skip to main content
10.1145/2517957.2517961acmotherconferencesArticle/Chapter ViewAbstractPublication PagesvizsecConference Proceedingsconference-collections
research-article

CyberSAVe: situational awareness visualization for cyber security of smart grid systems

Published:02 October 2013Publication History

ABSTRACT

We offer algorithms and visualization techniques for cyber trust in a Smart Grid system. Cyber trust is evaluated in terms of a mathematical model consisting of availability, detection and false alarm trust values, as well as a model of predictability. We develop a prototype Cyber Situational Awareness Visualization (CyberSAVe) tool to visualize cyber trust. We provide Operational Decision Aids (ODAs) displayed in context with a SCADA management information. We define cyber trust metrics, which are calculated and displayed in real-time in the Metric Assessment System (MAS) of CyberSAVe. We demonstrate the use of trust combined with visualization of trust to detect various types of attacks on the Smart Grid.

References

  1. J. Yan, Yi. Zhu, H. He, and Y. Sun, "Revealing Temporal Features of Attacks against Smart Grid," in Proc. IEEE Innovative Smart Grid Technologies Conference, Washington DC, February, 2013.Google ScholarGoogle Scholar
  2. Y. Zhu, J. Yan, Y. Sun, H. He, "Risk-Aware Vulnerability Analysis of Electric Grids from Attacker's Perspective", Proc. IEEE Innovative Smart Grid Technologies Conference, Washington DC, February, 2013.Google ScholarGoogle Scholar
  3. Y. Zhu, Y. Sun, and H. He, "Load Distribution Vector Based Attack Strategies against Power Grid Systems", IEEE GLOBECOM 2012, Dec. 2012.Google ScholarGoogle Scholar
  4. J. Yan, Y. Zhu, H. He, and Y. Sun "Multi-contingency Cascading Analysis of Smart Grid based on Self-organizing Map", IEEE Trans on Info. Forensics & Security, May 2013.Google ScholarGoogle Scholar
  5. Y. Chae, L. DiPippo, Y. Sun, Predictability Trust for Wireless Sensor Networks to Provide a Defense Against On/off Attack, Proc. 8th IEEE Int Conference on Collaborative Computing: Networking, Applications and Worksharing, October 2012, Pittsburgh, PA.Google ScholarGoogle Scholar
  6. Y. Sun, W. Yu, Z. Han, and K. J. R. Liu, "Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks", IEEE JSAC special issue on security in wireless ad hoc networks, Vol 24, no.2, February, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. W. Wang, Q. Cai, Y. Sun, and H. He, "Risk-aware attacks and catastrophic cascading failures in u.s. power grid," IEEE Global Telecommunications Conference, 2011, pp. 1--6.Google ScholarGoogle Scholar
  8. R. Baldick, B. Chowdhury, I. Dobson, Z. Dong, "Vulnerability assessment for cascading failures in electric power systems," in IEEE Power Engineering Society Power System Conference and Exposition, 2009.Google ScholarGoogle Scholar
  9. Y. Yan, Y. Qian, H. Sharif, D. Tipper, "A Survey on Cyber Security for Smart Grid Communications," IEEE Communications Surveys and Tutorials, vol. 14, no. 4, 2012.Google ScholarGoogle Scholar
  10. W. Wang, Z. Lu, "Cyber Security in the Smart Grid: Survey and Challenges," Computer Networks, vol. 57, issue 5, Elsevier, April 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. N. Elmqvist, P. Tsigas, "TrustNeighborhoods: Visualizing Trust in Distributed File Sharing Systems," Eurographics/IEEE-VGTC Symp. on Visualization, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. G. Coates, K. Hopkinson, S. Graham, S. Kurkowski, "A Trust System Architecture for SCADA Network Security," IEEE Transactions on Power Delivery, vol. 25, no. 1, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  13. L. Briesemeister, S. Cheung, U. Lindqvist, A. Valdes, "Detection, Correlation, and Visualization of Attacks Against Critical Infrastructure Systems," 8th Annual Conference on Privacy, Security and Trust, Aug. 2010.Google ScholarGoogle Scholar
  14. L. Harrison, A. Lu, "The Future of Security Visualization: Lessons from Network Visualization," IEEE Network, Nov/Dec 2012.Google ScholarGoogle Scholar
  15. D. Peng, W. Chen, Q. Peng, "TrustVis: Visualizing Trust Towards Attack Identification in Distributed Computing Environments," Security and Communication Networks, John Wiley and Sons, 2012.Google ScholarGoogle Scholar
  16. Y. Yang, T. Littler, S. Sezer, K. McLaughlin, and H. Wang, "Impact of cyber-security issues on smart grid", 2nd IEEE PES International Conference and Exhibition on Innovative Smart Grid Technologies, Dec 2011.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. CyberSAVe: situational awareness visualization for cyber security of smart grid systems

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      VizSec '13: Proceedings of the Tenth Workshop on Visualization for Cyber Security
      October 2013
      77 pages
      ISBN:9781450321730
      DOI:10.1145/2517957

      Copyright © 2013 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 2 October 2013

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      VizSec '13 Paper Acceptance Rate9of30submissions,30%Overall Acceptance Rate39of111submissions,35%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader