Skip to main content

A Methodology for Monitoring and Control Network Design

  • Conference paper
  • First Online:
Book cover Critical Information Infrastructures Security (CRITIS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10242))

  • 1765 Accesses

Abstract

The accelerated advancement of Industrial Control Systems (ICS) transformed the traditional and completely isolated systems view into a networked and inter-connected “system of systems” perspective. This has brought significant economical and operational benefits, but it also provided new opportunities for malicious actors targeting critical ICS. In this work we adopt a Cyber Attack Impact Assessment (CAIA) technique to develop a systematic methodology for evaluating the risk levels of ICS assets. The outcome of the risk assessment is integrated into an optimal control network design methodology. Experiments comprising the Tennessee Eastman chemical plant, the IEEE 14-bus electricity grid and the IEEE 300-bus New England electricity grid show the applicability and effectiveness of the developed methodology.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. AIMMS: Advanced Interactive Multidimensional Modeling System (2015). http://www.aimms.com/aimms/. Accessed May 2016

  2. Bilis, E., Kroger, W., Nan, C.: Performance of electric power systems under physical malicious attacks. IEEE Syst. J. 7(4), 854–865 (2013)

    Article  Google Scholar 

  3. Carro-Calvo, L., Salcedo-Sanz, S., Portilla-Figueras, J.A., Ortiz-Garca, E.: A genetic algorithm with switch-device encoding for optimal partition of switched industrial Ethernet networks. J. Netw. Comput. Appl. 33(4), 375–382 (2010)

    Article  Google Scholar 

  4. Chen, T., Abu-Nimeh, S.: Lessons from Stuxnet. Computer 44(4), 91–93 (2011)

    Article  Google Scholar 

  5. CrySiS Lab: sKyWIper (a.k.a. flame a.k.a. flamer): a complex malware for targeted attacks, May 2012

    Google Scholar 

  6. Downs, J.J., Vogel, E.F.: A plant-wide industrial process control problem. Comput. Chem. Eng. 17(3), 245–255 (1993)

    Article  Google Scholar 

  7. Ford, D.N.: A behavioral approach to feedback loop dominance analysis. Syst. Dyn. Rev. 15(1), 3–36 (1999)

    Article  Google Scholar 

  8. Genge, B., Haller, P., Kiss, I.: Cyber-security-aware network design of industrial control systems. IEEE Syst. J. 11(3), 1373–1384 (2015)

    Article  Google Scholar 

  9. Genge, B., Siaterlis, C.: Physical process resilience-aware network design for SCADA systems. Comput. Electr. Eng. 40(1), 142–157 (2014)

    Article  Google Scholar 

  10. Genge, B., Kiss, I., Haller, P.: A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures. IJCIP 10, 3–17 (2015)

    Google Scholar 

  11. Hines, P., Blumsack, S., Cotilla Sanchez, E., Barrows, C.: The topological and electrical structure of power grids. In: 2010 43rd Hawaii International Conference on System Sciences (HICSS), pp. 1–10, January 2010

    Google Scholar 

  12. Kiss, I., Genge, B., Haller, P.: Behavior-based critical cyber asset identification in Process Control Systems under Cyber Attacks. In: 16th Carpathian Control Conference (ICCC), pp. 196–201, May 2015

    Google Scholar 

  13. Kundur, D., Feng, X., Liu, S., Zourntos, T., Butler-Purry, K.: Towards a framework for cyber attack impact analysis of the electric smart grid. In: First SmartGridComm, pp. 244–249, October 2010

    Google Scholar 

  14. Nardo, M., Saisana, M., Saltelli, A., Tarantola, S., Hoffman, A., Giovannini, E.: Handbook on Constructing Composite Indicators. OECD Publishing, Paris (2005)

    Book  Google Scholar 

  15. Sandberg, H., Amin, S., Johansson, K.: Cyberphysical security in networked control systems: an introduction to the issue. IEEE Control Syst. 35(1), 20–23 (2015)

    Article  MathSciNet  Google Scholar 

  16. Sgouras, K., Birda, A., Labridis, D.: Cyber attack impact on critical smart grid infrastructures. In: 2014 IEEE PES Innovative Smart Grid Technologies Conference (ISGT), pp. 1–5, February 2014

    Google Scholar 

  17. Sridhar, S., Govindarasu, M.: Model-based attack detection and mitigation for automatic generation control. IEEE Trans. Smart Grid 5(2), 580–591 (2014)

    Article  Google Scholar 

  18. Symantec: Dragonfly: cyberespionage attacks against energy suppliers. Technical report (2014)

    Google Scholar 

  19. Zhang, L., Lampe, M., Wang, Z.: A hybrid genetic algorithm to optimize device allocation in industrial ethernet networks with real-time constraints. J. Zhejiang Univ. Sci. C 12(12), 965–975 (2011)

    Article  Google Scholar 

  20. Zhang, L., Lampe, M., Wang, Z.: Multi-objective topology design of industrial ethernet networks. Frequenz 66(5–6), 159–165 (2012)

    Google Scholar 

Download references

Acknowledgment

This work was supported by a Marie Curie FP7 Integration Grant within the 7th European Union Framework Programme (Grant no. PCIG14-GA-2013-631128).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to István Kiss .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kiss, I., Genge, B. (2017). A Methodology for Monitoring and Control Network Design. In: Havarneanu, G., Setola, R., Nassopoulos, H., Wolthusen, S. (eds) Critical Information Infrastructures Security. CRITIS 2016. Lecture Notes in Computer Science(), vol 10242. Springer, Cham. https://doi.org/10.1007/978-3-319-71368-7_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-71368-7_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-71367-0

  • Online ISBN: 978-3-319-71368-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics