CRITICAL ENERGY INFRASTRUCTURE SURVIVABILITY , INHERENT LIMITATIONS

Information systems now form the backbone of nearly every government and private system, from targeting weapons to conducting financial transactions. Increasingly, these systems are networked together, allowing for distributed operations, sharing of databases, and redundant capability. Ensuring these networks are secure, robust, and reliable is critical for the strategic and economic wellbeing of a nation. The blackout of August 14, 2003, affected, in the U.S. alone, eight states and fifty million people and could cost up to $5 billion.1 The DOE/NERC interim reports2 indicate the outage progressed as a chain of relatively minor events consistent with previous cascading outages caused by a domino reaction. The increasing use of embedded distributed systems to manage and control our technologically complex society makes knowing the vulnerability of such systems essential to improving their intrinsic reliability/ survivability. Our discussion employs the power transmission grid.

[1]  Robin M. Ruefle,et al.  State of the Practice of Computer Security Incident Response Teams (CSIRTs) , 2003 .

[2]  Thomas E. Potok,et al.  An ontology-based software agent system case study , 2003, Proceedings ITCC 2003. International Conference on Information Technology: Coding and Computing.

[3]  Axel W. Krings,et al.  Secure and survivable software systems , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[4]  Axel W. Krings,et al.  A simple GSPN for modelling common mode failures in critical infrastructures , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[5]  Thomas E. Potok,et al.  Suitability of Agent-Based Systems for Command and Control in Fault-Tolerant, Safety-Critical Responsive Decision Networks , 2003, ISCA PDCS.

[6]  Frederick T. Sheldon,et al.  Modeling with Stochastic Message Sequence Charts , 2003 .

[7]  Axel W. Krings,et al.  Assessing Power Substation Network Security and Survivability: A Work in Progress Report , 2003, Security and Management.

[8]  Thomas E. Potok,et al.  VIPAR: Advanced Information Agents discovering knowledge in an open and changing environment , 2003 .

[9]  Thomas E. Potok,et al.  ENERGY INFRASTRUCTURE SURVIVABILITY, INHERENT LIMITATIONS, OBSTACLES AND MITIGATION STRATEGIES , 2003 .

[10]  Axel W. Krings,et al.  On the performance of a survivability architecture for networked computing systems , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[11]  Stefan Greiner,et al.  Examining Coincident Failures and Usage Profiles in Reliability Analysis of an Embedded Vehicle Sub-System , 2002, ESM.

[12]  Frederick T. Sheldon,et al.  Metrics for maintainability of class inheritance hierarchies , 2002, J. Softw. Maintenance Res. Pract..

[13]  Jim Alves-Foss,et al.  Risk Analysis and Probabilistic Survivability Assessment ( RAPSA ) : An Assessment Approach for Power Substation Hardening , 2002 .

[14]  Jim Alves-Foss,et al.  Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack , 2002 .

[15]  Stefan Greiner,et al.  Specification, safety and reliability analysis using stochastic Petri net models , 2000, Tenth International Workshop on Software Specification and Design. IWSSD-10 2000.

[16]  Jonathan Jacky,et al.  The Way of Z: Practical Programming with Formal Methods , 1996 .

[17]  Krishna M. Kavi,et al.  Reliability measurement: from theory to practice , 1992, IEEE Software.

[18]  N. Hanebutte,et al.  Considering Attack Complexity : Layered Intrusion Tolerance , .