Loading…

Analyzing the security and survivability of real-time control systems

Many problems found in complex real-time control systems can be transformed into graph and scheduling problems, thereby inheriting a wealth of potential solutions and prior knowledge. This paper describes a transformation from a real-time control system problem into a graph theoretical formulation i...

Full description

Saved in:
Bibliographic Details
Main Authors: Oman, P., Krings, A., Conte de Leon, D., Alves-Foss, J.
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 349
container_issue
container_start_page 342
container_title
container_volume
creator Oman, P.
Krings, A.
Conte de Leon, D.
Alves-Foss, J.
description Many problems found in complex real-time control systems can be transformed into graph and scheduling problems, thereby inheriting a wealth of potential solutions and prior knowledge. This paper describes a transformation from a real-time control system problem into a graph theoretical formulation in order to leverage existing knowledge of graph theory back into the real world network being analyzed. We use a five-step transformation that converts an example electric power SCADA system into a graph model that allows for solutions derived from graph algorithms. Physical and logical characteristics of the SCADA system are represented within the model in a manner that permits manipulation of the network data. System vulnerabilities are identified and compared via graph algorithms prior to transformation back into the real-time control system problem space. The SCADA system analysis serves as an example of exploiting graph representations and algorithms in order to encapsulate and simplify complex problems into manageable and quantifiable models
doi_str_mv 10.1109/IAW.2004.1437837
format conference_proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_1437837</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1437837</ieee_id><sourcerecordid>1437837</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-b33caf6acd7b3d09907799957474c9bb6eb48aee11dbf0202ffdb3649a891d053</originalsourceid><addsrcrecordid>eNotj01LAzEURQMiKHX2gpv8gRmTSTKZtxxK1UKhG8VlSSYvGpkPSdLC-Out2MuFA3dx4BJyz1nFOYPHbfde1YzJikuhW6GvSAG6ZeeKVum6uSFFSl_sHAGKK3VLNt1khuUnTB80fyJN2B9jyAs1k6PpGE_hZGwY_pbZ04hmKHMYkfbzlOM80LSkjGO6I9feDAmLC1fk7Wnzun4pd_vn7brblYFrlUsrRG98Y3qnrXAMgGkNAEpLLXuwtkErW4PIubOe1az23lnRSDAtcMeUWJGHf29AxMN3DKOJy-FyVvwClLJLDA</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Analyzing the security and survivability of real-time control systems</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Oman, P. ; Krings, A. ; Conte de Leon, D. ; Alves-Foss, J.</creator><creatorcontrib>Oman, P. ; Krings, A. ; Conte de Leon, D. ; Alves-Foss, J.</creatorcontrib><description>Many problems found in complex real-time control systems can be transformed into graph and scheduling problems, thereby inheriting a wealth of potential solutions and prior knowledge. This paper describes a transformation from a real-time control system problem into a graph theoretical formulation in order to leverage existing knowledge of graph theory back into the real world network being analyzed. We use a five-step transformation that converts an example electric power SCADA system into a graph model that allows for solutions derived from graph algorithms. Physical and logical characteristics of the SCADA system are represented within the model in a manner that permits manipulation of the network data. System vulnerabilities are identified and compared via graph algorithms prior to transformation back into the real-time control system problem space. The SCADA system analysis serves as an example of exploiting graph representations and algorithms in order to encapsulate and simplify complex problems into manageable and quantifiable models</description><identifier>ISBN: 9780780385726</identifier><identifier>ISBN: 0780385721</identifier><identifier>DOI: 10.1109/IAW.2004.1437837</identifier><language>eng</language><publisher>IEEE</publisher><subject>Air transportation ; Communication system control ; Control systems ; Power generation ; Power system modeling ; Power system protection ; Power system security ; Real time systems ; SCADA systems ; Telecommunication control</subject><ispartof>Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004, 2004, p.342-349</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1437837$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2056,4047,4048,27923,54918</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1437837$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Oman, P.</creatorcontrib><creatorcontrib>Krings, A.</creatorcontrib><creatorcontrib>Conte de Leon, D.</creatorcontrib><creatorcontrib>Alves-Foss, J.</creatorcontrib><title>Analyzing the security and survivability of real-time control systems</title><title>Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004</title><addtitle>IAW</addtitle><description>Many problems found in complex real-time control systems can be transformed into graph and scheduling problems, thereby inheriting a wealth of potential solutions and prior knowledge. This paper describes a transformation from a real-time control system problem into a graph theoretical formulation in order to leverage existing knowledge of graph theory back into the real world network being analyzed. We use a five-step transformation that converts an example electric power SCADA system into a graph model that allows for solutions derived from graph algorithms. Physical and logical characteristics of the SCADA system are represented within the model in a manner that permits manipulation of the network data. System vulnerabilities are identified and compared via graph algorithms prior to transformation back into the real-time control system problem space. The SCADA system analysis serves as an example of exploiting graph representations and algorithms in order to encapsulate and simplify complex problems into manageable and quantifiable models</description><subject>Air transportation</subject><subject>Communication system control</subject><subject>Control systems</subject><subject>Power generation</subject><subject>Power system modeling</subject><subject>Power system protection</subject><subject>Power system security</subject><subject>Real time systems</subject><subject>SCADA systems</subject><subject>Telecommunication control</subject><isbn>9780780385726</isbn><isbn>0780385721</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2004</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotj01LAzEURQMiKHX2gpv8gRmTSTKZtxxK1UKhG8VlSSYvGpkPSdLC-Out2MuFA3dx4BJyz1nFOYPHbfde1YzJikuhW6GvSAG6ZeeKVum6uSFFSl_sHAGKK3VLNt1khuUnTB80fyJN2B9jyAs1k6PpGE_hZGwY_pbZ04hmKHMYkfbzlOM80LSkjGO6I9feDAmLC1fk7Wnzun4pd_vn7brblYFrlUsrRG98Y3qnrXAMgGkNAEpLLXuwtkErW4PIubOe1az23lnRSDAtcMeUWJGHf29AxMN3DKOJy-FyVvwClLJLDA</recordid><startdate>2004</startdate><enddate>2004</enddate><creator>Oman, P.</creator><creator>Krings, A.</creator><creator>Conte de Leon, D.</creator><creator>Alves-Foss, J.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>2004</creationdate><title>Analyzing the security and survivability of real-time control systems</title><author>Oman, P. ; Krings, A. ; Conte de Leon, D. ; Alves-Foss, J.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-b33caf6acd7b3d09907799957474c9bb6eb48aee11dbf0202ffdb3649a891d053</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Air transportation</topic><topic>Communication system control</topic><topic>Control systems</topic><topic>Power generation</topic><topic>Power system modeling</topic><topic>Power system protection</topic><topic>Power system security</topic><topic>Real time systems</topic><topic>SCADA systems</topic><topic>Telecommunication control</topic><toplevel>online_resources</toplevel><creatorcontrib>Oman, P.</creatorcontrib><creatorcontrib>Krings, A.</creatorcontrib><creatorcontrib>Conte de Leon, D.</creatorcontrib><creatorcontrib>Alves-Foss, J.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library Online</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Oman, P.</au><au>Krings, A.</au><au>Conte de Leon, D.</au><au>Alves-Foss, J.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Analyzing the security and survivability of real-time control systems</atitle><btitle>Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004</btitle><stitle>IAW</stitle><date>2004</date><risdate>2004</risdate><spage>342</spage><epage>349</epage><pages>342-349</pages><isbn>9780780385726</isbn><isbn>0780385721</isbn><abstract>Many problems found in complex real-time control systems can be transformed into graph and scheduling problems, thereby inheriting a wealth of potential solutions and prior knowledge. This paper describes a transformation from a real-time control system problem into a graph theoretical formulation in order to leverage existing knowledge of graph theory back into the real world network being analyzed. We use a five-step transformation that converts an example electric power SCADA system into a graph model that allows for solutions derived from graph algorithms. Physical and logical characteristics of the SCADA system are represented within the model in a manner that permits manipulation of the network data. System vulnerabilities are identified and compared via graph algorithms prior to transformation back into the real-time control system problem space. The SCADA system analysis serves as an example of exploiting graph representations and algorithms in order to encapsulate and simplify complex problems into manageable and quantifiable models</abstract><pub>IEEE</pub><doi>10.1109/IAW.2004.1437837</doi><tpages>8</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 9780780385726
ispartof Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004, 2004, p.342-349
issn
language eng
recordid cdi_ieee_primary_1437837
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Air transportation
Communication system control
Control systems
Power generation
Power system modeling
Power system protection
Power system security
Real time systems
SCADA systems
Telecommunication control
title Analyzing the security and survivability of real-time control systems
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T00%3A01%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Analyzing%20the%20security%20and%20survivability%20of%20real-time%20control%20systems&rft.btitle=Proceedings%20from%20the%20Fifth%20Annual%20IEEE%20SMC%20Information%20Assurance%20Workshop,%202004&rft.au=Oman,%20P.&rft.date=2004&rft.spage=342&rft.epage=349&rft.pages=342-349&rft.isbn=9780780385726&rft.isbn_list=0780385721&rft_id=info:doi/10.1109/IAW.2004.1437837&rft_dat=%3Cieee_6IE%3E1437837%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i175t-b33caf6acd7b3d09907799957474c9bb6eb48aee11dbf0202ffdb3649a891d053%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1437837&rfr_iscdi=true