Abstract
SCADA systems represent a challenging scenario where the management of critical alarms is crucial. Their response to these alarms should be efficient and fast in order to mitigate or contain undesired effects. This work presents a mechanism, the Adaptive Assignment Manager (AAM) that will aid to react to incidences in a more efficient way by dynamically assigning alarms to the most suitable human operator. The mechanism uses various inputs for identifying the operators such as their availability, workload and reputation. In fact, we also define a reputation component that stores the reputation of the human operators and uses feedback from past experiences.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Jøsang, A., Ismail, R., Boyd, C.: A Survey of Trust and Reputation Systems for Online Service Provision. Decision Support Systems 43(2), 618–644 (2007)
Resnick, P., Zeckhauser, R., Friedman, E., Kuwabara, K.: Reputation Systems. Communications of ACM 43(12), 45–48 (2000)
Cardenas, A., Amin, S., Sastry, S.: Research Challenges for the Security of Control Systems. In: HotSec 2008 (2008)
Peerenboom, J.P., Fisher, R.E.: Analyzing Cross-Sector Interdependencies. In: IEEE Computer Society, HICSS 2007, pp. 112–119. IEEE Computer Society, Los Alamitos (2007)
Byres, E., Lowe, J.: The myths and facts behind cyber security risks for industrial control systems. In: ’VDE Congress, VDE Association For Electrical, Electronic Information Technologies, British Columbia Institute of Technology and PA Consulting Group (2004)
Department of Energy Office of Energy Assurance. In: Steps to Improve Cyber Security of SCADA Networks, white paper (2002)
NISCC, National Infrastructure Security Co-ordination Centre, NISCC Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks, BCIT (2005)
IEC 60870-5-104, International Electrotechnical Commission (2006)
IEC 60870-6, ICCP/TASE2, International Electrotechnical Commission (2008)
ISACA, Control Objectives for Information and related Technology, rev. 4.1 (2007)
ISO/IEC 17799:2005, Code of Practice for Information Security Management (2005)
NIST Special Publication 800-53 revision 2, Recommended Security Controls for Federal Information Systems (2007)
NIST Special Publication 800-82, DRAFT - Guide to Industrial Control Systems (ICS) Security (2007)
BCIT, British Columbia Institute of Technology (2008), http://www.bcit.ca/
CERT, Carnegie Mellon Software Engineering Institute, CERT/CC Statistics (1988-2008), http://www.cert.org/stats/vulnerability_remediation.html
DNP3, DNP Users Group (2008), http://www.dnp.org
Modbus-IDA, The Architecture for Distributed Automation (2005), http://www.modbus.org/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Alcaraz, C., Agudo, I., Fernandez-Gago, C., Roman, R., Fernandez, G., Lopez, J. (2009). Adaptive Dispatching of Incidences Based on Reputation for SCADA Systems. In: Fischer-Hübner, S., Lambrinoudakis, C., Pernul, G. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2009. Lecture Notes in Computer Science, vol 5695. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03748-1_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-03748-1_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-03747-4
Online ISBN: 978-3-642-03748-1
eBook Packages: Computer ScienceComputer Science (R0)