Browse > Article
http://dx.doi.org/10.13089/JKIISC.2013.23.3.445

Quantitative Methodology to Assess Cyber Security Risks of SCADA system in Electric Power Industry  

Kang, Dong-Joo (KERI)
Lee, Jong-Joo (KERI)
Lee, Young (KNDU)
Lee, Im-Sop (KPX)
Kim, Huy-Kang (Korea University)
Abstract
This paper is about the study to build a quantitative methodology to assess cyber threats and vulnerabilities on control systems. The SCADA system in power industry is one of the most representative and biggest control systems. The SCADA system was originally a local system but it has been extended to wide area as both ICT and power system technologies evolve. Smart Grid is a concept to integrate energy and IT systems, and therefore the existing cyber threats might be infectious to the power system in the integration process. Power system is operated on a real time basis and this could make the power system more vulnerable to the cyber threats. It is a unique characteristic of power systems different from ICT systems. For example, availability is the most critical factor while confidentiality is the one from the CIA triad of IT security. In this context, it is needed to reflect the different characteristics to assess cyber security risks in power systems. Generally, the risk(R) is defined as the multiplication of threat(T), vulnerability(V), and asset(A). This formula is also used for the quantification of the risk, and a conceptual methodology is proposed for the objective in this study.
Keywords
SCADA; Smart Grid; Cyber Security; Quantitative Methodology; Risk; Threat; Vulnerability;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Deepa Kundar, Xianyong Feng, Shan Liu, Takis Zourntos, Karen L., Burtler-Purry, "Towards a Framework for Cyber Attack Impact Analysis of the Electric Smart Grid," 2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 244-249, 2010
2 Jin Wei, Deepa Kundur, Takis Zourntos, "On the Use of Cyber-Physical Hierarchy for Smart Grid Security and Efficient Control," 2012 25th IEEE Canadian Conference on Electrical & Computer Engineering (CCECE), pp. 1-6, 2012
3 오두환 식별된 저자, 최두식, 나은성, 김상철, 하재철, "ID 기반 암호 기법을 이용한 SCADA 시스템에서 비밀 키관리 및 복구 방안," 한국정보보호학회 논문지 제22권 제3호, 2012.6, pp. 427-438, 2012년 6월
4 김영진 이정현 임종인, "SCADA 시스템의 안전성 확보방안에 관한 연구," 한국정보보호학회논문지 제19권 제6호, 2009.10, pp..145-152, 2009년 12월   과학기술학회마을
5 "Vulnerability Assessment," SANS Institute InfoSec Reading Room, http://www.sans.org/
6 "Vulnerability assessment", http://en.wikipedia.org/wiki/Vulnerability_assessment
7 S. Massoud Amin, "Cyber and Critical Infrastructure Security - Toward Smarter and More Secure Power and Energy Infrastructures," Canada-U.S. Workshop on Smart Grid Technologies at Vancouver, Tuesday, March 25, 2010
8 홍승필, 김영철, "정보보호의 이해(Introduction to Information Security)," 길벗, pp. 5-12, 2004
9 Burris, Peter, and Chris King, "A Few Good Security Metrics," METAGroup, Inc. audio, 11 Oct. 2000. URL: http://www.metagroup.com/metaview/mv0314/mv0314.html (10 July 2001)
10 Matias Negrete-Pincetic, Felipe Yoshida, George Gross, "Towards Quantifying the Impacts of Cyber Attacks in the Competitive Electricity Market Environment," POWERTECH 2009, http://energy.ece.illinois.edu/gross/papers/powertech2009final.pdf
11 "Analytic Hierarchy Process," Wikipedia, the free encyclopedia, http://en.wikipedia.org/wiki/Analytic_Hierarchy_Process
12 Ernest H. Forman, "Decision by Objective: Analytical Hierarchy Process," http://www.dept.aoe.vt.edu/-cdhall/courses/aoe4065/AHPslides.pdf
13 한국전기연구원, 인천대학교, "계통계획을 위한 산업용 수용가의 공급지장비 조사 연구," 산업자원부, 2008.02.
14 한국전기연구원, 서울대학교, "전기요금 수준별 적정 정전손해배상 범위설정 및 리스크 분산방안에 관한 연구," 한국전력공사 영업처, 2011.04.
15 Nian Liu, Jianhua Zhang, and Wenxia Liu, "Security Assessment for Communication Networks of Power Control Systems Using Attack Graph and MCDM," IEEE Transactions on Power Delivery, pp. 1492-1500, 2010
16 Pravin Chopade and Dr. Marwan Bikdash, "Modeling for Survivability of Smart Power Grid when subject to severe emergencies and vulnerability," Southeastcon, 2012 Proceedings of IEEE, pp. 1-6, 2012