2009 Fourth International Conference on Critical Infrastructures最新文献

筛选
英文 中文
Quantification of dependencies in electrical and information infrastructures: The CRUTIAL approach 电气和信息基础设施中依赖关系的量化:关键方法
2009 Fourth International Conference on Critical Infrastructures Pub Date : 2009-06-12 DOI: 10.1109/CRIS.2009.5071482
M. Beccuti, G. Franceschinis, S. Donatelli, S. Chiaradonna, F. Di Giandomenico, P. Lollini, G. Dondossola, F. Garrone
{"title":"Quantification of dependencies in electrical and information infrastructures: The CRUTIAL approach","authors":"M. Beccuti, G. Franceschinis, S. Donatelli, S. Chiaradonna, F. Di Giandomenico, P. Lollini, G. Dondossola, F. Garrone","doi":"10.1109/CRIS.2009.5071482","DOIUrl":"https://doi.org/10.1109/CRIS.2009.5071482","url":null,"abstract":"In this paper we present the CRUTIAL approach to model and quantify (inter)dependencies between the Electrical Infrastructure (EI) and the Information Infrastructures (II) that implements the EI control and monitoring system. The quantification is achieved through the integration of two models: one that concentrates more on the structure of the power grid and its physical quantities and one that concentrates on the behaviour of the control system supported by the II. The modelling approach is exemplified on a scenario whose goal is to study the effects of a II partial failure (a denial of service attack that compromises the communication network) on the remote control of the EI.","PeriodicalId":175538,"journal":{"name":"2009 Fourth International Conference on Critical Infrastructures","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130500979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Protection And tRuSt In FinanciAL infrastructures 对金融基础设施的保护和信任
2009 Fourth International Conference on Critical Infrastructures Pub Date : 2009-06-12 DOI: 10.1109/CRIS.2009.5071487
A. Pasic, J. Gresser
{"title":"Protection And tRuSt In FinanciAL infrastructures","authors":"A. Pasic, J. Gresser","doi":"10.1109/CRIS.2009.5071487","DOIUrl":"https://doi.org/10.1109/CRIS.2009.5071487","url":null,"abstract":"Protection And tRuSt In FinanciAL infrastructures (PARSIFAL) project is targeting this ambitious objective concerning coordination activities between the stakeholders necessary to protect CFI and information infrastructures, both today and tomorrow, and specifically those areas which span beyond a single bank or a single country.","PeriodicalId":175538,"journal":{"name":"2009 Fourth International Conference on Critical Infrastructures","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134257650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Criticality hierarchy procedure applied to software applications for electrical networks management 应用于电网管理软件应用的临界层次法
2009 Fourth International Conference on Critical Infrastructures Pub Date : 2009-06-12 DOI: 10.1109/CRIS.2009.5071493
M. Viziteu, Daniel Georges, R. Caire, N. Hadjsaid
{"title":"Criticality hierarchy procedure applied to software applications for electrical networks management","authors":"M. Viziteu, Daniel Georges, R. Caire, N. Hadjsaid","doi":"10.1109/CRIS.2009.5071493","DOIUrl":"https://doi.org/10.1109/CRIS.2009.5071493","url":null,"abstract":"This article presents a methodology to assess the most critical components of a given IT&C infrastructure. The focus is especially on the electric network management applications. The steps of this procedure are illustrated in a case study based on an industrial simulation tool performing technical operating tasks in distribution utilities. The obtained criticality hierarchy in our use case is correlated with the results of a previous criticality survey realized by the GRID* consortium","PeriodicalId":175538,"journal":{"name":"2009 Fourth International Conference on Critical Infrastructures","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126137433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Overview of the power systems security with regard to cyberattacks 关于网络攻击的电力系统安全概述
2009 Fourth International Conference on Critical Infrastructures Pub Date : 2009-06-12 DOI: 10.1109/CRIS.2009.5071500
C. Tranchita, N. Hadjsaid, A. Torres
{"title":"Overview of the power systems security with regard to cyberattacks","authors":"C. Tranchita, N. Hadjsaid, A. Torres","doi":"10.1109/CRIS.2009.5071500","DOIUrl":"https://doi.org/10.1109/CRIS.2009.5071500","url":null,"abstract":"The augmented use of ICTs in power systems, and the dependency of the electrical infrastructure on this type of technology has created a new form of vulnerability: ICTs are exposed to denominated “cyberattacks”. Due to this interaction as well as the importance of the electrical power systems, it is appropriate to assess the risk of how the power system security would be affected if it was subjected to this type of assaults. This paper is an overview of the main aspects related with the security of a power system with regard to cyberattacks and its assessment. Some definitions are recalled and completed with the aim of understanding what a cybernetic attack actually is, who the initiators of such an attack are, and what the possible consequences are. After, in order to assess the risk of power systems with regard to the possible consequences of cyberattacks, the use of a Bayesian network is proposed. The aim of this approach is to model the possible causes of cyberattacks against power systems and the consequences of such acts.","PeriodicalId":175538,"journal":{"name":"2009 Fourth International Conference on Critical Infrastructures","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131636712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Traffic Mining, feel the packets, be the packets 流量挖掘,感受数据包,成为数据包
2009 Fourth International Conference on Critical Infrastructures Pub Date : 2009-06-12 DOI: 10.1109/CRIS.2009.5071496
S. Burschka
{"title":"Traffic Mining, feel the packets, be the packets","authors":"S. Burschka","doi":"10.1109/CRIS.2009.5071496","DOIUrl":"https://doi.org/10.1109/CRIS.2009.5071496","url":null,"abstract":"The IP network introduced a new quality of threat when real infrastructures such as telecom, electrical, transport and banking systems were infiltrated by the virtual world with its standard PC HW and SW. Unnecessary high complexity, instable behaviour and a new kind of criminal activity arose, the targeted IT warfare. SW became an end in itself and a weapon. Nevertheless, we allowed and promoted the current situation violating the most basic principles of reliable design, testing and robustness. The general acceptance of product selection solemnly by economic and political factors demands now its toll. The talk will address reasons for todays calamity and motivates the current civil and military research efforts to solve the most urgent problems on a short and long time scale. It will also supply a short insight into the practice of Infrastructure Troubleshooting and Traffic Mining with regard to the danger of todays trust in tools instead of decent human knowledge. It will teach the audience the potential of the human brain, mining in IP data streams using KISS (Keep It Simple Stupid) tools on selected examples, such as Skype or VPN Tunnels. The positive magic of critical thinking, proper preprocessing and visually exploring of datasets will be demonstrated. Finally, the dark side, negative magic of spin doctors manipulating our brains by just throwing raw data at statistic tools or artificial intelligence producing any kind of nonsense will be shortly discussed.","PeriodicalId":175538,"journal":{"name":"2009 Fourth International Conference on Critical Infrastructures","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125289961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
After the fall of the financial industry, which critical infrastructure will be hit next? 在金融业崩溃之后,哪些关键基础设施将会受到冲击?
2009 Fourth International Conference on Critical Infrastructures Pub Date : 2009-06-12 DOI: 10.1109/CRIS.2009.5071488
Hugo M. Straumann
{"title":"After the fall of the financial industry, which critical infrastructure will be hit next?","authors":"Hugo M. Straumann","doi":"10.1109/CRIS.2009.5071488","DOIUrl":"https://doi.org/10.1109/CRIS.2009.5071488","url":null,"abstract":"The global trends have not changed lately: global socio-economic divisions, climate change, resource competition and maintaining security by military force [Oxford Research Group] remain on the top list. However the financial crisis has shifted the risk landscape dramatically [Global Risk 2009; WEF]. If extracting the root cause of this incident you find a company behavior or management pattern, which can be called “Fig-Leaf-Politics”. The same behavior can still be observed in other industries. Thus making them equally vulnerable for a future crash.","PeriodicalId":175538,"journal":{"name":"2009 Fourth International Conference on Critical Infrastructures","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116031196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart metering tariff schemes combined with distributed energy resources 智能计量电价方案与分布式能源相结合
2009 Fourth International Conference on Critical Infrastructures Pub Date : 2009-06-12 DOI: 10.1109/CRIS.2009.5071483
Geert Deconinck, B. Decroix
{"title":"Smart metering tariff schemes combined with distributed energy resources","authors":"Geert Deconinck, B. Decroix","doi":"10.1109/CRIS.2009.5071483","DOIUrl":"https://doi.org/10.1109/CRIS.2009.5071483","url":null,"abstract":"In the migration towards ICT-enabled power systems, smart metering plays a crucial role. Smart metering allows energy efficiency to be attained via price stimuli in different tariff schemes. An investigation of a case study for residential applications in Flanders shows that demand response allows substantial cost savings beyond the current double tariff rate. However, in the case for which distributed energy resources are available (photovoltaics and micro-CHP), it is not always beneficial to stimulate demand response based on price incentives when smart meters differentiate between the cost of electricity purchased or delivered.","PeriodicalId":175538,"journal":{"name":"2009 Fourth International Conference on Critical Infrastructures","volume":"291 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116877456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Collaboration in security assessments for critical infrastructures 在关键基础设施安全评估方面的合作
2009 Fourth International Conference on Critical Infrastructures Pub Date : 2009-06-12 DOI: 10.1109/CRIS.2009.5071499
F. Koster, Michael Klaas, H. Nguyen, Markus Brandle, S. Obermeier, Walter Brenne
{"title":"Collaboration in security assessments for critical infrastructures","authors":"F. Koster, Michael Klaas, H. Nguyen, Markus Brandle, S. Obermeier, Walter Brenne","doi":"10.1109/CRIS.2009.5071499","DOIUrl":"https://doi.org/10.1109/CRIS.2009.5071499","url":null,"abstract":"Security assessments for IT systems in critical infrastructures involve many different stakeholders. Only the combination of their knowledge can produce a comprehensive view of the system structure and of the vulnerabilities and threats to the system. In order to enable all stakeholders to update the assessment information on a regular basis, the collaboration process needs methodological and technical support. We formalize this process with regard to the ESSAM assessment method and introduce a central knowledge base that facilitates the intra-organizational collaboration between development teams for different systems.","PeriodicalId":175538,"journal":{"name":"2009 Fourth International Conference on Critical Infrastructures","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133067352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On-line parameter identification for excitation system based on PMU data 基于PMU数据的励磁系统在线参数辨识
2009 Fourth International Conference on Critical Infrastructures Pub Date : 2009-06-12 DOI: 10.1109/CRIS.2009.5071494
T. Bi, A. Xue, Guoyi Xu, Xiaolong Guo, Fei Ge, Zhengfeng Wang
{"title":"On-line parameter identification for excitation system based on PMU data","authors":"T. Bi, A. Xue, Guoyi Xu, Xiaolong Guo, Fei Ge, Zhengfeng Wang","doi":"10.1109/CRIS.2009.5071494","DOIUrl":"https://doi.org/10.1109/CRIS.2009.5071494","url":null,"abstract":"Parameter identification of excitation systems is of great importance for power system analysis, operation and control. In this paper, on-line parameter identification with PMU data is formulated as an optimization problem, which minimizes the exciter voltage error during a certain time. The errors are the differences between measured exciter voltage (field data) and simulated exciter voltage using identified parameters. The optimization problem is nonlinearity as it involves integrator and then solved by genetic algorithm (GA). Furthermore, to ensure the creditability of the solutions obtained with GA, the ordinal GA, which is a modification of GA with the philosophy of ordinal optimization, is applied. Case studies in Anhui power grid show the effectiveness of the proposed approach.","PeriodicalId":175538,"journal":{"name":"2009 Fourth International Conference on Critical Infrastructures","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114555764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Strategies to secure the IEEE 1588 protocol in digital substation automation 数字变电站自动化中IEEE 1588协议的安全策略
2009 Fourth International Conference on Critical Infrastructures Pub Date : 2009-06-12 DOI: 10.1109/CRIS.2009.5071498
J. Tournier, Otmar Goerlitz
{"title":"Strategies to secure the IEEE 1588 protocol in digital substation automation","authors":"J. Tournier, Otmar Goerlitz","doi":"10.1109/CRIS.2009.5071498","DOIUrl":"https://doi.org/10.1109/CRIS.2009.5071498","url":null,"abstract":"The IEEE 1588 Precision Time Protocol seems to be a promising way to handle the synchronization requirements of tomorrow's substation automation based on IEC 61850. While a specific working group is tackling the security aspects of the protocols defined by IEC 61850, a secure IEEE 1588 protocol remains mostly uncovered in the specific context of substation automation. In this paper, we are focusing on securing IEEE 1588 for substation automation. We are analyzing and classifying the different attacks relevant for a substation and proposing a way to handle the logical disconnection of the time server and its clients that appears whenever an attack occurs. The method based on clock drift correction allows to keep a node synchronized for different period of time depending on the correction mechanism used. The implementation and experiments of the different drift correction mechanisms shows the tradeoff between the accuracy of the correction and the required computational time. By analyzing the different experiments, we can then match the computational power of a class of devices present in a substation and a correction technique.","PeriodicalId":175538,"journal":{"name":"2009 Fourth International Conference on Critical Infrastructures","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134434279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信