Cyber Risks in Energy Grid ICT Infrastructures

The objective of the chapter is to present the role of cyber security experiments within a methodological approach for the evaluation of cyber risks in grid control systems. As a starting point, a cyber-power risk index has been defined to support the identification of relevant risk factors across network attack models. Instances of attack models have been then experimented on an ICT architecture implementing grid operation scenarios with the double aim of evaluating the attacks’ effects by means of communication performance measures and of tuning the configuration of security mechanisms. The chapter discusses the results of a variety of attack experiments and their role in the calculation of the risk index.

[1]  Giannis Stamatellos,et al.  Computer Ethics and Neoplatonic Virtue: A Reconsideration of Cyberethics in the Light of Plotinus' Ethical Theory , 2011, Int. J. Cyber Ethics Educ..

[2]  Giovanna Dondossola,et al.  Performance evaluation of standard power grid communications experiencing cyber anomalies , 2011, 2011 50th FITCE Congress - "ICT: Bridging an Ever Shifting Digital Divide".

[3]  Sejung Marina Choi,et al.  Classifying Web Users: A Cultural Value-Based Approach , 2007 .

[4]  Kip Morison,et al.  REVIEW OF ON-LINE DYNAMIC SECURITY ASSESSMENT TOOLS AND TECHNIQUES , 2007 .

[5]  Judit Bar-Ilan Collaborative Information Behavior: User Engagement and Communication Sharing , 2011 .

[6]  Giovanna Dondossola,et al.  Assessment of power control systems communications through testbed experiments , 2009 .

[7]  Anne E. Cook,et al.  Attention Versus Learning of Online Content: Preliminary Findings from an Eye-Tracking Study , 2011, Int. J. Cyber Behav. Psychol. Learn..

[8]  M. Amin,et al.  Toward self-healing energy infrastructure systems , 2001 .

[9]  Geert Deconinck,et al.  Experiences with integrating recovery strategies into a primary substation automation system , 2003 .

[10]  Zheng Yan,et al.  A Pilot Study of Comparing Social Network Behaviors between Onlies and Others , 2015, Int. J. Cyber Behav. Psychol. Learn..

[11]  Stephen T. Kent,et al.  Security Architecture for the Internet Protocol , 1998, RFC.

[12]  Steven M. Rinaldi,et al.  Modeling and simulating critical infrastructures and their interdependencies , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[13]  Rüdiger Klein Information Modelling and Simulation in Large Dependent Critical Infrastructures - An Overview on the European Integrated Project IRRIIS , 2008, CRITIS.

[14]  G. Di Lembo,et al.  Integration of DSO control systems and TSO automatic load shedding system to improve the security of the national grid , 2009 .

[15]  G. Manimaran,et al.  Vulnerability Assessment of Cybersecurity for SCADA Systems , 2008, IEEE Transactions on Power Systems.

[16]  Sean P. Goggins,et al.  Collaborative Information Behavior in Completely Online Groups , 2010 .

[17]  Mathias Ekstedt,et al.  Modelling of cyber attacks for assessing smart grid security , 2011 .

[18]  Geert Deconinck,et al.  ICT resilience of power control systems: experimental results from the CRUTIAL testbeds , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.

[19]  Tuomo Kakkonen,et al.  Encyclopedia of Cyber Behavior Students ’ Cyber-Plagiarism , 2011 .

[20]  Silvano Chiaradonna,et al.  Quantification of dependencies between electrical and information infrastructures , 2012, Int. J. Crit. Infrastructure Prot..

[21]  Kirk St. Amant,et al.  Linguistic and Cultural Online Communication Issues in the Global Age , 2007 .

[22]  Mark Adamiak,et al.  IEC 61850 Communication Networks and Systems In Substations: An Overview for Users , 1988 .

[23]  Tony Li,et al.  Cisco Hot Standby Router Protocol (HSRP) , 1998, RFC.