Risk Assessment of EDS Technology and Systems
CREDC is developing models, simulations, and analysis methodologies for understanding how threats may be manifested and to assess the impact to the EDS when they are threatened. EDS systems are complex in their physical architecture and in the cyber infrastructure that controls them, and in the business processes that drive them. Models and simulations address risks at the subsystem level and (when appropriate) are integrated to create end-to-end risk assessments in EDS cybersecurity and cyber-resiliency.
Related Research Activities
- Adaptive and Proactive Security Assessment on Energy Delivery Systems
- Advanced Networking Technology for Energy Delivery Systems
- Anomaly Detection for Securing Communications in Advanced Metering Infrastructure
- Data Privacy in Energy Delivery Systems
- Data Sharing for Energy Delivery Systems
- Forecasting Cybersecurity Incidents in Energy Delivery Systems
- Increasing Cyber-Resilience of Large-Scale and Long-Lived Energy Delivery Infrastructure (EDI)
- Increasing Security in a Resilient Energy Delivery Infrastructure through the Analysis of Vulnerability and Exploit Markets
- Modeling Security Risk to and Resiliency of EDS Using Software-Defined Networks and Robust Networked Control Systems
- PreventOTPhysDamage: Anticipating and Preventing Catastrophic OT Physical Damage Through System Thinking Analysis
- Quantification of Cyber-Physical Security Risk and Probability of Rare Failures
- Real-time Cyber Analysis to Improve Operational Response to a Cyber Attack
- Real-time Situational Awareness of Risk to EDS To Cyber Attack
- Reliability and Cyber-Physical Threat Model Generation from a Standards Influenced Ontology
- REMEDYS: Research Exploring Malware in Energy DeliverY Systems
- Security Gaps due to Coupling of Energy Delivery Sub-systems
- Situational Awareness Framework for Cyber Security Event Prediction and Quantification (SAFFRON)
- Supporting Security with Advanced Multimodal Grid Data Analytics
Related Publications
- A Security Framework for SDN-enabled Smart Power Grids
- A Systems Theoretic Approach to the Security Threats in Cyber Physical Systems Applied to Stuxnet
- An Approach to Incorporating Uncertainty in Network Security Analysis
- An Internet-Wide View of ICS Devices
- Analysis of Stepping Stone Attacks in Dynamic Vulnerability Graphs
- Anomaly Detection Using Optimally-Placed micro-PMU Sensors in Distribution Grids
- Automated Anomaly Detection in Distribution Grids Using Micro-PMU Measurements
- Consensus-Based Intrusion Detection for the Electric Power Grid Control System
- Curing the Vulnerable Parser: Design Patterns for Secure Input Handling
- Data Injection Attacks in Randomized Gossiping
- Detecting Manipulation of Power Distribution System Control Devices
- Diversity Modeling to Evaluate Security of Multiple SDN Controllers
- EDSGuard: Enforcing Network Security Requirements for Energy Delivery Systems
- Efficient Monte Carlo Evaluation of SDN Resiliency
- Exploring Security Metrics for Electric Grid Infrastructures Leveraging Attack Graphs
- F-DETA: A Framework for Detecting Electricity Theft Attacks in Smart Grids
- Gas and Electric Grid Unit Commitment with Coordinated N-1 Generator Contingency Analysis
- Going Dark: A Retrospective on the North American Blackout of 2038
- Implementing a vertically hardened DNP3 control stack for power applications
- Input Handling Done Right: Building Hardened Parsers using Language-theoretic Security
- Invisible and Forgotten: Zero-Day Blooms in the IoT
- Low-Resolution Fault Localization Using Phasor Measurement Units with Community Detection
- Micro Synchrophasor-Based Intrusion Detection in Automated Distribution Systems: Towards Critical Infrastructure Security
- Modeling Cost of Countermeasures in Software Defined Networking-enabled Energy Delivery System
- Multi-agent System for Detecting False Data Injection Attacks Against the Power Grid
- Online Thevenin Parameter Tracking Using Synchrophasor Data
- OntoEDS: Protecting Energy Delivery Systems by Collaboratively Analyzing Security Requirements
- Optimal Electricity Pricing for Societal Infrastructure Systems
- Peer-to-peer Detection of DoS Attacks on City-Scale IoT Mesh Networks
- PhasorSec: Protocol Security Filters for Wide Area Measurement Systems
- PulseSS: A Pulse-Coupled Synchronization and Scheduling Protocol for Clustered Wireless Sensor Networks
- Reinventing the Privilege Drop: How Principled Preservation of Programmer Intent Would Prevent Security Bugs
- Runtime semantic security analysis to detect and mitigate control-related attacks in power grids
- Safety-critical Cyber-physical Attacks: Analysis, Detection, and Mitigation
- Self-Healing Cyber Resilient Framework for Software Defined Networking-enabled Energy Delivery System
- Software Defined Networking enabled Resilience for IEC 61850-based Substation Communication Systems
- TEDDI: Tamper Event Detection on Distributed Cyber-Physical Systems
- The Seven Turrets of Babel: A Taxonomy of LangSec Errors and How to Expunge Them
- Towards A Verified Complex Protocol Stack in a Production Kernel: Methodology and Demonstration
- Towards Adaptive and Proactive Security Assessment for Energy Delivery Systems
- Transmission and Distribution Co-Simulation with Possible Distribution Loops