• Title/Summary/Keyword: Supervisory Control and Data Acquisition (SCADA)

Search Result 109, Processing Time 0.028 seconds

Securing a Cyber Physical System in Nuclear Power Plants Using Least Square Approximation and Computational Geometric Approach

  • Gawand, Hemangi Laxman;Bhattacharjee, A.K.;Roy, Kallol
    • Nuclear Engineering and Technology
    • /
    • v.49 no.3
    • /
    • pp.484-494
    • /
    • 2017
  • In industrial plants such as nuclear power plants, system operations are performed by embedded controllers orchestrated by Supervisory Control and Data Acquisition (SCADA) software. A targeted attack (also termed a control aware attack) on the controller/SCADA software can lead a control system to operate in an unsafe mode or sometimes to complete shutdown of the plant. Such malware attacks can result in tremendous cost to the organization for recovery, cleanup, and maintenance activity. SCADA systems in operational mode generate huge log files. These files are useful in analysis of the plant behavior and diagnostics during an ongoing attack. However, they are bulky and difficult for manual inspection. Data mining techniques such as least squares approximation and computational methods can be used in the analysis of logs and to take proactive actions when required. This paper explores methodologies and algorithms so as to develop an effective monitoring scheme against control aware cyber attacks. It also explains soft computation techniques such as the computational geometric method and least squares approximation that can be effective in monitor design. This paper provides insights into diagnostic monitoring of its effectiveness by attack simulations on a four-tank model and using computation techniques to diagnose it. Cyber security of instrumentation and control systems used in nuclear power plants is of paramount importance and hence could be a possible target of such applications.

A Study on the Secure Plan of Security in SCADA Systems (SCADA 시스템의 안전성 확보방안에 관한 연구)

  • Kim, Young-Jin;Lee, Jung-Hyun;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.145-152
    • /
    • 2009
  • SCADA(Supervisory Control And Data Acquisition) systems are widely used for control and monitoring of critical infrastructures including electricity, gas and transportation. Any compromise in the security of SCADA systems could result in massive chaos and disaster at a national level if a malicious attacker takes the control of the system. Therefore, sound countermeasures must be provided when the SCADA systems are being developed as well as when they are being operated. Unlike general information processing system, SCADA systems have different service responses, communication protocols and network architectures and therefore a different approach should be applied to each SCADA systems that takes into consideration of each system's security characteristics and architectures. In addition, legal basis should be established to ensure the nationwide management of the systems security. This paper examines the vulnerabilites of SCADA systems and proposes action plans to protect the systems against cyber attacks.

사물인터넷(IoT) 기반 스마트 그리드 보안 특성 및 쟁점 분석

  • Jeon, Yong-Hee
    • Review of KIISC
    • /
    • v.24 no.5
    • /
    • pp.59-65
    • /
    • 2014
  • 산업제어시스템과 SCADA(Supervisory Control and Data Acquisition) 제어 시스템들이 기존의 고립적이고 폐쇄적인 시스템에서 점차 개방적이고 표준화된 시스템으로 전환되고 있으며, IT 망과의 통합이 이루어지고 있다. 따라서 주요 국가정보 인프라에 대한 사이버 위협 및 공격에 대한 우려가 증대되고 있다. 산업제어시스템의 정보보호 기술은 일반적인 IT 정보보호 기술과는 특성상 여러 가지 차이점이 존재한다. 국내에서의 산업제어시스템 정보보호 기술에 대한 연구는 아직 미약한 수준이다. 본 논문에서는 국가 주요 정보하부구조를 구성하고 있는 산업제어시스템 중에서 사물인터넷(IoT) 기반 스마트 그리드 시스템의 보안 특성에 대하여 분석하고 보안 쟁점 및 고려사항을 제시하고자 한다.

InTouch HMI Development to Real-Time Power System Analysis (실시간 전력 계통 해석을 위한 InTouch HMI 구현)

  • Ahn, Chang-Han;Lee, Sang-Deok;Park, Ji-Ho;Chang, Byung-Hoon;Lee, Hyun-Chul;Lee, Geun-Joon;Baek, Young-Sik
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.58 no.12
    • /
    • pp.2322-2327
    • /
    • 2009
  • Uncertainty of power system operation increases due to complexity and facilities diversification in the power system. Therefore the importance of SCADA(Supervisory Control and Data Acquisition) system which obtain and manage the actual data in real-time is very important. Accordingly in the studies of power system analysis, the efforts to include real-time power system analysis in simulation and applications are made in many ways. The real-time communication characteristics of SCADA system is considered so as to develop the power system analysis program that matches actual system conditions. The observation and management of SCADA system is realized by Intouch which is mainly used for factory automation and PSS/E(Power System Simulator for Engineers) provides real time system data. SQL DB and Python language is used for real-time communication between the softwares. It is very comfortable to use the various functions in Intouch WindowMaker.

The Case of Novel Attack Detection using Virtual Honeynet (Virtual Honeynet을 이용한 신종공격 탐지 사례)

  • Kim, Chun-Suk;Kang, Dae-Kwon;Euom, Ieck-Chae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.2
    • /
    • pp.279-285
    • /
    • 2012
  • Most national critical key infrastructure, such like electricity, nuclear power plant, and petroleum is run on SCADA (Supervisory Control And Data Acquisition) system as the closed network type. These systems have treated the open protocols like TCP/IP, and the commercial operating system, which due to gradually increasing dependence on IT(Information Technology) is a trend. Recently, concerns have been raised about the possibility of these facilities being attacked by cyber terrorists, hacking, or viruses. In this paper, the method to minimize threats and vulnerabilities is proposed, with the virtual honeynet system architecture and the attack detection algorithm, which can detect the unknown attack patterns of Zero-Day Attack are reviewed.

Validation of the Eddy Viscosity and Lange Wake Models using Measured Wake Flow Characteristics Behind a Large Wind Turbine Rotor (풍력터빈 후류 유동특성 측정 데이터를 이용한 Eddy Viscosity 및 Lange 후류모델의 예측 정확도 검증)

  • Jeon, Sang Hyeon;Go, Young Jun;Kim, Bum Suk;Huh, Jong Chul
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.40 no.1
    • /
    • pp.21-29
    • /
    • 2016
  • The wake effects behind wind turbines were investigated by using data from a Met Mast tower and the SCADA (Supervisory Control and Data Acquisition) system for a wind turbine. The results of the wake investigations and predicted values for the velocity deficit based on the eddy viscosity model were compared with the turbulence intensity from the Lange model. As a result, the velocity deficit and turbulence intensity of the wake increased as the free stream wind speed decreased. In addition, the magnitude of the velocity deficit for the center of the wake using the eddy viscosity model was overestimated while the turbulence intensity from the Lange model showed similarities with measured values.

Long term monitoring of a cable stayed bridge using DuraMote

  • Torbol, Marco;Kim, Sehwan;Shinozuka, Masanobu
    • Smart Structures and Systems
    • /
    • v.11 no.5
    • /
    • pp.453-476
    • /
    • 2013
  • DuraMote is a remote sensing system developed for the "NIST TIP project: next generation SCADA for prevention and mitigation of water system infrastructure disaster". It is designed for supervisory control and data acquisition (SCADA) of ruptures in water pipes. Micro-electro mechanical (MEMS) accelerometers, which record the vibration of the pipe wall, are used detect the ruptures. However, the performance of Duramote cannot be verified directly on a water distribution system because it lacks an acceptable recordable level of ambient vibration. Instead, a long-span cable-stayed bridge is an ideal test-bed to validate the accuracy, the reliability, and the robustness of DuraMote because the bridge has an acceptable level of ambient vibration. The acceleration data recorded on the bridge were used to identify the modal properties of the structure and to verify the performance of DuraMote. During the test period, the bridge was subjected to heavy rain, wind, and a typhoon but the system demonstrates its robustness and durability.

Study on Artificial Neural Network Based Fault Detection Schemes for Wind Turbine System (풍력발전 시스템을 위한 인공 신경망 기반의 고장검출기법에 대한 연구)

  • Moon, Dae-Sun;Kim, Sung-Ho
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.22 no.5
    • /
    • pp.603-609
    • /
    • 2012
  • Wind energy is currently the fastest growing source of renewable energy used for electrical generation around world. Wind farms are adding a significant amount of electrical generation capacity. The increase in the number of wind farms has led to the need for more effective operation and maintenance procedures. Condition Monitoring System(CMS) can be used to aid plant owners in achieving these goals. Its aim is to provide operators with information regarding the health of their machines, which in turn, can help them improve operational efficiency. In this work, systematic design procedure for artificial neural network based normal behavior model which can be applied for fault detection of various devices is proposed. Furthermore, to verify the design method SCADA(Supervisor Control and Data Acquisition) data from 850KW wind turbine system installed in Beaung port were utilized.

A Study on the Security Management for Critical Key Infrastructure(SCADA) (중요핵심기반시설(SCADA)에 대한 보안 관리 연구)

  • Kim InJung;Chung YoonJung;Koh JaeYoung;Won Dongho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.8C
    • /
    • pp.838-848
    • /
    • 2005
  • Most of the national critical key infrastructure, such as power, piped gas and water supply facilities, or the high-speed railroad, is run on the SCADA system. Recently, concerns have been raised about the possibility of these facilities being attacked by cyber terrorists, hacking, or viruses. Thus, it is time to adopt the relevant security management techniques. This paper attempts to propose such security management techniques, including information protection measures and troubleshooting, based on a risk analysis process concerning assets, threats/vulnerability, and hazards, and to examine the security management status of critical key infrastructure in the U.S. and Japan.

An Optimization Method for the Calculation of SCADA Main Grid's Theoretical Line Loss Based on DBSCAN

  • Cao, Hongyi;Ren, Qiaomu;Zou, Xiuguo;Zhang, Shuaitang;Qian, Yan
    • Journal of Information Processing Systems
    • /
    • v.15 no.5
    • /
    • pp.1156-1170
    • /
    • 2019
  • In recent years, the problem of data drifted of the smart grid due to manual operation has been widely studied by researchers in the related domain areas. It has become an important research topic to effectively and reliably find the reasonable data needed in the Supervisory Control and Data Acquisition (SCADA) system has become an important research topic. This paper analyzes the data composition of the smart grid, and explains the power model in two smart grid applications, followed by an analysis on the application of each parameter in density-based spatial clustering of applications with noise (DBSCAN) algorithm. Then a comparison is carried out for the processing effects of the boxplot method, probability weight analysis method and DBSCAN clustering algorithm on the big data driven power grid. According to the comparison results, the performance of the DBSCAN algorithm outperforming other methods in processing effect. The experimental verification shows that the DBSCAN clustering algorithm can effectively screen the power grid data, thereby significantly improving the accuracy and reliability of the calculation result of the main grid's theoretical line loss.