2019 North American Power Symposium (NAPS) 2019
DOI: 10.1109/naps46351.2019.9000344
|View full text |Cite
|
Sign up to set email alerts
|

Testbed-based Evaluation of SIEM Tool for Cyber Kill Chain Model in Power Grid SCADA System

Abstract: Development of a smarter electric grid necessitates addressing the associated cyber security challenges. Since the interdependence between the legacy grid infrastructure and advanced information technology is growing rapidly, there are numerous ways advanced, motivated, and persistent attackers can affect the SCADA based critical infrastructure. Hence, developing a security information and event management (SIEM) is crucial for securing the SCADA power system. This paper presents the application of Security On… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
1

Relationship

4
2

Authors

Journals

citations
Cited by 13 publications
(14 citation statements)
references
References 5 publications
0
14
0
Order By: Relevance
“…Although the centralized IDS is developed pertinent to the energy management system (EMS) applications like state estimation, automatic generation controller (AGC), etc., the multi-agents-based distributed IDS is also proposed in [12] to avoid a single point of failure while detecting anomalies in the decentralized protection scheme. Apart from the anomaly-based IDSs, several signature-based IDSs [13]- [16] are also proposed that perform deep packet inspection on the SCADA and synchrophasor communication protocols to detect cyber intrusions in real-time. Further, in [14], the authors show how two open-source IDS tools-Snort and BRO, can be utilized in detecting a data integrity attack using the timing information of two consecutive network packets and compared their performances in terms of accuracy and latency rates.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Although the centralized IDS is developed pertinent to the energy management system (EMS) applications like state estimation, automatic generation controller (AGC), etc., the multi-agents-based distributed IDS is also proposed in [12] to avoid a single point of failure while detecting anomalies in the decentralized protection scheme. Apart from the anomaly-based IDSs, several signature-based IDSs [13]- [16] are also proposed that perform deep packet inspection on the SCADA and synchrophasor communication protocols to detect cyber intrusions in real-time. Further, in [14], the authors show how two open-source IDS tools-Snort and BRO, can be utilized in detecting a data integrity attack using the timing information of two consecutive network packets and compared their performances in terms of accuracy and latency rates.…”
Section: Related Workmentioning
confidence: 99%
“…Several tools, tactics, and procedures (TTP) can be utilized in a sequence of steps as per the attack mechanism to perform successful stealthy cyber-attacks. The model consists of various processes or stages that are elaborated here, as discussed in [13]. 1.…”
Section: Cyber Kill Chain Mapping With Hidsmentioning
confidence: 99%
See 1 more Smart Citation
“…Detection (Defense) Module: It includes state-of-the-art detection and defense solutions, such as rule, model, and machine learning-based anomaly detection systems (ADSs), moving target defense (MTD), etc., as developed in earlier research efforts [41], [42], [44], which can be utilized to test, validate, and evaluate system performances with a detailed network analysis in this federated testbed environment.…”
Section: Discussionmentioning
confidence: 99%
“…1. IT-Based Attacks: IT-based attacks include traditional host and network-based attacksincluding scanning attacks (e.g., ping and Network Mapper (NMAP) scanning), DoS attacks, and spoofing attacks (e.g., IP spoofing, ARP poisoning)-that can be deployed in the SCADA environment to develop a blueprint of the network architecture and compromise power system devices [41].…”
Section: Cyber Eventsmentioning
confidence: 99%