Application of Monitoring Standards for enhancing Energy System Security

Size: px
Start display at page:

Download "Application of Monitoring Standards for enhancing Energy System Security"

Transcription

1 Application of Monitoring Standards for enhancing Energy System Security G. DONDOSSOLA*, R. TERRUGGIA*, P. WYLACH*, G. PUGNI**, F. BELLIO*** RSE SpA*, Enel SpA**, Enel Produzione SpA*** Italy

2 About RSE Applied research on the electro-energetic sector, experimental activities including Cyber Security experimental assessment

3 Cigré Session 2016 Paper D2_204_2016 Security communication assessment over heterogeneous networks Laboratory testbed of Medium Voltage control cyber infrastructure for distribution grids connecting Distributed Energy Resources (DER) Field testbed of a real cyber-physical Hydro Power Plant (HPP) telecontrol infrastructure Ethernet, Mobile technologies (2G,3G,4G) 0.5/6.77/40 Mbps Dedicated Frame Relay-CDN lines with a speed of 32/64 Kbps IEC 61850/MMS IEC IEC IEC

4 Outline Technical context Motivation and goal Methodology IEC Smart Energy Systems functions and architectures Distribution Grids connecting DER Medium Voltage (MV) Control Infrastructure

5 Outline IEC performance assessment MV Control: IEC communications secured with IEC /3 communication performance assessment using cellular networks Security Monitoring Overview of IEC Security Monitoring Framework in the MV Control setup Wrap-up and Key lessons

6 Motivation and goal Smart energy systems deploy open ICT infrastructures exposed to a dynamic cyber threat environment Need to address cyber security requirements of power generation, distribution and DER domains by combining preventive measures with defensive actions Twofold focus security of communication protocols monitoring of information flows in system operation The complementary role of preventive measures and continuous monitoring is shown through the performance assessment of secure communications during attack scenarios

7 Methodology A common assessment methodology is used to evaluate the application of IEC security standards for protecting IEC and IEC communications of renewable DER and Hydro Power Plants over heterogeneous technologies Communication integrity and confidentiality are provided by authentication mechanisms and encryption algorithms at application and transport layers Ongoing anomalies and cyber attacks to energy systems are detected by a monitoring infrastructure supporting fast reactions and continuous defense enforcement

8 Methodology The distinguishing aspect of the assessment methodology is the definition of performance measures specific for the energy applications and communication/security protocols An analysis tool calculates the measures of interest from network traces, performs the statistical analysis of data collected during security/technology/attack tests, feeds in the agent data of the SNMP monitoring infrastructure The energy system monitoring collects data objects from IEDs and RTUs according to IEC , and combine them with IETF data objects available in commercial network devices

9 IEC overview Security means defined for Authentication and authorization (RBAC) Secure IP- based and serial communications Secure application level exchanges Key management Security monitoring and event logging Conformance test cases Guidelines for applying specific security measures by utilizing or profiling existing standards and recommendations 9

10 IEC TC57 Power System Communication Standards IEC Secure Control protocols IEC : Introduction IEC TASE.2 (ICCP) IEC & DNP3 IEC & Serial DNP3 IEC MMS IEC GOOSE and SV IEC MMS over XMPP IEC & IEC CIM IEC : Profiles including TCP/IP IEC : Profiles including MMS and similar Payloads IEC : IEC and Derivates IEC : IEC Profiles IEC : Security for XML Files IEC : Glossary IEC : Objects for Network Management IEC : Role based Access Control IEC :Key Management IEC : Cyber Security Event Logging IEC for securing MMS based applications (e.g. IEC , IEC ) IEC Conformance Testing application profiles IEC : IEC (Part 3/5) transport profiles (use of TLS, specified by Part 3) IEC : RBAC Guidelines IEC : Deep Packet Inspection IEC : Security architecture guidelines for TC 57 systems IEC for securing IEC (Transmission protocols in Telecontrol equipment and systems), DNP3 and serial verisons IEC : Resilience and Security Recommendations for Power Systems with DER IEC for securing application s using GOOSE and IEC , requiring 4 ms response times IEC : What Security Topics Should Be Covered in Standards and Specifications 10

11 IEC MV Control Security means defined for Authentication and authorization (RBAC) Secure IP- based and serial communications Secure application level exchanges Key management Security monitoring and event logging Conformance test cases Guidelines for applying specific security measures by utilizing or profiling existing standards and recommendations 11

12 IEC HPP Security means defined for Authentication and authorization (RBAC) Secure IP- based and serial communications Secure application level exchanges Key management Security monitoring and event logging Conformance test cases Guidelines for applying specific security measures by utilizing or profiling existing standards and recommendations 12

13 IEC Profiles including MMS IEC Part 4 (TS 2007) specifies procedures, protocol enhancements and algorithms targeting MMS security MMS Security Profiles A-Profile Application Layer Security T-Profile Transport Layer Security-> Part 3 Mandatory and recommended TLS options 13

14 IEC (2) A-Profile Application Layer Security T-Profile Transport Layer Security 14

15 IEC : Communication network and system security Profile including TCP/IP IEC Part 3 (IS 2014) specifies how provide security for TCP/IP-based SCADA and telecontrol protocols Constraints on Transport Layer Security (TLS) for end to end security TLS Version Deprecated cyber suites, interoperability Bi-directional certificate exchange and validation is mandatory (mutual authentication) Session key update Session renegotiation time Session resumption time Certificate management 15

16 IEC : Network and System Management (NSM) data object models IEC Part 7 (IS 2017) specifies data object models to monitor the health and the condition of the power system components/communications Monitoring for security purpose, enabling anomaly detection and recovery functions Monitoring network and IED devices and correlation of information from IEC data objects (OT devices) IETF data objects (OT/IT devises) 16

17 IEC (2) Information Infrastructure Power System Infrastructure Monitoring objects 17

18 IEC (3) Environment IED Application Protocol Interfaces Clock 18

19 Integrated monitoring Analysis Cloc k Enviromen t IED Applicati on Protocol Interfac es 19

20 IEC (4) IEC IS Abstract UML Model SNMP protocol MIB implementation 20

21 PCS ResTest activity Grid and ICT Control Centres Substation Control DER Control

22 QoS Assessment Technology Tests Security Tests Test Traces SG QoS Analyser QoS Measures SG QoS Analyser 22

23 Tests Cases Technology Tests Impact analysis of cellular technologies on IEC 61850/MMS control flows Ethernet as baseline (Switched Eth VLAN) Mobile access networks: 4G, 3G and 2G Security Tests Impact analysis of security technologies on IEC 61850/MMS control flows Plain Security (IP tunneling and ACL) Standard Security (TLS as add-on to Plain Security)

24 QoS Indicators TCP/TLS Handshake Time Handshake duration for TCP connection/tls session MMS HandshakeTime Time required for the establishment of the MMS session MMS Profile Exchange Time TLS renegotiation/resumption Time RTT (Round Trip Time)-Report RTT-Setpoint TCP connection active time Retransmissions # of TCP/TLS/MMS sessions Session Overhead Rate Report/Setpoint Losses Exchange duration of the MMS profile between client and server Time required for renegotiation/resumption operations Time interval between the output of a report and the reception of the corresponding TCP ack by the MMS server Time interval between the output of a setpoint request and the reception of the corresponding TCP ack by the MMS client A ratio between the TCP connection time available for transmitting control traffic over the total test duration Number of TCP Retransmissions Number of reports/setpoints retransmissions Number of correct establishment of TCP, TLS and MMS sessions Number of failed establishment of TCP, TLS and MMS sessions Time taken for session setup and restoration. Time not available for power grid control activities over the total time Number (Percentage) of lost reports/setpoints 24

25 Experimental results 25

26 Wrap-up Experimental platforms The work presents an experimental framework to assess the performance of security solutions in energy control systems and evaluate new functionality for the timely management of residual risks A common security assessment methodology is used to evaluate the application of IEC security standards for protecting IEC and IEC communications of renewable DER and hydro power plants over heterogeneous technologies in lab and field testbeds The distinguishing aspect of the assessment methodology is the definition of performance measures specific for the energy applications and communication/ security protocols Heterogeneous communication networks mobile networks wired links

27 Wrap-up Cyber Security measures End-to-end security conforming to IEC /5 Communication integrity and confidentiality are provided by authentication mechanisms and encryption algorithms at application and transport layers Security monitoring conforming to IEC Ongoing anomalies and cyber attacks to energy systems are detected by a monitoring infrastructure supporting fast reactions and continuous defense enforcement The energy system monitoring collects data objects from IEDs according to IEC , and combine them with IETF data objects available in commercial network devices

28 Key lessons Results The IEC implementation in IEC and IEC protocols results in good performances of end-to-end communications in all the tested technologies provided that the connection is stable The dependency of performance values on the packet size is clearly visible in both wired and wireless technologies The security profile configuration influences the transport handshake times, and the influence is stronger with low speed links Measures from field tests gave useful feedbacks on technological improvements of the HPP telecontrol infrastructure The performance assessment methodology allows specifying Quality of Service requirements that cover security extensions, useful for SLA with telco operators

29 Key lessons Results Results from monitoring tests contributed to the specification of IEC data objects The implementation of a monitoring infrastructure able to correlate the performance indicators from IED and network devices increases the effectiveness of attack detection and mitigation

30 Thank you! Contact:

Security in Power System Automation Status and Application of IEC Steffen Fries, Siemens Corporate Technology, June 13 th, 2017

Security in Power System Automation Status and Application of IEC Steffen Fries, Siemens Corporate Technology, June 13 th, 2017 Security in Power System Automation Status and Application of IEC 62351 Steffen Fries, Siemens Corporate Technology, June 13 th, 2017 Operator Integrator Vendor IEC 62351-10 Power Systems Security Architecture

More information

Program. 5 Day IEC Seminar and Training. XXXX Automation & Information Systems XXXX

Program. 5 Day IEC Seminar and Training. XXXX Automation & Information Systems XXXX , 2010 Program 5 Day IEC 61850 Seminar and Training XXXX Automation & Information Systems XXXX 18.-22.01.2010 Notes: 1. Questions and discussions during and after each presentation are expected and welcome.

More information

INTERNATIONAL ELECTROTECHNICAL COMMISSION. IEC TC57 WG15 Data and Communication Security Status & Roadmap. May, Frances Cleveland.

INTERNATIONAL ELECTROTECHNICAL COMMISSION. IEC TC57 WG15 Data and Communication Security Status & Roadmap. May, Frances Cleveland. INTERNATIONAL ELECTROTECHNICAL COMMISSION IEC TC57 WG15 Data and Communication Security Status & Roadmap May, 2013 Frances Cleveland Convenor WG15 Mission and Scope of WG15 on Cybersecurity Undertake the

More information

IEC TC57 WG15 - Cybersecurity Status & Roadmap

IEC TC57 WG15 - Cybersecurity Status & Roadmap INTERNATIONAL ELECTROTECHNICAL COMMISSION IEC TC57 WG15 - Cybersecurity Status & Roadmap June, 2012 Frances Cleveland Convenor WG15 Mission and Scope of WG15 on Cybersecurity Undertake the development

More information

Connectivity 101 for Remote Monitoring Systems

Connectivity 101 for Remote Monitoring Systems Connectivity 101 for Remote Monitoring Systems Paul Wacker Moxa, Inc. Manager - Edge Connectivity Ariana Drivdahl Moxa, Inc. Product Marketing Manager Pain Points of Remote Monitoring Pressure to enhance

More information

Substation. Communications. Power Utilities. Application Brochure. Typical users: Transmission & distribution power utilities

Substation. Communications. Power Utilities. Application Brochure. Typical users: Transmission & distribution power utilities Power Utilities Application Brochure Communications Typical users: Transmission & distribution power utilities For more than 30 years, RAD has worked closely with its worldwide energy utility customers

More information

Flow Measurement. For IT, Security and IoT/ICS. Pavel Minařík, Chief Technology Officer EMITEC, Swiss Test and Measurement Day 20 th April 2018

Flow Measurement. For IT, Security and IoT/ICS. Pavel Minařík, Chief Technology Officer EMITEC, Swiss Test and Measurement Day 20 th April 2018 Flow Measurement For IT, Security and IoT/ICS Pavel Minařík, Chief Technology Officer EMITEC, Swiss Test and Measurement Day 20 th April 2018 What is Flow Data? Modern method for network monitoring flow

More information

TABLE OF CONTENTS. Section Description Page

TABLE OF CONTENTS. Section Description Page GPA Cybersecurity TABLE OF CONTENTS Section Description Page 1. Cybersecurity... 1 2. Standards... 1 3. Guides... 2 4. Minimum Hardware/Software Requirements For Secure Network Services... 3 4.1. High-Level

More information

Smart grid control based on heterogeneous communications and adaptive layers

Smart grid control based on heterogeneous communications and adaptive layers SmartGridComm 2014: Workshop "Managing Heterogeneous and Secure Communication Networks for Smart Grids" Smart grid control based on heterogeneous communications and adaptive layers Hans-Peter Schwefel

More information

IP in MV/LV: Expanding IP services to the medium and low voltage layers of the power distribution grid

IP in MV/LV: Expanding IP services to the medium and low voltage layers of the power distribution grid IP in MV/LV: Expanding IP services to the medium and low voltage layers of the power distribution grid UtiliNet Europe 2018 May 15 th, 2018 Brussels, Belgium Dr. Jürgen Tusch Head of Telecommunications

More information

Lecture #11 Power system communication

Lecture #11 Power system communication KTH ROYAL INSTITUTE OF TECHNOLOGY Lecture #11 Power system communication Nicholas Honeth In this series Lecture #9 Communication protocol basics The OSI model Relationship between OSI and

More information

Realizing the Smart Grid - A Solutions Provider's Perspective David G. Hart July Elster. All rights reserved.

Realizing the Smart Grid - A Solutions Provider's Perspective David G. Hart July Elster. All rights reserved. Realizing the Smart Grid - A Solutions Provider's Perspective David G. Hart July 2009 2009 Elster. All rights reserved. What is the Smart Grid? 2009 Elster. All rights reserved. 2 Smart Grid Two Way Communications..Sensors...Distributed

More information

Peter Kreutzer, PSSAM/Automation Power World 2011 New Delhi, Secure and reliable Redundant communication network and cyber security

Peter Kreutzer, PSSAM/Automation Power World 2011 New Delhi, Secure and reliable Redundant communication network and cyber security Peter Kreutzer, PSSAM/Automation Power World 2011 New Delhi, 2011-09-20 Secure and reliable Redundant communication network and cyber security Content Reliable Substation communication networks Introduction

More information

IEEE Standards Activities in the Smart Grid Space (ICT Focus) Overview

IEEE Standards Activities in the Smart Grid Space (ICT Focus) Overview This document contains supplemental information referenced by the European Rolling Plan for ICT Standardisation. IEEE Standards Activities in the Smart Grid Space (ICT Focus) Overview IEEE s standardization

More information

?? U44, U120 automation, and building automation.

?? U44, U120 automation, and building automation. Scope: Elc = Electrical, 1 = Physical, 2-7 = OSI Stack, Sv = Abstract services, Sm = Semantic Model, Bu = Business policy/procedures, In = Introductory, Cs =, Gu = Guidelines, Tst = Testing Type: Std =

More information

Communication Networks

Communication Networks Communication Networks Nicholas Honeth (nicholash@ics.kth.se) Contents of the series Lecture 10 - Recap of the networks we ve seen so far - OSI model - Circuit and packet switching - Physical media Lecture

More information

PREEMPTIVE PREventivE Methodology and Tools to protect utilities

PREEMPTIVE PREventivE Methodology and Tools to protect utilities PREEMPTIVE PREventivE Methodology and Tools to protect utilities 2014 2017 1 With the financial support of FP7 Seventh Framework Programme Grant agreement no: 607093 Preemptive goal The main goal of PREEMPTIVE

More information

Resilient Smart Grids

Resilient Smart Grids Resilient Smart Grids André Teixeira Kaveh Paridari, Henrik Sandberg KTH Royal Institute of Technology, Sweden SPARKS 2nd Stakeholder Workshop Cork, Ireland March 25th, 2015 Legacy Distribution Grids Main

More information

Smart Grid Labs. Overview

Smart Grid Labs. Overview Smart Grid Labs Overview introduction SGL provides our clients multi-faceted assessment services for communications, security, standards compliance, technology/vendor maturity, and implementation assistance

More information

TCP/IP Communication Aspects in Monitoring of a Remote Wind Turbine

TCP/IP Communication Aspects in Monitoring of a Remote Wind Turbine TCP/IP Communication Aspects in Monitoring of a Remote Wind Turbine Tapio Sokura, Taneli Korhonen, Mikael M. Nordman, and Matti Lehtonen Power Systems and High Voltage Engineering Laboratory P.O.Box 3000

More information

Security in grid control centers: Spectrum Power TM Cyber Security

Security in grid control centers: Spectrum Power TM Cyber Security Security in grid control centers: Spectrum Power TM Cyber Security Thomas Schmidt, Information Security Manager siemens.at/future-of-energy Spectrum Power TM 7 Historical Information System Table of content

More information

SDG&E EPIC Program Overview

SDG&E EPIC Program Overview SDG&E EPIC Program Overview Presented by: Frank Goodman, SDG&E i-pcgrid Workshop March 30, 2018. All copyright and trademark rights reserved. Presentation overview SDG&E overview Project lists for three

More information

This document is a preview generated by EVS

This document is a preview generated by EVS TECHNICAL REPORT IEC TR 62357-1 Edition 2.0 2016-11 colour inside Power systems management and associated information exchange Part 1: Reference architecture IEC TR 62357-1:2016-11(en) THIS PUBLICATION

More information

TCP with dynamic FEC For High Delay and Lossy Networks. Simone Ferlin and Ozgu Alay Simula Research Laboratory, Norway

TCP with dynamic FEC For High Delay and Lossy Networks. Simone Ferlin and Ozgu Alay Simula Research Laboratory, Norway TCP with dynamic FEC For High Delay and Lossy Networks Simone Ferlin and Ozgu Alay Simula Research Laboratory, Norway TCP: Loss detection and recovery - Introduction TCP has been regularly changed over

More information

SEEDS Industry Engagement Event

SEEDS Industry Engagement Event SEEDS Industry Engagement Event Professor Mohammed, FIU, Sequence Hopping Algorithm to Secure IEC GOOSE Messages Sequence Hopping Algorithm to Secure IEC GOOSE Messages Professor Osama Mohammed Energy

More information

Presenter Jakob Drescher. Industry. Measures used to protect assets against computer threats. Covers both intentional and unintentional attacks.

Presenter Jakob Drescher. Industry. Measures used to protect assets against computer threats. Covers both intentional and unintentional attacks. Presenter Jakob Drescher Industry Cyber Security 1 Cyber Security? Measures used to protect assets against computer threats. Covers both intentional and unintentional attacks. Malware or network traffic

More information

Smart Grid Communications and Networking

Smart Grid Communications and Networking Smart Grid Communications and Networking EKRAM HOSSAIN University of Manitoba, Canada ZHU HAN University of Houston, Texas H. VINCENT POOR Princeton University, New Jersey CAMBRIDGE UNIVERSITY PRESS Contents

More information

Securing the Smart Grid. Understanding the BIG Picture 11/1/2011. Proprietary Information of Corporate Risk Solutions, Inc. 1.

Securing the Smart Grid. Understanding the BIG Picture 11/1/2011. Proprietary Information of Corporate Risk Solutions, Inc. 1. Securing the Smart Grid Understanding the BIG Picture The Power Grid The electric power system is the most capital-intensive infrastructure in North America. The system is undergoing tremendous change

More information

IEC Overview. Grant Gilchrist. Principal Consultant, Smart Grid Engineering November 2009

IEC Overview. Grant Gilchrist. Principal Consultant, Smart Grid Engineering November 2009 IEC 61850 Overview Grant Gilchrist Principal Consultant, Smart Grid Engineering November 2009 Traditional Power System Protocols Memory-mapped Register-based, like a filing cabinet. Anything could be in

More information

The following chart provides the breakdown of exam as to the weight of each section of the exam.

The following chart provides the breakdown of exam as to the weight of each section of the exam. Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those

More information

Request for Proposal (RFP) for Supply and Implementation of Firewall for Internet Access (RFP Ref )

Request for Proposal (RFP) for Supply and Implementation of Firewall for Internet Access (RFP Ref ) Appendix 1 1st Tier Firewall The Solution shall be rack-mountable into standard 19-inch (482.6-mm) EIA rack. The firewall shall minimally support the following technologies and features: (a) Stateful inspection;

More information

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline Course Number: NET 226 Course Title: Routing and Switching II Class Hours: 1 Lab Hours: 4 Credit Hours: 3 Course Description: This course introduces WAN theory and design, WAN technology, PPP, Frame Relay,

More information

IEC Vaasa Seminar 21st October Contents

IEC Vaasa Seminar 21st October Contents Ethernet In The Substation IEC 61850 Vaasa Seminar 21st October 2008 Contents IEC 61850 Environmental Conditions Communication Requirements Communication Protocols Security Summary Contents IEC 61850 Environmental

More information

IC32E - Pre-Instructional Survey

IC32E - Pre-Instructional Survey Name: Date: 1. What is the primary function of a firewall? a. Block all internet traffic b. Detect network intrusions c. Filter network traffic d. Authenticate users 2. A system that monitors traffic into

More information

Ethernet Network Redundancy in SCADA and real-time Automation Platforms.

Ethernet Network Redundancy in SCADA and real-time Automation Platforms. Ethernet Network Redundancy in SCADA and real-time Automation Platforms www.copadata.com sales@copadata.com Content 1. ABSTRACT... 2 2. INTRODUCTION... 2 IEC 61850 COMMUNICATION SERVICES... 2 APPLICATION

More information

Managing SCADA Security. NISTIR 7628 and the NIST/SGIP CSWG. Xanthus. May 25, Frances Cleveland

Managing SCADA Security. NISTIR 7628 and the NIST/SGIP CSWG. Xanthus. May 25, Frances Cleveland Managing SCADA Security NISTIR 7628 and the NIST/SGIP CSWG May 25, 2011 Frances Cleveland fcleve@xanthus-consulting.com Xanthus Consulting International Topics NISTIR 7628 NIST/SGIP CSWG and its Subgroups

More information

COMPUTER AND NETWORK SUPPORT TECHNICIAN PROGRAM

COMPUTER AND NETWORK SUPPORT TECHNICIAN PROGRAM Network + Networking NH5200 Fundamentals COURSE TITLE: Network+ Networking Fundamentals 104 Total Hours 66 Theory Hours 38 Laboratory Hours COURSE OVERVIEW: After completing this course, students will

More information

Monitoring and diagnostics of data infrastructure problems in power engineering. Jaroslav Stusak, Sales Director CEE, Flowmon Networks

Monitoring and diagnostics of data infrastructure problems in power engineering. Jaroslav Stusak, Sales Director CEE, Flowmon Networks Monitoring and diagnostics of data infrastructure problems in power engineering Jaroslav Stusak, Sales Director CEE, Flowmon Networks 35,000 kilometers of electric power, which feeds around 740,000 clients...

More information

Cyber Threat Assessment and Mitigation for Power Grids Lloyd Wihl Director, Application Engineering Scalable Network Technologies

Cyber Threat Assessment and Mitigation for Power Grids Lloyd Wihl Director, Application Engineering Scalable Network Technologies Cyber Threat Assessment and Mitigation for Power Grids Lloyd Wihl Director, Application Engineering Scalable Network Technologies lwihl@scalable-networks.com 2 The Need OT security particularly in the

More information

Course Outline Topic 1: Current State Assessment, Security Operations Centers, and Security Architecture

Course Outline Topic 1: Current State Assessment, Security Operations Centers, and Security Architecture About this Course This course will best position your organization to analyse threats and detect anomalies that could indicate cybercriminal behaviour. The payoff for this new proactive approach would

More information

IEC and DER Successfully implementing IEC as the standard communication protocol for distributed energy resources

IEC and DER Successfully implementing IEC as the standard communication protocol for distributed energy resources IEC 61850 and DER Successfully implementing IEC 61850 as the standard communication protocol for distributed energy resources Stjepan Sučić KONČAR-KET Contents 1 Company overview 2 DER monitoring and control

More information

AUTOMATED SECURITY ASSESSMENT AND MANAGEMENT OF THE ELECTRIC POWER GRID

AUTOMATED SECURITY ASSESSMENT AND MANAGEMENT OF THE ELECTRIC POWER GRID AUTOMATED SECURITY ASSESSMENT AND MANAGEMENT OF THE ELECTRIC POWER GRID Sherif Abdelwahed Department of Electrical and Computer Engineering Mississippi State University Autonomic Security Management Modern

More information

ETSF10 Internet Protocols Transport Layer Protocols

ETSF10 Internet Protocols Transport Layer Protocols ETSF10 Internet Protocols Transport Layer Protocols 2012, Part 2, Lecture 2.1 Kaan Bür, Jens Andersson Transport Layer Protocols Process-to-process delivery [ed.4 ch.23.1] [ed.5 ch.24.1] Transmission Control

More information

Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure

Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure SESSION ID: SBX1-R07 Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure Bryan Hatton Cyber Security Researcher Idaho National Laboratory In support of DHS ICS-CERT @phaktor 16 Critical

More information

RID IETF Draft Update

RID IETF Draft Update RID IETF Draft Update Kathleen M. Moriarty INCH Working Group 5 August 2004 This work was sponsored by the Air Force under Air Force Contract Number F19628-00-C-0002. "Opinions, interpretations, conclusions,

More information

CCNA Routing and Switching Courses. Scope and Sequence. Target Audience. Curriculum Overview. Last updated August 22, 2018

CCNA Routing and Switching Courses. Scope and Sequence. Target Audience. Curriculum Overview. Last updated August 22, 2018 CCNA Routing and Switching Scope and Sequence Last updated August 22, 2018 Target Audience The Cisco CCNA Routing and Switching curriculum is designed for Cisco Networking Academy students who are seeking

More information

An Intrusion Detection System for Critical Information Infrastructures Using Wireless Sensor Network Technologies

An Intrusion Detection System for Critical Information Infrastructures Using Wireless Sensor Network Technologies An Intrusion Detection System for Critical Information Infrastructures Using Wireless Sensor Network Technologies The Fifth international CRIS conference on Critical Infrastructures Beijing China, 20 September

More information

Identity-Based Cyber Defense. March 2017

Identity-Based Cyber Defense. March 2017 Identity-Based Cyber Defense March 2017 Attackers Continue to Have Success Current security products are necessary but not sufficient Assumption is you are or will be breached Focus on monitoring, detecting

More information

ICT standards for smart grids: IEC 61850, CIM and their implementation in the ERIGrid project

ICT standards for smart grids: IEC 61850, CIM and their implementation in the ERIGrid project ICT standards for smart grids: IEC 61850, CIM and their implementation in the ERIGrid project March 23, 2018 Daniele Pala, Ricerca sul Sistema Energetico - RSE S.p.A. Agenda ICT Interoperability in Smart

More information

CSC Network Security

CSC Network Security CSC 474 -- Security Topic 9. Firewalls CSC 474 Dr. Peng Ning 1 Outline Overview of Firewalls Filtering Firewalls Proxy Servers CSC 474 Dr. Peng Ning 2 Overview of Firewalls CSC 474 Dr. Peng Ning 3 1 Internet

More information

INESC TEC. Centre for Telecomunications and Multimedia. 21 March Manuel Ricardo. CTM Coordinator

INESC TEC. Centre for Telecomunications and Multimedia. 21 March Manuel Ricardo. CTM Coordinator 1 INESC TEC Centre for Telecomunications and Multimedia 21 March 2017 Manuel Ricardo CTM Coordinator CTM Scientific Areas Information Processing and Pattern Recognition (IPPR) - computer vision - intelligent

More information

November 29, ECE 421 Session 28. Utility SCADA and Automation. Presented by: Chris Dyer

November 29, ECE 421 Session 28. Utility SCADA and Automation. Presented by: Chris Dyer ECE 421 Session 28 November 29, 2018 Utility SCADA and Automation Presented by: Chris Dyer Utility SCADA & Automation Chris Dyer, P.E. BSEE University of Idaho, 1997 SCADA & Automation Engineer POWER Engineers,

More information

Cyber Security of Power Grids

Cyber Security of Power Grids Cyber Security of Power Grids Chen-Ching Liu Boeing Distinguished Professor Director, Energy Systems Innovation Center Washington State University In Collaboration with M. Govindarasu, Iowa State University

More information

Anca Cioraca, Ilia Voloh, Mark Adamiak GE Grid Automation

Anca Cioraca, Ilia Voloh, Mark Adamiak GE Grid Automation Anca Cioraca, Ilia Voloh, Mark Adamiak GE Grid Automation In the beginning.rs-232 Migration to Ethernet in IEDs.circa 1997 Only invented in 1972.fast adoption for our industry Desire for Interoperability

More information

On Network Performance Evaluation toward the Smart Grid: A Case Study of DNP3 over TCP/IP

On Network Performance Evaluation toward the Smart Grid: A Case Study of DNP3 over TCP/IP On Network Performance Evaluation toward the Smart Grid: A Case Study of DNP3 over TCP/IP Xiang Lu Zhuo Lu Wenye Wang Jianfeng Ma Department of Electrical and Computer Engineering, NC State University,

More information

What Protection Engineers Need to Know About Networking. ANCA CIORACA, ILIA VOLOH, MARK ADAMIAK Markham, ON, CA King of Prussia, PA GE Digital Energy

What Protection Engineers Need to Know About Networking. ANCA CIORACA, ILIA VOLOH, MARK ADAMIAK Markham, ON, CA King of Prussia, PA GE Digital Energy What Protection Engineers Need to Know About Networking ANCA CIORACA, ILIA VOLOH, MARK ADAMIAK Markham, ON, CA King of Prussia, PA GE Digital Energy 1 INTRODUCTION Retrieving data available in substations,

More information

Integrated Smart Grid Performance Testing: NIST Research and SG Testbed

Integrated Smart Grid Performance Testing: NIST Research and SG Testbed Integrated Smart Grid Performance Testing: NIST Research and SG Testbed Jerry FitzPatrick National Institute of Standards and Technology Applied Electrical Metrology Group i-pcgrid March 28, 2018 Energy

More information

Entergy Development and Deployment of IEC Protection and Control Including Process Bus

Entergy Development and Deployment of IEC Protection and Control Including Process Bus Entergy Development and Deployment of IEC 61850 Protection and Control Including Process Bus Chan Y. Wong Entergy Transmission Eric A. Udren and Solveig Ward Quanta Technology, LLC Presented at CIGRÉ Grid

More information

Overview and Application

Overview and Application IEC 61850 Overview and Application Who am I? Rich Hunt Market Development Leader GE Grid Solutions Over 25 years in the power systems industry At GE for 10 years (almost) Member of IEEE PSRC, U.S. Representative

More information

Availability Study of the Italian Electricity SCADA System in the Cloud

Availability Study of the Italian Electricity SCADA System in the Cloud Availability Study of the Italian Electricity SCADA System in the Cloud Stefano Sebastio a, Antonio Scala b,a, and Gregorio D Agostino c,a a LIMS London Institute of Mathematical Sciences, London, UK b

More information

i-pcgrid WORKSHOP 2016 INTERACTIVE REMOTE ACCESS

i-pcgrid WORKSHOP 2016 INTERACTIVE REMOTE ACCESS i-pcgrid WORKSHOP 2016 INTERACTIVE REMOTE ACCESS siemens.com/ruggedcom INTERACTIVE REMOTE ACCESS INTELLIGENT ELECTRONIC DEVICES Intelligent Electronic Devices (IEDs) Devices that can provide real-time

More information

RID IETF Draft Update

RID IETF Draft Update RID IETF Draft Update Kathleen M. Moriarty INCH Working Group 29 March 2005 This work was sponsored by the Air Force under Air Force Contract Number F19628-00-C-0002. "Opinions, interpretations, conclusions,

More information

PIE in the Sky : Online Passive Interference Estimation for Enterprise WLANs

PIE in the Sky : Online Passive Interference Estimation for Enterprise WLANs WiNGS Labs PIE in the Sky : Online Passive Interference Estimation for Enterprise WLANs * Nokia Research Center, Palo Alto Shravan Rayanchu, Suman Banerjee University of Wisconsin-Madison Konstantina Papagiannaki

More information

This is a preview - click here to buy the full publication

This is a preview - click here to buy the full publication TECHNICAL REPORT IEC TR 61850-90-2 Edition 1.0 2016-02 colour inside Communication networks and systems for power utility automation Part 90-2: Using IEC 61850 for communication between substations and

More information

Configuring Cisco IOS IP SLAs Operations

Configuring Cisco IOS IP SLAs Operations CHAPTER 39 This chapter describes how to use Cisco IOS IP Service Level Agreements (SLAs) on the switch. Cisco IP SLAs is a part of Cisco IOS software that allows Cisco customers to analyze IP service

More information

"Charting the Course... Interconnecting Cisco Networking Devices Accelerated 3.0 (CCNAX) Course Summary

Charting the Course... Interconnecting Cisco Networking Devices Accelerated 3.0 (CCNAX) Course Summary Description Course Summary The Cisco CCNA curriculum includes a third course, Interconnecting Cisco Networking Devices: Accelerated (CCNAX), consisting of Interconnecting Cisco Networking Devices, Part

More information

Substation to substation (ss2ss) GOOSE exchange for critical relay operations

Substation to substation (ss2ss) GOOSE exchange for critical relay operations CIGRÉ Canada 21, rue d Artois, F-75008 PARIS (CIGRE-130) Conference on Power Systems http : //www.cigre.org Vancouver, October 17-19, 2010 Substation to substation (ss2ss) GOOSE exchange for critical relay

More information

Privacy and Security in Smart Grids

Privacy and Security in Smart Grids Faculty of Computer Science, Institute of Systems Architecture, Chair for Privacy and Data Security Privacy and Security in Smart Grids The German Approach Sebastian Clauß, Stefan Köpsell Dresden, 19.10.2012

More information

Chapter 2 Communication for Control in Heterogeneous Power Supply

Chapter 2 Communication for Control in Heterogeneous Power Supply Chapter 2 Communication for Control in Heterogeneous Power Supply The need to modernize the power grid infrastructure, and governments commitment for a cleaner environment, is driving the move towards

More information

Deterministic Communications for Protection Applications Over Packet-Based Wide-Area Networks

Deterministic Communications for Protection Applications Over Packet-Based Wide-Area Networks Deterministic Communications for Protection Applications Over Packet-Based Wide-Area Networks Kenneth Fodero, Christopher Huntley, and Paul Robertson Schweitzer Engineering Laboratories, Inc. 2018 SEL

More information

Advanced Network Design

Advanced Network Design Advanced Network Design Organization Whoami, Book, Wikipedia www.cs.uchicago.edu/~nugent/cspp54015 Grading Homework/project: 60% Midterm: 15% Final: 20% Class participation: 5% Interdisciplinary Course

More information

CompTIA Mobility+ Certification

CompTIA Mobility+ Certification CompTIA Mobility+ Certification Duration: 5 days Price: $4000 Certifications: CompTIA Mobility+ Exams: MB0-001 Course Overview The mobile age is upon us. More and more people are using tablets, smartphones,

More information

SEGRID storyline. Workshop SEGRID November 14 th, 2016, Barcelona, Spain

SEGRID storyline. Workshop SEGRID November 14 th, 2016, Barcelona, Spain Workshop SEGRID November 14 th, 2016, Barcelona, Spain SEGRID storyline This project has received funding from the European Union s Seventh Framework Programme for research, technological development and

More information

Exam : Title : Security Solutions for Systems Engineers. Version : Demo

Exam : Title : Security Solutions for Systems Engineers. Version : Demo Exam : 642-566 Title : Security Solutions for Systems Engineers Version : Demo 1. Which one of the following elements is essential to perform events analysis and correlation? A. implementation of a centralized

More information

Industrial Defender ASM. for Automation Systems Management

Industrial Defender ASM. for Automation Systems Management Industrial Defender ASM for Automation Systems Management INDUSTRIAL DEFENDER ASM FOR AUTOMATION SYSTEMS MANAGEMENT Industrial Defender ASM is a management platform designed to address the overlapping

More information

Cyber Security Standards Developments

Cyber Security Standards Developments INTERNATIONAL ELECTROTECHNICAL COMMISSION Cyber Security Standards Developments Bart de Wijs Head of Cyber Security Power Grids Division ABB b.v. Frédéric Buchi Sales&Consulting Cyber Security Siemens

More information

EPRI Research Overview IT/Security Focus. Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use

EPRI Research Overview IT/Security Focus. Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use EPRI Research Overview IT/Security Focus November 29, 2012 Mark McGranaghan VP, Power Delivery and Utilization Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use Transmission

More information

October 05, ECE 421 Session 12. Utility SCADA and Automation. Presented by: Chris Dyer

October 05, ECE 421 Session 12. Utility SCADA and Automation. Presented by: Chris Dyer ECE 421 Session 12 October 05, 2017 Utility SCADA and Automation Presented by: Chris Dyer Utility SCADA & Automation Chris Dyer, P.E. BSEE University of Idaho, 1997 SCADA & Automation Engineer POWER Engineers,

More information

An Interdisciplinary Collaboration Platform for Smart Grid Research

An Interdisciplinary Collaboration Platform for Smart Grid Research An Interdisciplinary Collaboration Platform for Smart Grid Research Sebastian Lehnhoff Energy Informatics 2 Energy Informatics in Oldenburg General Conditions Challenges energy transition in Germany fluctuating

More information

Smart utility connectivity

Smart utility connectivity 8 th ITU Symposium ICTs, Environment and Climate Change (Turin, Italy, 6-7 May 2013) Smart utility connectivity Paolo Gemma, WP3/5 Chairman Senior Expert, Huawei paolo.gemma@huawei.com Turin,Italy, 6-7

More information

Legacy-Compliant Data Authentication for Industrial Control System Traffic

Legacy-Compliant Data Authentication for Industrial Control System Traffic Legacy-Compliant Data Authentication for Industrial Control System Traffic John Henry Castellanos, Daniele Antonioli, Nils Ole Tippenhauer and Martín Ochoa Singapore University of Technology and Design

More information

Endesa s approach to IEC61850

Endesa s approach to IEC61850 Endesa s approach to IEC61850 Endesa s approach to IEC61850 Contents 1 The Enel Group 2 Primary Substation Digitalization Roadmap 3 How to reach the IEC61850 goal 4 IdEAS project 5 3S-CS project 2 The

More information

CYBERBIT P r o t e c t i n g a n e w D i m e n s i o n

CYBERBIT P r o t e c t i n g a n e w D i m e n s i o n CYBERBIT P r o t e c t i n g a n e w D i m e n s i o n CYBETBIT in a Nutshell A leader in the development and integration of Cyber Security Solutions A main provider of Cyber Security solutions for the

More information

Firewalls for Secure Unified Communications

Firewalls for Secure Unified Communications Firewalls for Secure Unified Communications Positioning Guide 2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 12 Firewall protection for call control

More information

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide

More information

Automation Services and Solutions

Automation Services and Solutions Automation Services and Solutions Automate substation data acquisition and control to improve performance Maintain uninterrupted power services with proactive grid monitoring and controlling features.

More information

What is New in Cisco ACE 4710 Application Control Engine Software Release 3.1

What is New in Cisco ACE 4710 Application Control Engine Software Release 3.1 What is New in Cisco ACE 4710 Application Control Engine Software Release 3.1 PB478675 Product Overview The Cisco ACE Application Control Engine 4710 represents the next generation of application switches

More information

Presentation to the TEXAS RENEWABLE ENERGY INDUSTRIES ASSOCIATION November 7, 2010

Presentation to the TEXAS RENEWABLE ENERGY INDUSTRIES ASSOCIATION November 7, 2010 Presentation to the TEXAS RENEWABLE ENERGY INDUSTRIES ASSOCIATION November 7, 2010 SynchroTeq / SynchroTeq Plus: Point-on-wave switching RightWON: Modular remote automation platform for energy sites

More information

DISCERN SGAM Visio Template User Guide

DISCERN SGAM Visio Template User Guide Distributed Intelligence for Cost-Effective and Reliable Distribution Network Operation DISCERN SGAM Visio Template User Guide Author: OFFIS Date: 22.04.2016 www.discern.eu The research leading to these

More information

Security for smart Electricity GRIDs

Security for smart Electricity GRIDs Security for smart Electricity GRIDs Project type: Collaborative project small or medium scale focused research project Grant agreement no: 607109 Thematic Priority: FP7-SEC-2013-1 Start date of project:

More information

Configuring Cisco IOS IP SLAs Operations

Configuring Cisco IOS IP SLAs Operations CHAPTER 50 This chapter describes how to use Cisco IOS IP Service Level Agreements (SLAs) on the switch. Cisco IP SLAs is a part of Cisco IOS software that allows Cisco customers to analyze IP service

More information

CCNA Boot Camp. Course Description

CCNA Boot Camp. Course Description CCNA Boot Camp Course Description CCNA Boot Camp combines both the Interconnecting Cisco Network Devices Part 1 (ICND1) course and the Interconnecting Cisco Network Devices Part 2 (ICND2) course into one

More information

PROTECTING MANUFACTURING and UTILITIES Industrial Control Systems

PROTECTING MANUFACTURING and UTILITIES Industrial Control Systems PROTECTING MANUFACTURING and UTILITIES Industrial Control Systems Mati Epstein Global Sales Lead, Critical Infrastructure and ICS [Internal Use] for Check Point employees 1 Industrial Control Systems (ICS)/SCADA

More information

Configuring Cisco IOS IP SLA Operations

Configuring Cisco IOS IP SLA Operations CHAPTER 58 This chapter describes how to use Cisco IOS IP Service Level Agreements (SLA) on the switch. Cisco IP SLA is a part of Cisco IOS software that allows Cisco customers to analyze IP service levels

More information

Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids

Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids Hui Lin, Adam Slagell, Zbigniew Kalbarczyk, Peter W. Sauer, and Ravishankar K. Iyer Department of Electrical

More information

COMMUNICATION NETWORKS. FOX615/612 TEGO1 IEC GOOSE Proxy Gateway interface module.

COMMUNICATION NETWORKS. FOX615/612 TEGO1 IEC GOOSE Proxy Gateway interface module. COMMUNICATION NETWORKS FOX615/612 TEGO1 IEC 61850 GOOSE Proxy Gateway interface module. 2 FOX615/612 TEGO1 IEC 61850 GOOSE GATEWAY INTERFACE MODULE INTRODUCTION 3 FOX615/612 multiplexing platform. Enabling

More information

IEC in Digital Substation and Cyber security

IEC in Digital Substation and Cyber security ABB GRID AUTOMATION IEC 61850 in Digital Substation and Cyber security 72 nd Annual Georgia Tech Protective Relaying Conference Steven Kunsman, May 4, 2018 The digital systems Communication services SV,

More information

System Wide Awareness Training. your cyber vulnerabilities. your critical control systems

System Wide Awareness Training. your cyber vulnerabilities. your critical control systems Standards Certification Education & Training Publishing Conferences & Exhibits your cyber vulnerabilities your critical control systems Early- Bird Discount Save $250 when you register by 15 December!

More information

ASM Educational Center (ASM) Est Cisco CCNA Routing and Switching Certification

ASM Educational Center (ASM) Est Cisco CCNA Routing and Switching Certification Cisco CCNA Routing and Switching Certification Course Outline Module 1: Building a Simple Network Objective: Describe network fundamentals and implement a simple LAN. Lesson 1: Exploring the Functions

More information

Merge physical security and cybersecurity for field operations.

Merge physical security and cybersecurity for field operations. Security Gateway Merge physical security and cybersecurity for field operations. Small form factor and wide temperature range for cabinet installation on distribution poles and in substation yards. Accelerometer,

More information