Loading…
Analyzing the security and survivability of real-time control systems
Many problems found in complex real-time control systems can be transformed into graph and scheduling problems, thereby inheriting a wealth of potential solutions and prior knowledge. This paper describes a transformation from a real-time control system problem into a graph theoretical formulation i...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 349 |
container_issue | |
container_start_page | 342 |
container_title | |
container_volume | |
creator | Oman, P. Krings, A. Conte de Leon, D. Alves-Foss, J. |
description | Many problems found in complex real-time control systems can be transformed into graph and scheduling problems, thereby inheriting a wealth of potential solutions and prior knowledge. This paper describes a transformation from a real-time control system problem into a graph theoretical formulation in order to leverage existing knowledge of graph theory back into the real world network being analyzed. We use a five-step transformation that converts an example electric power SCADA system into a graph model that allows for solutions derived from graph algorithms. Physical and logical characteristics of the SCADA system are represented within the model in a manner that permits manipulation of the network data. System vulnerabilities are identified and compared via graph algorithms prior to transformation back into the real-time control system problem space. The SCADA system analysis serves as an example of exploiting graph representations and algorithms in order to encapsulate and simplify complex problems into manageable and quantifiable models |
doi_str_mv | 10.1109/IAW.2004.1437837 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_1437837</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1437837</ieee_id><sourcerecordid>1437837</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-b33caf6acd7b3d09907799957474c9bb6eb48aee11dbf0202ffdb3649a891d053</originalsourceid><addsrcrecordid>eNotj01LAzEURQMiKHX2gpv8gRmTSTKZtxxK1UKhG8VlSSYvGpkPSdLC-Out2MuFA3dx4BJyz1nFOYPHbfde1YzJikuhW6GvSAG6ZeeKVum6uSFFSl_sHAGKK3VLNt1khuUnTB80fyJN2B9jyAs1k6PpGE_hZGwY_pbZ04hmKHMYkfbzlOM80LSkjGO6I9feDAmLC1fk7Wnzun4pd_vn7brblYFrlUsrRG98Y3qnrXAMgGkNAEpLLXuwtkErW4PIubOe1az23lnRSDAtcMeUWJGHf29AxMN3DKOJy-FyVvwClLJLDA</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Analyzing the security and survivability of real-time control systems</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Oman, P. ; Krings, A. ; Conte de Leon, D. ; Alves-Foss, J.</creator><creatorcontrib>Oman, P. ; Krings, A. ; Conte de Leon, D. ; Alves-Foss, J.</creatorcontrib><description>Many problems found in complex real-time control systems can be transformed into graph and scheduling problems, thereby inheriting a wealth of potential solutions and prior knowledge. This paper describes a transformation from a real-time control system problem into a graph theoretical formulation in order to leverage existing knowledge of graph theory back into the real world network being analyzed. We use a five-step transformation that converts an example electric power SCADA system into a graph model that allows for solutions derived from graph algorithms. Physical and logical characteristics of the SCADA system are represented within the model in a manner that permits manipulation of the network data. System vulnerabilities are identified and compared via graph algorithms prior to transformation back into the real-time control system problem space. The SCADA system analysis serves as an example of exploiting graph representations and algorithms in order to encapsulate and simplify complex problems into manageable and quantifiable models</description><identifier>ISBN: 9780780385726</identifier><identifier>ISBN: 0780385721</identifier><identifier>DOI: 10.1109/IAW.2004.1437837</identifier><language>eng</language><publisher>IEEE</publisher><subject>Air transportation ; Communication system control ; Control systems ; Power generation ; Power system modeling ; Power system protection ; Power system security ; Real time systems ; SCADA systems ; Telecommunication control</subject><ispartof>Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004, 2004, p.342-349</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1437837$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2056,4047,4048,27923,54918</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1437837$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Oman, P.</creatorcontrib><creatorcontrib>Krings, A.</creatorcontrib><creatorcontrib>Conte de Leon, D.</creatorcontrib><creatorcontrib>Alves-Foss, J.</creatorcontrib><title>Analyzing the security and survivability of real-time control systems</title><title>Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004</title><addtitle>IAW</addtitle><description>Many problems found in complex real-time control systems can be transformed into graph and scheduling problems, thereby inheriting a wealth of potential solutions and prior knowledge. This paper describes a transformation from a real-time control system problem into a graph theoretical formulation in order to leverage existing knowledge of graph theory back into the real world network being analyzed. We use a five-step transformation that converts an example electric power SCADA system into a graph model that allows for solutions derived from graph algorithms. Physical and logical characteristics of the SCADA system are represented within the model in a manner that permits manipulation of the network data. System vulnerabilities are identified and compared via graph algorithms prior to transformation back into the real-time control system problem space. The SCADA system analysis serves as an example of exploiting graph representations and algorithms in order to encapsulate and simplify complex problems into manageable and quantifiable models</description><subject>Air transportation</subject><subject>Communication system control</subject><subject>Control systems</subject><subject>Power generation</subject><subject>Power system modeling</subject><subject>Power system protection</subject><subject>Power system security</subject><subject>Real time systems</subject><subject>SCADA systems</subject><subject>Telecommunication control</subject><isbn>9780780385726</isbn><isbn>0780385721</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2004</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotj01LAzEURQMiKHX2gpv8gRmTSTKZtxxK1UKhG8VlSSYvGpkPSdLC-Out2MuFA3dx4BJyz1nFOYPHbfde1YzJikuhW6GvSAG6ZeeKVum6uSFFSl_sHAGKK3VLNt1khuUnTB80fyJN2B9jyAs1k6PpGE_hZGwY_pbZ04hmKHMYkfbzlOM80LSkjGO6I9feDAmLC1fk7Wnzun4pd_vn7brblYFrlUsrRG98Y3qnrXAMgGkNAEpLLXuwtkErW4PIubOe1az23lnRSDAtcMeUWJGHf29AxMN3DKOJy-FyVvwClLJLDA</recordid><startdate>2004</startdate><enddate>2004</enddate><creator>Oman, P.</creator><creator>Krings, A.</creator><creator>Conte de Leon, D.</creator><creator>Alves-Foss, J.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>2004</creationdate><title>Analyzing the security and survivability of real-time control systems</title><author>Oman, P. ; Krings, A. ; Conte de Leon, D. ; Alves-Foss, J.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-b33caf6acd7b3d09907799957474c9bb6eb48aee11dbf0202ffdb3649a891d053</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Air transportation</topic><topic>Communication system control</topic><topic>Control systems</topic><topic>Power generation</topic><topic>Power system modeling</topic><topic>Power system protection</topic><topic>Power system security</topic><topic>Real time systems</topic><topic>SCADA systems</topic><topic>Telecommunication control</topic><toplevel>online_resources</toplevel><creatorcontrib>Oman, P.</creatorcontrib><creatorcontrib>Krings, A.</creatorcontrib><creatorcontrib>Conte de Leon, D.</creatorcontrib><creatorcontrib>Alves-Foss, J.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library Online</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Oman, P.</au><au>Krings, A.</au><au>Conte de Leon, D.</au><au>Alves-Foss, J.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Analyzing the security and survivability of real-time control systems</atitle><btitle>Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004</btitle><stitle>IAW</stitle><date>2004</date><risdate>2004</risdate><spage>342</spage><epage>349</epage><pages>342-349</pages><isbn>9780780385726</isbn><isbn>0780385721</isbn><abstract>Many problems found in complex real-time control systems can be transformed into graph and scheduling problems, thereby inheriting a wealth of potential solutions and prior knowledge. This paper describes a transformation from a real-time control system problem into a graph theoretical formulation in order to leverage existing knowledge of graph theory back into the real world network being analyzed. We use a five-step transformation that converts an example electric power SCADA system into a graph model that allows for solutions derived from graph algorithms. Physical and logical characteristics of the SCADA system are represented within the model in a manner that permits manipulation of the network data. System vulnerabilities are identified and compared via graph algorithms prior to transformation back into the real-time control system problem space. The SCADA system analysis serves as an example of exploiting graph representations and algorithms in order to encapsulate and simplify complex problems into manageable and quantifiable models</abstract><pub>IEEE</pub><doi>10.1109/IAW.2004.1437837</doi><tpages>8</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9780780385726 |
ispartof | Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004, 2004, p.342-349 |
issn | |
language | eng |
recordid | cdi_ieee_primary_1437837 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Air transportation Communication system control Control systems Power generation Power system modeling Power system protection Power system security Real time systems SCADA systems Telecommunication control |
title | Analyzing the security and survivability of real-time control systems |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T00%3A01%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Analyzing%20the%20security%20and%20survivability%20of%20real-time%20control%20systems&rft.btitle=Proceedings%20from%20the%20Fifth%20Annual%20IEEE%20SMC%20Information%20Assurance%20Workshop,%202004&rft.au=Oman,%20P.&rft.date=2004&rft.spage=342&rft.epage=349&rft.pages=342-349&rft.isbn=9780780385726&rft.isbn_list=0780385721&rft_id=info:doi/10.1109/IAW.2004.1437837&rft_dat=%3Cieee_6IE%3E1437837%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i175t-b33caf6acd7b3d09907799957474c9bb6eb48aee11dbf0202ffdb3649a891d053%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1437837&rfr_iscdi=true |