Toward an Intrusion-Tolerant Power Grid: Challenges and Opportunities

被引:3
|
作者
Babay, Amy [1 ]
Schultz, John [2 ]
Tantillo, Thomas [1 ]
Amir, Yair [1 ,2 ]
机构
[1] Johns Hopkins Univ, Baltimore, MD 21218 USA
[2] Spread Concepts LLC, Savage, MD USA
关键词
D O I
10.1109/ICDCS.2018.00132
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
While cyberattacks pose a relatively new challenge for power grid control systems, commercial cloud systems have needed to address similar threats for many years. However, technology and approaches developed for cloud systems do not necessarily transfer directly to the power grid, due to important differences between the two domains. We discuss our experience adapting intrusion-tolerant cloud technologies to the power domain and describe the challenges we have encountered and potential directions for overcoming those obstacles.
引用
收藏
页码:1321 / 1326
页数:6
相关论文
共 50 条
  • [1] Deploying Intrusion-Tolerant SCADA for the Power Grid
    Babay, Amy
    Schultz, John
    Tantillo, Thomas
    Beckley, Samuel
    Jordan, Eamon
    Ruddell, Kevin
    Jordan, Kevin
    Amir, Yair
    2019 49TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2019), 2019, : 328 - 335
  • [2] Network-Attack-Resilient Intrusion-Tolerant SCADA for the Power Grid
    Babay, Amy
    Tantillo, Thomas
    Aron, Trevor
    Platania, Marco
    Amir, Yair
    2018 48TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2018, : 255 - 266
  • [3] Intrusion-tolerant enclaves
    Dutertre, B
    Crettaz, V
    Stavridou, V
    2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, : 216 - 224
  • [4] Intrusion-tolerant intrusion detection system
    Yi, MK
    Hwang, CS
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2004, 3073 : 476 - 483
  • [5] A survey on intrusion-tolerant system
    Yoon, H. (hyoon@nslab.kaist.ac.kr), 1600, Korean Institute of Information Scientists and Engineers (07):
  • [6] Intrusion-Tolerant Autonomous Driving
    Volp, Marcus
    Esteves-Verissimo, Paulo
    2018 IEEE 21ST INTERNATIONAL SYMPOSIUM ON REAL-TIME DISTRIBUTED COMPUTING (ISORC 2018), 2018, : 130 - 133
  • [7] Practical Intrusion-Tolerant Networks
    Obenshain, Daniel
    Tantillo, Thomas
    Babay, Amy
    Schultz, John
    Newell, Andrew
    Hoque, Md. Endadul
    Amir, Yair
    Nita-Rotaru, Cristina
    PROCEEDINGS 2016 IEEE 36TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS ICDCS 2016, 2016, : 45 - 56
  • [8] An intrusion-tolerant mechanism for intrusion detection systems
    Kuang, Liwei
    Zulkernine, Mohammad
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 319 - +
  • [9] Intrusion-tolerant architectures:: Concepts and design
    Veríssimo, PE
    Neves, NF
    Correia, MP
    ARCHITECTING DEPENDABLE SYSTEMS, 2003, 2677 : 3 - 36
  • [10] An architecture for an adaptive intrusion-tolerant server
    Valdes, A
    Almgren, M
    Cheung, S
    Deswarte, Y
    Dutertre, B
    Levy, J
    Saïdi, H
    Stavridou, V
    Uribe, TE
    SECURITY PROTOCOLS, 2004, 2845 : 158 - 177