Budget constrained optimal security hardening of control networks for critical cyber-infrastructures

被引:9
作者
Anwar, Zahid [1 ]
Montanari, Mirko [1 ]
Gutierrez, Alejandro [1 ]
Campbell, Roy H. [1 ]
机构
[1] Univ Illinois, Dept Comp Sci, Urbana, IL 61801 USA
关键词
Security Hardening; Power grid; IEEE 118 bus test; Budget constraints;
D O I
10.1016/j.ijcip.2009.02.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
080201 [机械制造及其自动化];
摘要
Competing schemes for security-hardening the power grid differ in their installation costs and the amount of coverage they provide against cyber attacks. Manually mapping schemes to vulnerable assets, where each asset has a unique degree of criticality in an arbitrary power network configuration, is a cumbersome process. Moreover finding an optimal scheme combination so as to maximize overall network security under a fixed budget constraint is an NP hard problem. In this paper we describe a dynamic programming solution to this problem and implement it along with logic-based models of the power grid, its control elements and best security practices as a tool-chain. The tool-chain takes, as input, a power network configuration, and the budget constraints and security schemes described in logic, determines the critical assets and automatically selects an optimal scheme combination to apply to maximize security. We demonstrate the feasibility of the tool chain implementation by security hardening the IEEE power system 118-bus test case from a pool of five different best-practice schemes. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:13 / 25
页数:13
相关论文
共 20 条
[1]
[Anonymous], 61850SER IEC
[2]
[Anonymous], 2008, SEL3021
[3]
Anwar Z., 2008, P 38 ANN IEEE IFIP I
[4]
Anwar Z., 2008, P 2 IFIP WG 11 10 IN
[5]
British Columbia Institute of Technology, 2001, IND SEC INC DAT
[6]
British Columbia Institute of Technology (BCIT), 2005, NISCC GOOD PRACT GUI
[7]
Dewri R., 2007, P 14 ACM C COMP COMM
[8]
Distributed Management Task Force, 2005, COMM INF MOD CIM DSP
[9]
Evans D.L., 2004, Standards for security categorization of federal information and information systems"
[10]
Lewis J.Blackburn., 2006, Protective Relaying-Principles and Applications, VThird