1 / 5

SCADA control network

SCADA control network. Cyber-Security Threats to Power Grid. Internet-Based Attacks. Worms / Trojan Horse / Spyware. Denial of Service (DoS). Routing Attacks. Intrusions. Protocol Attacks. Threats to Power Infrastructure. SCADA Network – Denial of service attack (model).

Download Presentation

SCADA control network

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SCADA control network Page 1

  2. Cyber-Security Threats to Power Grid Internet-Based Attacks Worms / Trojan Horse / Spyware Denial of Service (DoS) Routing Attacks Intrusions Protocol Attacks Threats to Power Infrastructure Page 2

  3. SCADA Network – Denial of service attack (model) Schematic of SCADA System Control Model of SCADA System Latency increase impact the real-time operation of the system Page 3

  4. Cyber-Physical Risk Modeling & Mitigation Framework Anomaly Detection Impact Analysis Real-Time Monitoring Responses Page 4

  5. Research Challenges A Comprehensive vulnerability assessment framework includes Real-time temporalandspatial correlations from substation level and control center networks Integrated modeling of attacks and their impacts in terms of load loss, equipment damage, and economic loss Risk Modeling Real-Time Mitigation Anomaly detection Cybersecurity Validation Relevant information from geographically dispersed substation network about potential suspicious activities, intrusions, in terms of severity Comprehensive validation using analytical and simulation, and test bed evaluations for directed and intelligent attacks Page 5

More Related