ABSTRACT
We offer algorithms and visualization techniques for cyber trust in a Smart Grid system. Cyber trust is evaluated in terms of a mathematical model consisting of availability, detection and false alarm trust values, as well as a model of predictability. We develop a prototype Cyber Situational Awareness Visualization (CyberSAVe) tool to visualize cyber trust. We provide Operational Decision Aids (ODAs) displayed in context with a SCADA management information. We define cyber trust metrics, which are calculated and displayed in real-time in the Metric Assessment System (MAS) of CyberSAVe. We demonstrate the use of trust combined with visualization of trust to detect various types of attacks on the Smart Grid.
- J. Yan, Yi. Zhu, H. He, and Y. Sun, "Revealing Temporal Features of Attacks against Smart Grid," in Proc. IEEE Innovative Smart Grid Technologies Conference, Washington DC, February, 2013.Google Scholar
- Y. Zhu, J. Yan, Y. Sun, H. He, "Risk-Aware Vulnerability Analysis of Electric Grids from Attacker's Perspective", Proc. IEEE Innovative Smart Grid Technologies Conference, Washington DC, February, 2013.Google Scholar
- Y. Zhu, Y. Sun, and H. He, "Load Distribution Vector Based Attack Strategies against Power Grid Systems", IEEE GLOBECOM 2012, Dec. 2012.Google Scholar
- J. Yan, Y. Zhu, H. He, and Y. Sun "Multi-contingency Cascading Analysis of Smart Grid based on Self-organizing Map", IEEE Trans on Info. Forensics & Security, May 2013.Google Scholar
- Y. Chae, L. DiPippo, Y. Sun, Predictability Trust for Wireless Sensor Networks to Provide a Defense Against On/off Attack, Proc. 8th IEEE Int Conference on Collaborative Computing: Networking, Applications and Worksharing, October 2012, Pittsburgh, PA.Google Scholar
- Y. Sun, W. Yu, Z. Han, and K. J. R. Liu, "Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks", IEEE JSAC special issue on security in wireless ad hoc networks, Vol 24, no.2, February, 2006. Google ScholarDigital Library
- W. Wang, Q. Cai, Y. Sun, and H. He, "Risk-aware attacks and catastrophic cascading failures in u.s. power grid," IEEE Global Telecommunications Conference, 2011, pp. 1--6.Google Scholar
- R. Baldick, B. Chowdhury, I. Dobson, Z. Dong, "Vulnerability assessment for cascading failures in electric power systems," in IEEE Power Engineering Society Power System Conference and Exposition, 2009.Google Scholar
- Y. Yan, Y. Qian, H. Sharif, D. Tipper, "A Survey on Cyber Security for Smart Grid Communications," IEEE Communications Surveys and Tutorials, vol. 14, no. 4, 2012.Google Scholar
- W. Wang, Z. Lu, "Cyber Security in the Smart Grid: Survey and Challenges," Computer Networks, vol. 57, issue 5, Elsevier, April 2013. Google ScholarDigital Library
- N. Elmqvist, P. Tsigas, "TrustNeighborhoods: Visualizing Trust in Distributed File Sharing Systems," Eurographics/IEEE-VGTC Symp. on Visualization, 2007. Google ScholarDigital Library
- G. Coates, K. Hopkinson, S. Graham, S. Kurkowski, "A Trust System Architecture for SCADA Network Security," IEEE Transactions on Power Delivery, vol. 25, no. 1, 2010.Google ScholarCross Ref
- L. Briesemeister, S. Cheung, U. Lindqvist, A. Valdes, "Detection, Correlation, and Visualization of Attacks Against Critical Infrastructure Systems," 8th Annual Conference on Privacy, Security and Trust, Aug. 2010.Google Scholar
- L. Harrison, A. Lu, "The Future of Security Visualization: Lessons from Network Visualization," IEEE Network, Nov/Dec 2012.Google Scholar
- D. Peng, W. Chen, Q. Peng, "TrustVis: Visualizing Trust Towards Attack Identification in Distributed Computing Environments," Security and Communication Networks, John Wiley and Sons, 2012.Google Scholar
- Y. Yang, T. Littler, S. Sezer, K. McLaughlin, and H. Wang, "Impact of cyber-security issues on smart grid", 2nd IEEE PES International Conference and Exhibition on Innovative Smart Grid Technologies, Dec 2011.Google ScholarCross Ref
Index Terms
- CyberSAVe: situational awareness visualization for cyber security of smart grid systems
Recommendations
7 key challenges for visualization in cyber network defense
VizSec '14: Proceedings of the Eleventh Workshop on Visualization for Cyber SecurityWhat does it take to be a successful visualization in cyber security? This question has been explored for some time, resulting in many potential solutions being developed and offered to the cyber security community. However, when one reflects upon the ...
A Graph-Theoretic Visualization Approach to Network Risk Analysis
VizSec '08: Proceedings of the 5th international workshop on Visualization for Computer SecurityThis paper describes a software system that provides significant new capabilities for visualization and analysis of network attack graphs produced through Topological Vulnerability Analysis (TVA). The TVA approach draws on a database of known exploits ...
Survey Cyber security in the Smart Grid: Survey and challenges
The Smart Grid, generally referred to as the next-generation power system, is considered as a revolutionary and evolutionary regime of existing power grids. More importantly, with the integration of advanced computing and communication technologies, the ...
Comments