首页> 外文会议>Conseil International des Grands Reseaux Electriques;International Council on Large Electric Systems;CIGRE session >Cyber attack modelling and security graded approach: key elements when designing security architecture for Electric Power Utilities (EPUs)
【24h】

Cyber attack modelling and security graded approach: key elements when designing security architecture for Electric Power Utilities (EPUs)

机译:网络攻击建模和安全分级方法:设计电力公用事业(EPU)安全体系结构时的关键要素

获取原文

摘要

The multiplication of access interfaces and technologies in Electric Power Utilities (EPUs)communication architectures and the smart grid developments, which will enable numerous newservices with new traffic patterns, will change radically both network accesses and core architectures.This evolution could introduce new vulnerabilities to the reliability of electricity supply, based on theintroduction and exposure of vulnerabilities in digital systems, architectures, and communications.This situation calls for new security requirements for digital systems and the underlying architectureused in EPUs. Security requirements have to be derived from appropriate risk assessments and generalarchitectural decisions. Numerous existing cyber security standards provide guidance and use-caseswhich represent valuable inputs for the development of such requirements. The proliferation ofstandards suggests, however, that the existing documents either do not meet completely the needs ofEPUs or are difficult to combine together. This paper focuses on two weak points of the existing cybersecurity standards in the area.Initially, the paper addresses the characterization, categorization and modeling of malicious cyberthreats, which represent key steps in a risk assessment process. The paper presents a conceptual modelexpressing the meaning and the links between the key concepts of cyber security risks. Following this,the work examines attack modeling, addressing some pertinent technical and architectural issues. Inaddition, the paper explains why attack modeling is central to risk assessment and present graphicalapproaches to attack modeling.The second part the paper addresses the use of security architecture principles, notably the gradedsecurity approach as a fundamental framework to classify and structure a process of risk mitigation bysecurity controls in both current and future EPU architectures. This discussion starts with theclarification of the terminology related to a graded security approach and then gives a generaloverview of the characteristics of known standards and best practices of graded security architectures.Following this, the paper presents an outlook of classification criteria to enable the implementation ofa graded security approach in a real world environment and then illustrates the effectiveness andadaptability of a graded security approach in a real-world attack case.
机译:电力公用事业(EPU)中访问接口和技术的多样性 通信架构和智能电网的发展,这将使众多新 具有新流量模式的服务将彻底改变网络访问和核心体系结构。 这种演进可能会基于以下因素为电力供应的可靠性带来新的漏洞: 引入和暴露数字系统,体系结构和通信中的漏洞。 这种情况要求对数字系统和基础体系结构提出新的安全要求。 在EPU中使用。安全要求必须来自适当的风险评估和一般性评估 建筑决策。大量现有的网络安全标准提供了指导和用例 代表了开发此类需求的宝贵投入。的扩散 但是,标准表明,现有文件或者不能完全满足以下要求: EPU还是很难合并在一起。本文着眼于现有网络的两个弱点 该地区的安全标准。 最初,本文针对恶意网络的特征,分类和建模进行了研究。 威胁,代表风险评估过程中的关键步骤。本文提出了一个概念模型 表达网络安全风险的关键概念之间的含义和联系。按照此, 这项工作研究了攻击建模,解决了一些相关的技术和体系结构问题。在 此外,本文还解释了为什么攻击建模对于风险评估至关重要,并提供了图形化的图表。 攻击建模方法。 本文的第二部分介绍了安全体系结构原理的使用,特别是分级 安全方法是分类和构建风险缓解流程的基本框架 当前和将来的EPU架构中的安全控制。讨论从 阐明与分级安全性方法有关的术语,然后给出一般性 分级安全体系结构的已知标准特性和最佳实践的概述。 在此之后,本文提出了分类标准的前景,以使实施 现实环境中的分级安全方法,然后说明其有效性和 分级安全方法在实际攻击案例中的适应性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号