skip to main content
10.1145/2459976.2460021acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

First steps toward scientific cyber-security experimentation in wide-area cyber-physical systems

Published: 08 January 2013 Publication History

Abstract

This extended abstract reports on steps towards an environment for repeatable and scalable experiments on wide-area cyber-physical systems. The cyber-physical systems that underlie the world's critical infrastructure are increasingly vulnerable to attack and failure. Our work has focused on secure and resilient communication technology for the electric power grid, a subset of the general cyber-physical problem. We have demonstrated tools and methodology for experimentation with GridStat, a middleware system designed to provide enhanced communication service for the grid, within the DETERlab cyber-security testbed. Experiment design tools for DETERlab and for GridStat will ease the creation and execution of relatively large experiments, and they should make this environment accessible to users inexperienced with cluster testbeds. This abstract presents brief overviews of DETERLab and of GridStat and describes their integration. It also describes a large scale GridStat/DETERlab experiment.

References

[1]
Bonneville power administration. http://www.bpa.gov/. Accessed: Aug 10 2012.
[2]
IRIGB standard. http://www.irigb.com/. Accessed: Aug 10 2012.
[3]
IEEE standard for a precision clock synchronization protocol for networked measurement and control systems. IEEE Std 1588--2008 (Revision of IEEE Std 1588--2002), pages c1--269, 24 2008.
[4]
IEEE standard for synchrophasor measurements for power systems. IEEE Std C37.118.1--2011 (Revision of IEEE Std C37.118--2005), pages 1--61, 28 2011.
[5]
A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr. Basic concepts and taxonomy of dependable and secure computing. Dependable and Secure Computing, IEEE Transactions on, 1(1):11--33, jan.-march 2004.
[6]
D. Bakken, A. Bose, C. Hauser, D. Whitehead, and G. Zweigle. Smart generation and transmission with coherent, real-time data. Proceedings of the IEEE, 99(6):928--951, june 2011.
[7]
T. Benzel. The science of cyber security experimentation: the deter project. In Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC '11, pages 137--148, New York, NY, USA, 2011. ACM.
[8]
A. Bose. Smart transmission grid applications and their supporting infrastructure. Smart Grid, IEEE Transactions on, 1(1):11--19, june 2010.
[9]
A. Husain, B. Wilson, and G. Lawler. Scalable workflows for networking and cyber security experiments. 2012.
[10]
V. Irava. Low-Cost Delay-Constrained Multicast Routing Heuristics and their Evaluation. PhD thesis, Washington State University, 2006.
[11]
S. Schwab, B. Wilson, C. Ko, and A. Hussain. Seer: a security experimentation environment for deter. In Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test on DETER Community Workshop on Cyber Security Experimentation and Test 2007, DETER, pages 2--2, Berkeley, CA, USA, 2007. USENIX Association.
[12]
J. Stahlhut, T. Browne, G. Heydt, and V. Vittal. Latency viewed as a stochastic process and its impact on wide area power system control signals. Power Systems, IEEE Transactions on, 23(1):84--91, feb. 2008.
[13]
B. White, J. Lepreau, L. Stoller, R. Ricci, S. Guruprasad, M. Newbold, M. Hibler, C. Barb, and A. Joglekar. An integrated experimental environment for distributed systems and networks. In Proc. of the Fifth Symposium on Operating Systems Design and Implementation, pages 255--270, Boston, MA, Dec. 2002. USENIX Association

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
CSIIRW '13: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
January 2013
282 pages
ISBN:9781450316873
DOI:10.1145/2459976

Sponsors

  • Los Alamos National Labs: Los Alamos National Labs
  • Sandia National Labs: Sandia National Laboratories
  • DOE: Department of Energy
  • Oak Ridge National Laboratory
  • Lawrence Livermore National Lab.: Lawrence Livermore National Laboratory
  • BERKELEYLAB: Lawrence National Berkeley Laboratory
  • Argonne Natl Lab: Argonne National Lab
  • Idaho National Lab.: Idaho National Laboratory
  • Pacific Northwest National Laboratory
  • Nevada National Security Site: Nevada National Security Site

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 January 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. cyber-physical
  2. cyber-security
  3. experimental research
  4. overlay network
  5. smart grid
  6. testbed

Qualifiers

  • Research-article

Conference

CSIIRW '13
Sponsor:
  • Los Alamos National Labs
  • Sandia National Labs
  • DOE
  • Lawrence Livermore National Lab.
  • BERKELEYLAB
  • Argonne Natl Lab
  • Idaho National Lab.
  • Nevada National Security Site
CSIIRW '13: Cyber Security and Information Intelligence
January 8 - 10, 2013
Tennessee, Oak Ridge, USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)7
  • Downloads (Last 6 weeks)0
Reflects downloads up to 29 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media