Toward an Intrusion-Tolerant Power Grid: Challenges and Opportunities

被引:3
|
作者
Babay, Amy [1 ]
Schultz, John [2 ]
Tantillo, Thomas [1 ]
Amir, Yair [1 ,2 ]
机构
[1] Johns Hopkins Univ, Baltimore, MD 21218 USA
[2] Spread Concepts LLC, Savage, MD USA
关键词
D O I
10.1109/ICDCS.2018.00132
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
While cyberattacks pose a relatively new challenge for power grid control systems, commercial cloud systems have needed to address similar threats for many years. However, technology and approaches developed for cloud systems do not necessarily transfer directly to the power grid, due to important differences between the two domains. We discuss our experience adapting intrusion-tolerant cloud technologies to the power domain and describe the challenges we have encountered and potential directions for overcoming those obstacles.
引用
收藏
页码:1321 / 1326
页数:6
相关论文
共 50 条
  • [21] Intrusion-tolerant server architecture for survivable services
    Min, YJ
    JOURNAL OF SUPERCOMPUTING, 2005, 33 (1-2): : 93 - 102
  • [22] A novel intrusion-tolerant approach for Internet access
    Wen, Yan
    Zhao, Jinjing
    Wang, Huaimin
    2008 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING AND 2008 INTERNATIONAL PACIFIC WORKSHOP ON WEB MINING AND WEB-BASED APPLICATION, 2008, : 485 - +
  • [23] Intrusion-tolerant server architecture for survivable services
    Min B.J.
    Journal of Supercomputing, 2005, 33 (01): : 93 - 102
  • [24] BackupIT: An Intrusion-Tolerant Cooperative Backup System
    Loest, Sergio
    Madruga, Marcelo
    Maziero, Carlos
    Lung, Lau
    PROCEEDINGS OF THE 8TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, 2009, : 724 - +
  • [25] On the effects of finite memory on intrusion-tolerant systems
    Veronese, Giuliana Santos
    Correia, Miguel
    Lung, Lau Cheuk
    Verissimo, Paulo
    13TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2007, : 401 - 404
  • [26] DiveInto: Supporting Diversity in Intrusion-Tolerant Systems
    Antunes, Joao
    Neves, Nuno
    2011 30TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2011, : 137 - 146
  • [27] On the correctness of an intrusion-tolerant group communication protocol
    Layouni, M
    Hooman, J
    Tahar, S
    CORRECT HARDWARE DESIGN AND VERIFICATION METHODS, PROCEEDINGS, 2003, 2860 : 231 - 246
  • [28] Survivable SCADA Via Intrusion-Tolerant Replication
    Kirsch, Jonathan
    Goose, Stuart
    Amir, Yair
    Wei, Dong
    Skare, Paul
    IEEE TRANSACTIONS ON SMART GRID, 2014, 5 (01) : 60 - 70
  • [29] Intrusion-Tolerant Server Architecture for Survivable Services
    Byoung Min Joon
    The Journal of Supercomputing, 2005, 33 (1) : 93 - 102
  • [30] Intrusion-tolerant middleware -: The road to automatic security
    Verissimo, Paulo E.
    Neves, Nuno F.
    Cachin, Christian
    Poritz, Jonathan
    Powell, David
    Deswarte, Yves
    Stroud, Robert
    Welch, Ian
    IEEE SECURITY & PRIVACY, 2006, 4 (04) : 54 - 62