• Title/Summary/Keyword: Supervisory control and data acquisition

Search Result 117, Processing Time 0.036 seconds

Comparison of SIEM Solutions for Network Security (네트워크 보안을 위한 SIEM 솔루션 비교 분석)

  • Lee, Jong-Hwa;Bang, Jiwon;Kim, Jong-Wouk;Choi, Mi-Jung
    • KNOM Review
    • /
    • v.22 no.1
    • /
    • pp.11-19
    • /
    • 2019
  • As technology develops, the latest security threats on the network applied to users are increasing. By attacking industrial or corporate systems with malicious purposes, hackers cause many social problems such as confidential information leakage, cyber terrorism, infringement of information assets, and financial damage. Due to the complex and diversified threats, the current security personnel alone are not enough to detect and analyze all threats. In particular, the Supervisory Control And Data Acquisition (SCADA) used in industrial infrastructures that collect, analyze, and return static data 24 hours a day, 265 days a year, is very vulnerable to real-time security threats. This paper introduces security information and event management (SIEM), a powerful integrated security management system that can monitor the state of the system in real time and detect security threats. Next, we compare SIEM solutions from various companies with the open source SIEM (OSSIM) from AlienVault, which is distributed as an open source, and present cases using the OSSIM and how to utilize it.

Advanced Key Management Architecture Based on Tree Structure for Secure SCADA Communications (안전한 SCADA 통신을 위한 트리 기반의 효율적인 키 관리 구조)

  • Choi, Dong-Hyun;Lee, Sung-Jin;Jeong, Han-Jae;Kang, Dong-Joo;Kim, Hak-Man;Kim, Kyung-Sin;Won, Dong-Ho;Kim, Seung-Joo
    • The KIPS Transactions:PartC
    • /
    • v.16C no.1
    • /
    • pp.37-50
    • /
    • 2009
  • The SCADA(Supervisory Control And Data Acquisition) system is a control system for infrastructure of nation. In the past, the SCADA system was designed without security function because of its closed operating environment. However, the security of the SCADA system has become an issue with connection to the open network caused by improved technology. In this paper we review the constraints and security requirements for SCADA system and propose advanced key management architecture for secure SCADA communications. The contributions of the present work are that our scheme support both message broadcasting and secure communications, while the existing key management schemes for SCADA system don't support message broadcasting. Moreover, by evenly spreading much of the total amount of computation across high power nodes (MTU or SUB-MTU), our protocol avoids any potential performance bottleneck of the system while keeping the burden on low power (RTU) nodes at minimal.

Validation of the Eddy Viscosity and Lange Wake Models using Measured Wake Flow Characteristics Behind a Large Wind Turbine Rotor (풍력터빈 후류 유동특성 측정 데이터를 이용한 Eddy Viscosity 및 Lange 후류모델의 예측 정확도 검증)

  • Jeon, Sang Hyeon;Go, Young Jun;Kim, Bum Suk;Huh, Jong Chul
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.40 no.1
    • /
    • pp.21-29
    • /
    • 2016
  • The wake effects behind wind turbines were investigated by using data from a Met Mast tower and the SCADA (Supervisory Control and Data Acquisition) system for a wind turbine. The results of the wake investigations and predicted values for the velocity deficit based on the eddy viscosity model were compared with the turbulence intensity from the Lange model. As a result, the velocity deficit and turbulence intensity of the wake increased as the free stream wind speed decreased. In addition, the magnitude of the velocity deficit for the center of the wake using the eddy viscosity model was overestimated while the turbulence intensity from the Lange model showed similarities with measured values.

A case study on the algorithm of redundancy for SCADA system (SCADA 시스템 이중화 알고리즘에 대한 연구)

  • Kang, Dong-oh;Lee, Gang-jun;Song, Won-il;Chae, Ji-seog
    • Proceedings of the KIEE Conference
    • /
    • 2015.07a
    • /
    • pp.1300-1301
    • /
    • 2015
  • SCADA(Supervisory Control and Data Acquisition) 시스템의 이중화는 자동화시스템의 운영측면에서 가장 중요한 부분 중의 하나이며, 본고에서는 발전통합운영시스템의 이중화 솔루션으로 적용된 이중화 프로그램의 알고리즘을 고찰해보고 개발된 프로그램이 당초 목적한 바대로 성능을 발휘하는지에 대해 시험을 실시하고 문제점을 도출하여, 향후 발전통합운영시스템이 안정적이며 최적화된 시스템이 되도록 발전시키는 것이 연구의 목적이라 할 수 있다.

  • PDF

A study on development of multimedia SCADA system for electric facility (영상정보 통합형 전기설비 감시시스템 개발 연구)

  • Lee, W.T.;Lee, J.J.;Jeong, Y.K.;Kim, K.H.
    • Proceedings of the KIEE Conference
    • /
    • 1998.07g
    • /
    • pp.2445-2447
    • /
    • 1998
  • For increasing the quality of SCADA system, the application of image information is demanded from typical SCADA system based on data information. Until now, the remote control and monitoring systems combine data information but now gradually have trends to combine voice, data and image information. So multimedia technology is applied to realize new SCADA system. Depends on these requires, we apply new concepts of communication network and multimedia technology to the SCADA system for electric facility. In this paper, we aim at developing multi media supervisory control and data acquisition system based on data and image information, which used electric power system and security system.

  • PDF

The Development of Power System Automation based on the CAN Communication Protocol (CAN 통신을 기반으로한 전력 시스템 자동화 구축)

  • Park, Jong-Chan;Kim, Beung-Jin
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.52 no.3
    • /
    • pp.95-99
    • /
    • 2003
  • In this paper, the power system automation based on CAN communication protocol is introduced. Along with digitalization of electrical device, the various on-line services such as remote control, remote monitoring, remote parameter setting, fault data recording and remote diagnostic have been realized and become available. Therefore, it is necessary for those electrical devices to have real-time and reliable communication protocols. Author proposes DNPC(Distributed Network Protocol with CAN) which is proper to the power system SCADA (Supervisory Control And Data Acquisition) and DCS (Distributed Control System). The physical and datalink layer of DNPC protocol consists of the CAN2.0B which has the real-time characteristics and powerful error control scheme. As the transport and application layer, DNP3.0 is adopted because of its flexibility and compatible feature. Using the DNPC protocol, the power system automation is realized.

Applying Asymmetric Key Encryption to Secure Internet based SCADA

  • Robles, Rosslin John;Kim, Tai-hoon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.4 no.2
    • /
    • pp.17-21
    • /
    • 2012
  • As an acronym for Supervisory Control and Data Acquisition, SCADA is a concept that is used to refer to the management and procurement of data that can be used in developing process management criteria. The use of the term SCADA varies, depending on location. Conventionally, SCADA is connected only in a limited private network. In current times, there are also demands of connecting SCADA through the internet. The internet SCADA facility has brought a lot of advantages in terms of control, data generation and viewing. With these advantages, come the security issues regarding web SCADA. In this paper, we discuss web SCADA and its connectivity along with the issues regarding security and suggests a web SCADA security solution using asymmetric-key encryption.

The Case of Novel Attack Detection using Virtual Honeynet (Virtual Honeynet을 이용한 신종공격 탐지 사례)

  • Kim, Chun-Suk;Kang, Dae-Kwon;Euom, Ieck-Chae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.2
    • /
    • pp.279-285
    • /
    • 2012
  • Most national critical key infrastructure, such like electricity, nuclear power plant, and petroleum is run on SCADA (Supervisory Control And Data Acquisition) system as the closed network type. These systems have treated the open protocols like TCP/IP, and the commercial operating system, which due to gradually increasing dependence on IT(Information Technology) is a trend. Recently, concerns have been raised about the possibility of these facilities being attacked by cyber terrorists, hacking, or viruses. In this paper, the method to minimize threats and vulnerabilities is proposed, with the virtual honeynet system architecture and the attack detection algorithm, which can detect the unknown attack patterns of Zero-Day Attack are reviewed.

Fuzzy Petri-net Approach to Fault Diagnosis in Power Systems Using the Time Sequence Information of Protection System

  • Roh, Myong-Gyun;Hong, Sang-Eun
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1727-1731
    • /
    • 2003
  • In this paper we proposed backward fuzzy Petri-net to diagnoses faults in power systems by using the time sequence information of protection system. As the complexity of power systems increases, especially in the case of multiple faults or incorrect operation of protective devices, fault diagnosis requires new and systematic methods to the reasoning process, which improves both its accuracy and its efficiency. The fuzzy Petri-net models of protection system are composed of the operating process of protective devices and the fault diagnosis process. Fault diagnosis model, which makes use of the nature of fuzzy Petri-net, is developed to overcome the drawbacks of methods that depend on operator knowledge. The proposed method can reduce processing time and increase accuracy when compared with the traditional methods. And also this method covers online processing of real-time data from SCADA (Supervisory Control and Data Acquisition)

  • PDF

Exchanging of old electrical equipment and discussion of SCADA system's operation related with exchanging of old electrical equipment (노후전력설비 교체에 따른 SCADA시스템의 운용 고찰)

  • Kim, Youn-Sik;Park, Rai-Hyug;Lee, Gi-Seung
    • Proceedings of the KSR Conference
    • /
    • 2008.06a
    • /
    • pp.417-422
    • /
    • 2008
  • The DC high speed circuit breaker used in Seoul Metro for line no.1.2 is Japan HITACHI and FUJI breaker, and for line no.3.4 is Whipp & Bourne MM74 breaker from UK. The years that each breakers made are 1973(line no.1), 1984(line no.3.4), So that equipments are superannuated. Nowday the for equipment exchanging is executing, equipment for exchanging were used the Secheron breaker from Swiss. but now the Intec breaker made in Korea is used. The RTU of supervisory control and data acquisition system have the capabilities that can observe, control and work the installation efficiently. In this paper, as summarizing the solving process of problem that happened the SCADA system when old-equipment exchange and concerned point for logical supervision and control of reservation factors and equipment, I'll provide the direction that can do receiving-process of control-equipment, progressed with the exchange of old-electronic equipment.

  • PDF