Cyber security automation for controlling distributed data

Cyber security policy making should seek solutions that leverage the expertise of both the private sector and federal Government and should be results-oriented and technology-neutral. Automated and semi-automated solutions are needed to keep up with the deluge of modern threats, but designing such systems requires a distributed architecture to support development and testing. Several such architectures exist, but most only focus on providing a platform for running cyber security experiments as opposed to automating experiment processes. In response to this need, we have built a distributed framework based on software agents which can manage system roles, automate data collection, analyze results, and run new experiments without human intervention. The contribution of this work is the creation of a model for experiment automation and control in a distributed system environment.

[1]  H. Vincent Poor,et al.  Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.

[2]  Zhu Han,et al.  Detection of false data injection in power grid exploiting low rank and sparsity , 2013, 2013 IEEE International Conference on Communications (ICC).

[3]  Gabor Karsai,et al.  A testbed for secure and robust SCADA systems , 2008, SIGBED.

[4]  James M. Keller,et al.  A fuzzy K-nearest neighbor algorithm , 1985, IEEE Transactions on Systems, Man, and Cybernetics.

[5]  Paulo Tabuada,et al.  Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.

[6]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[7]  John Wroclawski,et al.  Current Developments in DETER Cybersecurity Testbed Technology , 2009, 2009 Cybersecurity Applications & Technology Conference for Homeland Security.

[8]  Karl Henrik Johansson,et al.  On Security Indices for State Estimators in Power Networks , 2010 .

[9]  Vir V. Phoha,et al.  Cyber-physical Systems Security , 2014 .

[10]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[11]  Fan Yu Tao,et al.  Design of Two-Way One-Time-Password Authentication Scheme Based on True Random Numbers , 2009, 2009 Second International Workshop on Computer Science and Engineering.

[12]  Lang Tong,et al.  Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.