Toward an Intrusion-Tolerant Power Grid: Challenges and Opportunities

被引:3
|
作者
Babay, Amy [1 ]
Schultz, John [2 ]
Tantillo, Thomas [1 ]
Amir, Yair [1 ,2 ]
机构
[1] Johns Hopkins Univ, Baltimore, MD 21218 USA
[2] Spread Concepts LLC, Savage, MD USA
关键词
D O I
10.1109/ICDCS.2018.00132
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
While cyberattacks pose a relatively new challenge for power grid control systems, commercial cloud systems have needed to address similar threats for many years. However, technology and approaches developed for cloud systems do not necessarily transfer directly to the power grid, due to important differences between the two domains. We discuss our experience adapting intrusion-tolerant cloud technologies to the power domain and describe the challenges we have encountered and potential directions for overcoming those obstacles.
引用
收藏
页码:1321 / 1326
页数:6
相关论文
共 50 条
  • [31] Formal verification of an intrusion-tolerant group membership protocol
    Ramasamy, HV
    Cukier, M
    Sanders, WH
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2003, E86D (12): : 2612 - 2622
  • [32] An approach for availability evaluation of intrusion-tolerant server architectures
    Shi, Tingjun
    Zhao, Jinfeng
    Sang, Xia
    Yin, Xinchun
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 3, 2008, : 252 - 258
  • [33] Intrusion-Tolerant Framework for Heterogeneous Wireless Sensor Networks
    Sliti, Maha
    Hamdi, Mohamed
    Boudriga, Noureddine
    2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2009, : 633 - 636
  • [34] Intrusion-tolerant group management in enclaves -: (Transcript of discussion)
    Saïdi, H
    SECURITY PROTOCOLS, 2002, 2467 : 213 - 216
  • [35] A Network Intrusion-Tolerant System Based on Adaptive Algorithm
    Zhao, Hui
    Zheng, Shanhong
    Li, Wanlong
    Zhang, LiJuan
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 2890 - 2893
  • [36] Formal specification and verification of the intrusion-Tolerant enclaves protocol
    Computer Science Department, McGill University, 3480 University Street, Montreal, QC, Canada
    不详
    不详
    Int. J. Netw. Secur., 2007, 3 (288-298):
  • [37] Adaptation policies for web server intrusion-tolerant system
    Im, EG
    In, HP
    Choi, DS
    Song, YH
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (08) : 3462 - 3465
  • [38] Intrusion-tolerant based survivable model of database system
    Zhu, JM
    Wang, C
    Ma, JF
    CHINESE JOURNAL OF ELECTRONICS, 2005, 14 (03): : 481 - 484
  • [39] Experiences with building an intrusion-tolerant group communication system
    Ramasamy, HariGovind V.
    Pandey, Prashant
    Cukier, Michel
    Sanders, William H.
    SOFTWARE-PRACTICE & EXPERIENCE, 2008, 38 (06): : 639 - 666
  • [40] Availability analysis and comparison of different intrusion-tolerant systems
    Wang, C
    Ma, JF
    CONTENT COMPUTING, PROCEEDINGS, 2004, 3309 : 161 - 166