A Novel Network Modeling and Evaluation Approach for Security Vulnerability Quantification in Substation Automation Systems

被引:4
|
作者
Ko, Jongbin [1 ]
Lee, Seokjun [1 ]
Lim, Yong-hun [2 ]
Ju, Seong-ho [2 ]
Shon, Taeshik [1 ]
机构
[1] Ajou Univ, Div Comp Engn, Suwon 441749, South Korea
[2] Korea Elect Power Corp, Res Inst, Taejon 305380, South Korea
来源
关键词
IEC; 61850; substation automation system; security vulnerability quantification; smart grid; 62351; CVSS; MTTC;
D O I
10.1587/transinf.E96.D.2021
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the proliferation of smart grids and the construction of various electric IT systems and networks, a next-generation substation automation system (SAS) based on IEC 61850 has been agreed upon as a core element of smart grids. However, research on security vulnerability analysis and quantification for automated substations is still in the preliminary phase. In particular, it is not suitable to apply existing security vulnerability quantification approaches to IEC 61850-based SAS because of its heterogeneous characteristics. In this paper, we propose an EEC 61850-based SAS network modeling and evaluation approach for security vulnerability quantification. The proposed approach uses network-level and device groupings to categorize the characteristic of the SAS. In addition, novel attack scenarios are proposed through a zoning scheme to evaluate the network model. Finally, an MTTC (Mean Time-to-Compromise) scheme is used to verify the proposed network model using a sample attack scenario.
引用
收藏
页码:2021 / 2025
页数:5
相关论文
共 50 条
  • [41] Proactive Approach for Security of the Infocommunication Network Based on Vulnerability Assessment
    Yevdokymenko, Maryna
    Shapovalova, Anastasiia
    Voloshchuk, Olena
    Carlsson, Anders
    2018 INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE: PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), 2018, : 609 - 612
  • [42] An ecological approach to sustainable development: Evaluation and quantification using geographic modeling systems
    Deal, B
    PROCEEDINGS OF THE 23RD NATIONAL PASSIVE SOLAR CONFERENCE, 1998, 23 : 339 - 344
  • [43] Using the vulnerability information of computer systems to improve the network security
    Lai, Yeu-Pong
    Hsia, Po-Lun
    COMPUTER COMMUNICATIONS, 2007, 30 (09) : 2032 - 2047
  • [44] A novel approach for Flexible Automation Production Systems
    Estevez, Elisabet
    Perez, Federico
    Orive, Dario
    Marcos, Marga
    2017 IEEE 15TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2017, : 695 - 699
  • [45] Performance Evaluation and Optimization of Asynchronous Time-Sensitive Networking in Substation Automation Systems
    Jia, Huibin
    Wu, Wenrui
    Wu, Kun
    Wang, Wei
    Liu, Yanyan
    Zheng, Tao
    IEEE TRANSACTIONS ON POWER DELIVERY, 2024, 39 (06) : 3481 - 3491
  • [46] Security Measures in Automation Systems - a Practice-Oriented Approach
    Treytl, Albert
    Sauter, Thilo
    Schwaiger, Christian
    ETFA 2005: 10TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION, VOL 2, PROCEEDINGS, 2005,
  • [47] Policy modeling and refinement for network security systems
    de Albuquerque, JP
    Krumm, H
    de Geus, PL
    SIXTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2005, : 24 - 33
  • [48] Vulnerability cloud: A novel approach to assess the vulnerability of critical infrastructure systems
    Meng, Lingpeng
    Yao, Xiaobo
    Chen, Qian
    Han, Chuanfeng
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (21):
  • [49] A Novel Comprehensive Network Security Assessment Approach
    Wang, Chunlu
    Wang, Yancheng
    Dong, Yingfei
    Zhang, Tianle
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [50] A novel quantitative approach for measuring network security
    Ahmed, Mohammad Salim
    Al-Shaer, Ehab
    Khan, Latifur
    27TH IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), VOLS 1-5, 2008, : 76 - 80