 (10) : 570 - 570