LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Chen, T.; Sanchez-Aarnoutse, J. C.; Buford, J. (2011)
Languages: English
Types: Article
Subjects: QA75
This paper investigates the use of Petri nets for modeling coordinated cyber-physical attacks on the smart grid. Petri nets offer more flexibility and expressiveness than traditional attack trees to represent the actions of simultaneous attackers. However, Petri net models for attacks on very large critical infrastructures such as the smart grid require a great amount of manual effort and detailed expertise in cyber-physical threats. To overcome these obstacles, we propose a novel hierarchical method to construct large Petri nets from a number of smaller Petri nets that can be created separately by different domain experts. The construction method is facilitated by a model description language that enables identical places in different Petri nets to be matched. The new modeling approach is described for an example attack on smart meters, and its efficacy is demonstrated by a proof-of-concept Python program.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] S. Amin and B. Wollenberg, “Toward a smart grid,” IEEE Power and Energy Mag., vol. 3, pp. 34-41, May 2005.
    • [2] (2003, Jul.) Grid 2030: a national vision for electricity's second 100 years. U.S. Dept. of Energy. [Online]. Available: http://www. climatevision.gov/sectors/electricpower/pdfs/electric vision.pdf
    • [3] (2009, Jul.) Smart grid system report. U.S. Dept. of Energy. [Online]. Available: http://www.oe.energy.gov/SGSRMain 090707 lowres.pdf
    • [4] J. Fan and S. Borlase, “The evolution of distribution,” IEEE Power and Energy Mag., vol. 7, pp. 63-68, Feb. 2009.
    • [5] H. Farhangi, “The path of the smart grid,” IEEE Power and Energy Mag., vol. 8, pp. 18-28, Jan. 2010.
    • [6] T. Garrity, “Getting smart,” IEEE Power and Energy Mag., vol. 6, pp. 38-45, Feb. 2008.
    • [7] A. Ipakchi and F. Albuyeh, “Grid of the future,” IEEE Power and Energy Mag., vol. 7, pp. 52-62, Feb. 2009.
    • [8] Office of the National Coordinator for Smart Grid Interoperability, “Nist framework and roadmap for smart grid interoperability standards release 1.0,” NIST, MD, Tech. Rep. special publication 1108, Jan. 2010.
    • [9] T. Flick and J. Morehouse, Securing the Smart Grid. Burlington, MA: Syngress, 2011.
    • [10] F. Cleveland, “Cyber security issues for Advanced Metering Infrastructure (AMI),” in 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century, Pittsburgh, PA, Apr. 2008, pp. 1-5.
    • [11] F. Cohen, “The smarter grid,” IEEE Security and Privacy, vol. 8, pp. 60-63, Jan. 2010.
    • [12] H. Khurana, M. Hadley, L. Ning, and D. Frincke, “Smart-grid security issues,” IEEE Security and Privacy, vol. 8, pp. 81-85, Jan. 2010.
    • [13] P. McDaniel and S. McLaughlin, “Security and privacy challenges in the smart grid,” IEEE Security and Privacy, vol. 7, pp. 75-77, Mar. 2009.
    • [14] Smart Grid Interoperability Panel - Cyber Security Working Group, “Smart grid cyber security strategy and requirements,” NIST, MD, Tech. Rep. draft NISTIR 7628, Feb. 2010.
    • [15] T. Chen, “Survey of cyber security issues in smart grids,” in Cyber Security, Situation Management, and Impact Assessment II; and Visual Analytics for Homeland Defense and Security II (part of SPIE DSS 2010), Orlando, FL, Apr. 2010, p. 77090D.
    • [16] W. Kroger, “Critical infrastructures at risk: a need for a new conceptual approach and extended analytical tools,” Reliability Engineering and System Safety, vol. 93, pp. 1782-1787, Jan. 2008.
    • [17] S. Mauw and M. Oostdijk, “Foundations of attack trees,” in 8th Annual International Conference on Information Security and Cryptology (ICISC 2005), Seoul, Korea, Dec. 2005, pp. 186-198.
    • [18] K. Ingols, M. Chu, R. Lippmann, S. Webster, and S. Boyer, “Modeling modern network attacks and countermeasures using attack graphs,” in 2009 Annual Computer Sec. Applic. Conf. (ACSAC), Austin, TX, Dec. 2009, pp. 117-126.
    • [19] P. Khand, “System level security modeling using attack trees,” in 2nd Int. Conf. on Computer, Control and Commun. (ICA 2009), Karachi, Pakistan, Feb. 2009, pp. 1-6.
    • [20] K. Schneider, C.-C. Liu, and J.-P. Paul, “Assessment of interactions between power and telecommunications infrastructures,” IEEE Trans. Power Sys., vol. 21, pp. 1123-1130, Aug. 2006.
    • [21] C.-W. Ten, C.-C. Liu, and M. Govindarasu, “Vulnerability assessment of cybersecurity for scada systems using attack trees,” in IEEE Power Engineering Society General Meeting, Tampa, FL, Jun. 2007, pp. 1-6.
    • [22] S. McLaughlin, D. Podkuiko, and P. McDaniel, “Energy theft in the advanced metering infrastructure,” in 4th Int. Workshop on Critical Information Infrastructures Security (CRITIS 2009), Bonn, Germany, Sep. 2009, pp. 176-187.
    • [23] J. Peterson, “Petri nets,” ACM Computing Surveys, vol. 9, pp. 223-252, Sep. 1977.
    • [24] T. Murata, “Petri nets: properties, analysis and applications,” Proc. IEEE, vol. 77, pp. 541-580, Apr. 1989.
    • [25] M. Diaz, Petri Nets: Fundamental Models, Verification and Applications. NY: Wiley, 2009.
    • [26] V. Kordic, Petri Net Theory and Applications. Vienna: I-Tech Education and Publishing, 2008.
    • [27] R. David and H. Alla, Discrete, Continuous, and Hybrid Petri Nets. Berlin: Springer-Verlag, 2005.
    • [28] J. McDermott, “Attack net penetration testing,” in 2000 Workshop on New Security Paradigms (NSPW'00), Cork, Ireland, Sep. 2000, pp. 15- 21.
    • [29] G. Dalton, R. Mills, J. Colombi, and R. Raines, “Analyzing attack trees using generalized stochastic petri nets,” in 2006 IEEE Workshop on Info. Assurance, West Point, NY, Jun. 2006, pp. 116-123.
    • [30] R. Wu, W. Li, and H. Huang, “An attack modeling based on hierarchical colored petri nets,” in IEEE Int. Conf. on Comp. and Elec. Engin. (ICCEE 2008), Phuket, Thailand, Dec. 2008, pp. 918-921.
    • [31] O. Dahl and S. Wolthusen, “Modeling and execution of complex attack scenarios using interval timed colored petri nets,” in IEEE Int. Workshop on Innovative Arch. for Future Gen. High-Perf. Proc. and Sys., Kona, Hawaii, Jan. 2006, pp. 49-55.
    • [32] O. Gursesli and A. Desrochers, “Modeling infrastructure interdependencies using petri nets,” in 2003 IEEE Int. Conf. on Systems, Man and Cybernetics (SMC'03), Wash. DC, Oct. 2007, pp. 1506-1512.
    • [33] J.-C. Laprie, K. Kanoun, and M. Kaaniche, “Modelling interdependencies between the electricity and information infrastructures,” in 26th Int. Conf. on Computer Safety, Reliability and Security (SAFECOMP 2007), Nuremberg, Germany, Sep. 2007, pp. 54-67.
    • [34] S. Braynov and M. Jadliwala, “Representation and analysis of coordinated attacks,” in 2003 ACM Workshop on Formal Methods in Sec. Engin. (FMSE'03), Wash. DC, Oct. 2003, pp. 43-51.
    • [35] U. C. O. of Technology Assessment, Physical Vulnerability of Electric Systems to Natural Disasters and Sabotage, OTA-E-453. Wash. DC: U.S. Government Printing Office, 1990.
    • [36] U.-C. P. S. O. T. Force, “Final report on the august 14, 2003 blackout in the united states and canada: Causes and recommendations,” U.S.- Canada Power System Outage Task Force, Tech. Rep., Apr. 2004.
    • [37] (2008, Feb.) Advanced metering infrastructure. National Energy Technology Laboratory. [Online]. Available: http://www.netl.doe. gov/smartgrid/referenceshelf/whitepapers/AMI%20White%20paper% 20final%20021108%20%282%29%20APPROVED 2008 02 12.pdf
    • [38] (2009, Jun.) A vision for the smart grid. National Energy Technology Laboratory. [Online]. Available: http: //www.netl.doe.gov/smartgrid/referenceshelf/whitepapers/Whitepaper The%20Modern%20Grid%20Vision APPROVED 2009 06 18.pdf
    • [39] C.-W. Ten, C.-C. Liu, and M. Govindarasu, “Vulnerability assessment of cybersecurity for scada systems,” IEEE Trans. Power Sys., vol. 23, pp. 1836-1846, Nov. 2008.
    • [40] A. Creery and E. Byres, “Industrial cybersecurity for a power system and scada networks - be secure,” IEEE Industry Applications Mag., vol. 13, pp. 1836-1846, Jul. 2007.
    • [41] Z. Lukszo, G. Deconinck, and M. Weijnen, Securing Electricity Supply in the Cyber Age. Dordrecht: Springer, 2009.
    • [42] (2008, Dec.) AMI system security requirements v1.01. AMI Security Acceleration Project AMI-SEC Task Force (AMI-SEC-ASAP). [Online]. Available: http://www.oe.energy.gov/DocumentsandMedia/ 14-AMI System Security Requirements.pdf
    • [43] (2009, Dec.) Security profile for advanced metering infrastructure. Advanced Security Acceleration Project (ASAP-SG). Knoxville, TN. [Online]. Available: http://osgug.ucaiug.org/utilisec/amisec/Shared% 20Documents/AMI%20Security%20Profile%20(ASAP-SG)/AMI% 20Security%20Profile%20-%20v1 0.pdf
    • [44] A. Hamlyn et al., “Computer network security management and authentication of smart grids operations,” in 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century, Pittsburgh, PA, Jul. 2008, pp. 1-7.
    • [45] A. Metke and R. Ekl, “Smart grid security technology,” in 2010 Innovative Smart Grid Technologies (ISGT), Gaithersburg, MD, Jan. 2010, pp. 1-7.
  • No related research data.
  • No similar publications.

Share - Bookmark

Download from

Cite this article