A Study on Quantitative Methodology to Assess Cyber Security Risk of SCADA Systems

Article Preview

Abstract:

This paper aims to identify and clarify the cyber security risks and their interaction with the power system in Smart Grid. The SCADA system and other communication networks interact with the power system on a real time basis, so it is important to understand the interaction between two layers to protect the power system from potential cyber threats. In this study, the optimal power flow (OPF) and Power Flow Tracing are used to assess the interaction between the SCADA network and the power system. Through OPF and Power Flow Tracing based analysis, the physical and economic impacts from potential cyber threats are assessed, and thereby the quantitative risks are measured in a monetary unit.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 960-961)

Pages:

1602-1611

Citation:

Online since:

June 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Lawrence Carin, George Cybenko, Quantitative Evaluation of Risk for Investment Efficient Strategies in Cybersecurity, The QuERIES Methodology, (2007).

Google Scholar

[2] S. Massoud Amin, Cyber and Critical Infrastructure Security – Toward Smarter and More Secure Power and Energy Infrastructures, Canada U.S. Workshop on Smart Grid Technologies at Vancouver, (2010).

Google Scholar

[3] Matias Negrete-Pincetic, Felipe Yoshida, George Gross, Towards Quantifying the Impacts of Cyber Attacks in the Competitive Electricity Market Environment, (2009).

DOI: 10.1109/ptc.2009.5282237

Google Scholar

[4] Vulnerability Assessment, SANS Institute InfoSec Reading Room, http: /www. sans. org.

Google Scholar

[5] KERI, Seoul National University, A study on compensation amounts and risk hedging methods for damage or loss caused by power interruption, KEMCO, April (2011).

Google Scholar

[6] Felix F. Wu, Yixin Ni, Ping Wei, Power Transfer Allocation for Open Access Using Graph Theory-Fundamentals and Applications in Systems Without Loopflow, ieee transactions on power systems, VOL. 15, NO. 3, (2000).

DOI: 10.1109/59.871714

Google Scholar