Toward an Intrusion-Tolerant Power Grid: Challenges and Opportunities

被引:3
|
作者
Babay, Amy [1 ]
Schultz, John [2 ]
Tantillo, Thomas [1 ]
Amir, Yair [1 ,2 ]
机构
[1] Johns Hopkins Univ, Baltimore, MD 21218 USA
[2] Spread Concepts LLC, Savage, MD USA
关键词
D O I
10.1109/ICDCS.2018.00132
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
While cyberattacks pose a relatively new challenge for power grid control systems, commercial cloud systems have needed to address similar threats for many years. However, technology and approaches developed for cloud systems do not necessarily transfer directly to the power grid, due to important differences between the two domains. We discuss our experience adapting intrusion-tolerant cloud technologies to the power domain and describe the challenges we have encountered and potential directions for overcoming those obstacles.
引用
收藏
页码:1321 / 1326
页数:6
相关论文
共 50 条
  • [41] Dependability and performance evaluation of intrusion-tolerant server architectures
    Gupta, V
    Lam, V
    Ramasamy, HV
    Sanders, WH
    Singh, S
    DEPENDABLE COMPUTING, 2003, 2847 : 81 - 101
  • [42] Proactive Recovery in Intrusion-Tolerant System Based on TTCB
    Zhou Hua
    Zhou Hai-jun
    Ma Jian-feng
    2012 INTERNATIONAL CONFERENCE ON CONTROL ENGINEERING AND COMMUNICATION TECHNOLOGY (ICCECT 2012), 2012, : 799 - 802
  • [43] Distributed group membership algorithm in intrusion-tolerant system
    Yin, LH
    Fang, BX
    Yu, XZ
    ADVANCED WEB AND NETWORK TECHNOLOGIES, AND APPLICATIONS, PROCEEDINGS, 2006, 3842 : 511 - 515
  • [44] Intrusion-tolerant system design for web server survivability
    Choi, DS
    Im, EG
    Lee, CW
    INFORMATION SECURITY APPLICATIONS, 2003, 2908 : 124 - 134
  • [45] Secure and Intrusion-tolerant Communication in Wireless Mesh Networks
    Guo Yuan-bo
    Hao Yao-hui
    Wang Chao
    INTERNATIONAL CONFERENCE OF CHINA COMMUNICATION (ICCC2010), 2010, : 694 - +
  • [46] INSENS: Intrusion-tolerant routing for wireless sensor networks
    Deng, J
    Han, R
    Mishra, S
    COMPUTER COMMUNICATIONS, 2006, 29 (02) : 216 - 230
  • [47] Designing and Implementing a Diversity Policy for Intrusion-Tolerant Systems
    Heo, Seondong
    Lee, Soojin
    Jang, Bumsoon
    Yoon, Hyunsoo
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2017, E100D (01): : 118 - 129
  • [48] The Design of a Generic Intrusion-Tolerant Architecture for Web Servers
    Saidane, Ayda
    Nicomette, Vincent
    Deswarte, Yves
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2009, 6 (01) : 45 - 58
  • [49] Intrusion-Tolerant and Confidentiality-Preserving Publish/Subscribe Messaging
    Duan, Sisi
    Liu, Chao
    Wang, Xin
    Wu, Yusen
    Xu, Shuai
    Yesha, Yelena
    Zhang, Haibin
    2020 INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2020), 2020, : 319 - 328
  • [50] A performance evaluation of intrusion-tolerant routing in wireless sensor networks
    Deng, J
    Han, R
    Mishra, S
    INFORMATION PROCESSING IN SENSOR NETWORKS, PROCEEDINGS, 2003, 2634 : 349 - 364