首页 > 最新文献

2018 Resilience Week (RWS)最新文献

英文 中文
A Tri-Modular Framework to Minimize Smart Grid Cyber-Attack Cognitive Gap in Utility Control Centers 利用三模块框架最小化公用事业控制中心智能电网网络攻击认知差距
Pub Date : 2018-08-01 DOI: 10.1109/RWEEK.2018.8473503
Aditya Sundararajan, Longfei Wei, Tanwir Khan, A. Sarwat, Deepal Rodrigo
The Operation and Information Technology support personnel at utility command and control centers constantly detect suspicious events and/or extreme conditions across the smart grid. Already overwhelmed by routine mandatory tasks like guidelines compliance and patching that if ignored could incur penalties, they have little time to understand the large volumes of event logs generated by intrusion detection systems, firewalls, and other security tools. The cognitive gap between these powerful automated tools and the human mind reduces the situation awareness, thereby increasing the likelihood of sub-optimal decisions that could be advantageous to well-evolved attackers. This paper proposes a tri-modular framework which shifts low-performance processing speed and data contextualization to intelligent learning algorithms that provide humans only with actionable information, thereby bridging the cognitive gap. The framework has three modules including Data Module (DM): Kafka, Spark, and R to ingest streams of heterogeneous data; Classification Module (CM): a Long Short-Term Memory (LSTM) model to classify processed data; and Action Module (AM): naturalistic and rational models for time-critical and non-time-critical decision-making, respectively. This paper focuses on the design and development of the modules, and demonstrates proof-of-concept of DM using partially synthesized streams of real smart grid network security data.
公用事业指挥和控制中心的操作和信息技术支持人员不断检测智能电网中的可疑事件和/或极端情况。他们已经被常规的强制性任务(如遵循指导方针和打补丁)压得喘不过气来,如果忽视这些任务可能会招致惩罚,他们几乎没有时间去理解入侵检测系统、防火墙和其他安全工具生成的大量事件日志。这些强大的自动化工具和人类思维之间的认知差距减少了对情况的感知,从而增加了对进化良好的攻击者有利的次优决策的可能性。本文提出了一个三模块框架,将低性能的处理速度和数据情境化转变为智能学习算法,仅为人类提供可操作的信息,从而弥合认知差距。该框架有三个模块,包括数据模块(DM): Kafka、Spark和R,用于摄取异构数据流;分类模块(CM):对处理后的数据进行分类的长短期记忆(LSTM)模型;行动模块(AM):分别用于时间关键型和非时间关键型决策的自然主义和理性模型。本文重点介绍了模块的设计和开发,并利用部分合成的真实智能电网网络安全数据流演示了DM的概念验证。
{"title":"A Tri-Modular Framework to Minimize Smart Grid Cyber-Attack Cognitive Gap in Utility Control Centers","authors":"Aditya Sundararajan, Longfei Wei, Tanwir Khan, A. Sarwat, Deepal Rodrigo","doi":"10.1109/RWEEK.2018.8473503","DOIUrl":"https://doi.org/10.1109/RWEEK.2018.8473503","url":null,"abstract":"The Operation and Information Technology support personnel at utility command and control centers constantly detect suspicious events and/or extreme conditions across the smart grid. Already overwhelmed by routine mandatory tasks like guidelines compliance and patching that if ignored could incur penalties, they have little time to understand the large volumes of event logs generated by intrusion detection systems, firewalls, and other security tools. The cognitive gap between these powerful automated tools and the human mind reduces the situation awareness, thereby increasing the likelihood of sub-optimal decisions that could be advantageous to well-evolved attackers. This paper proposes a tri-modular framework which shifts low-performance processing speed and data contextualization to intelligent learning algorithms that provide humans only with actionable information, thereby bridging the cognitive gap. The framework has three modules including Data Module (DM): Kafka, Spark, and R to ingest streams of heterogeneous data; Classification Module (CM): a Long Short-Term Memory (LSTM) model to classify processed data; and Action Module (AM): naturalistic and rational models for time-critical and non-time-critical decision-making, respectively. This paper focuses on the design and development of the modules, and demonstrates proof-of-concept of DM using partially synthesized streams of real smart grid network security data.","PeriodicalId":206638,"journal":{"name":"2018 Resilience Week (RWS)","volume":"282 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124508553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Trouble in Paradise: Mutual Awareness, Teamwork, and Hawaii False Ballistic Missile Alert 麻烦在天堂:相互意识,团队合作,和夏威夷虚假弹道导弹警报
Pub Date : 2018-08-01 DOI: 10.1109/RWEEK.2018.8473470
K. Savchenko, H. Medema, R. Boring
At 8:07 a.m. on January 13, 2018, the Hawaii Emergency Management Agency transmitted a false ballistic missile alert via cellphone, television, and radio throughout the state of Hawaii. Stating, “BALLISTIC MISSILE THREAT INBOUND TO HAWAII. SEEK IMMEDIATE SHELTER. THIS IS NOT A DRILL,” the alert created widespread panic. Finally, after 38 minutes, a second message was issued, assuring the public that the alert was false. Initial speculation attributed the occurrence to human error in which the emergency officer inadvertently selected the option to elicit an actual alert rather than the mock drill alert. The emergency worker believed the attack to be real due to what he perceived to be a mistake in the means by which the drill was initiated during a shift change. The employee reported that he did not hear the word “exercise” repeated during the drill. Fellow coworkers reported that they had clearly heard the word during the drill. Investigations opened by the Federal Communications Commission, Hawaii House of Representatives, and Hawaii Department of Defense uncovered a critical lack of training and training records management, as well as poor and inconsistent work procedures and processes within both the Hawaii Emergency Management Agency and the Federal Emergency Management Agency. Additionally, the investigation highlighted a decade of consistent performance issues for work carried out by the emergency officer. This paper will examine the Hawaii Missile False Alarm Incident in greater detail with a focus on the contributing human factors. Specifically, this review presents the many aspects of mutual awareness that were present and addresses how each type plays a critical role in the cooperation and team-specific behaviors carried out within both the crew dynamic and the operations between the two emergency management agencies and their employees.
2018年1月13日上午8点07分,夏威夷州紧急事务管理局通过手机、电视和广播向全州传播了虚假的弹道导弹警报。“弹道导弹威胁进入夏威夷。”立即寻求庇护。这不是演习,”警报引起了广泛的恐慌。38分钟后,终于发布了第二条消息,向公众保证警报是假的。最初的猜测是人为失误造成的,应急人员无意中选择了触发实际警报而不是模拟演习警报的选项。这名紧急救援人员认为袭击是真的,因为他认为演习是在换班时启动的。该员工报告说,他在演习中没有听到“锻炼”这个词重复。同事们报告说,他们在演习中清楚地听到了这个词。联邦通信委员会、夏威夷众议院和夏威夷国防部开展的调查发现,夏威夷紧急事务管理局和联邦紧急事务管理局都严重缺乏培训和培训记录管理,工作程序和流程也不完善和不一致。此外,调查突出表明,十年来应急干事的工作一直存在绩效问题。本文将以人为因素为重点,更详细地研究夏威夷导弹误报事件。具体而言,本综述介绍了相互意识的许多方面,并讨论了每种类型如何在机组动态和两个应急管理机构及其员工之间的操作中开展的合作和团队特定行为中发挥关键作用。
{"title":"Trouble in Paradise: Mutual Awareness, Teamwork, and Hawaii False Ballistic Missile Alert","authors":"K. Savchenko, H. Medema, R. Boring","doi":"10.1109/RWEEK.2018.8473470","DOIUrl":"https://doi.org/10.1109/RWEEK.2018.8473470","url":null,"abstract":"At 8:07 a.m. on January 13, 2018, the Hawaii Emergency Management Agency transmitted a false ballistic missile alert via cellphone, television, and radio throughout the state of Hawaii. Stating, “BALLISTIC MISSILE THREAT INBOUND TO HAWAII. SEEK IMMEDIATE SHELTER. THIS IS NOT A DRILL,” the alert created widespread panic. Finally, after 38 minutes, a second message was issued, assuring the public that the alert was false. Initial speculation attributed the occurrence to human error in which the emergency officer inadvertently selected the option to elicit an actual alert rather than the mock drill alert. The emergency worker believed the attack to be real due to what he perceived to be a mistake in the means by which the drill was initiated during a shift change. The employee reported that he did not hear the word “exercise” repeated during the drill. Fellow coworkers reported that they had clearly heard the word during the drill. Investigations opened by the Federal Communications Commission, Hawaii House of Representatives, and Hawaii Department of Defense uncovered a critical lack of training and training records management, as well as poor and inconsistent work procedures and processes within both the Hawaii Emergency Management Agency and the Federal Emergency Management Agency. Additionally, the investigation highlighted a decade of consistent performance issues for work carried out by the emergency officer. This paper will examine the Hawaii Missile False Alarm Incident in greater detail with a focus on the contributing human factors. Specifically, this review presents the many aspects of mutual awareness that were present and addresses how each type plays a critical role in the cooperation and team-specific behaviors carried out within both the crew dynamic and the operations between the two emergency management agencies and their employees.","PeriodicalId":206638,"journal":{"name":"2018 Resilience Week (RWS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124509288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intrusion Detection & Response using an Unsupervised Artificial Neural Network on a Single Board Computer for Building Control Resilience 基于无监督人工神经网络的单板机入侵检测与响应研究
Pub Date : 2018-08-01 DOI: 10.1109/RWEEK.2018.8473533
C. B. Jones, C. Carter, Zachary Thomas
The communications infrastructure for building automation systems was not originally designed to be resilient, and is susceptible to network attacks. Adversaries can exploit out-of-date legacy systems, insecure open protocols, exposure to the public internet, and outdated firmware to cause harm. To improve the defense strategies, significant efforts to provide defense through network detection have been conducted. However, the existing solutions require human intervention, such as analyst or an incident responder to investigate breaches and mitigate possible damages or data loss. Instead, this paper proposes an automated, device-level solution that can be deployed on a single board computer to effectively detect, and provide response strategies that deflect malicious signals and remediate infected devices when network-based cyber-attacks are successful. The solution monitors critical control networks, analyzes packet data, and actively detects and responds to attacks using an unsupervised artificial neural network.
楼宇自动化系统的通信基础设施最初并没有设计成具有弹性,并且容易受到网络攻击。攻击者可以利用过时的遗留系统、不安全的开放协议、暴露于公共互联网和过时的固件来造成伤害。为了改进防御策略,通过网络检测提供防御已经进行了大量工作。然而,现有的解决方案需要人工干预,例如分析师或事件响应人员来调查违规行为并减轻可能的损害或数据丢失。相反,本文提出了一种自动化的设备级解决方案,该解决方案可以部署在单板计算机上,以有效地检测并提供响应策略,在基于网络的网络攻击成功时转移恶意信号并修复受感染的设备。该解决方案通过无监督人工神经网络监控关键控制网络,分析数据包数据,并主动检测和响应攻击。
{"title":"Intrusion Detection & Response using an Unsupervised Artificial Neural Network on a Single Board Computer for Building Control Resilience","authors":"C. B. Jones, C. Carter, Zachary Thomas","doi":"10.1109/RWEEK.2018.8473533","DOIUrl":"https://doi.org/10.1109/RWEEK.2018.8473533","url":null,"abstract":"The communications infrastructure for building automation systems was not originally designed to be resilient, and is susceptible to network attacks. Adversaries can exploit out-of-date legacy systems, insecure open protocols, exposure to the public internet, and outdated firmware to cause harm. To improve the defense strategies, significant efforts to provide defense through network detection have been conducted. However, the existing solutions require human intervention, such as analyst or an incident responder to investigate breaches and mitigate possible damages or data loss. Instead, this paper proposes an automated, device-level solution that can be deployed on a single board computer to effectively detect, and provide response strategies that deflect malicious signals and remediate infected devices when network-based cyber-attacks are successful. The solution monitors critical control networks, analyzes packet data, and actively detects and responds to attacks using an unsupervised artificial neural network.","PeriodicalId":206638,"journal":{"name":"2018 Resilience Week (RWS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131673434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Unsupervised Classification of Frequency Hopped Signals in Frequency-Selective Channels 频率选择信道中跳频信号的无监督分类
Pub Date : 2018-08-01 DOI: 10.1109/RWEEK.2018.8473515
Joseph L. Loof, T. Pratt, Eric M. Jesse
Unsupervised classification methods based on polarization features are considered for the problem of associating frequency-hopped pulses according to their transmission source. The problem is considered in frequency-selective propagation channels, where discrimination cannot be obtained simply through signal amplitude information, and where angle-of-arrival methods are challenged by multipath. Source discrimination is based on polarization-frequency behavior, leveraging polarization mode dispersion (PMD) associated with each propagation channel. The passive receiver employs a dual-polarized antenna to collect orthogonally-polarized complex baseband signals, measure PMD responses, and compare the responses with a dynamic library of responses to identify signals that likely originated from the same source. The PMD responses are updated upon reception of each pulse and the number of unique sources may also be estimated.
针对跳频脉冲的发射源关联问题,提出了基于极化特征的无监督分类方法。该问题是在频率选择传播信道中考虑的,其中不能简单地通过信号幅度信息获得识别,并且到达角方法受到多径的挑战。源识别基于偏振频率行为,利用与每个传播信道相关的偏振模色散(PMD)。无源接收机采用双极化天线收集正交极化复合基带信号,测量PMD响应,并将响应与动态响应库进行比较,以识别可能来自同一来源的信号。PMD响应在接收到每个脉冲时更新,并且还可以估计唯一源的数量。
{"title":"Unsupervised Classification of Frequency Hopped Signals in Frequency-Selective Channels","authors":"Joseph L. Loof, T. Pratt, Eric M. Jesse","doi":"10.1109/RWEEK.2018.8473515","DOIUrl":"https://doi.org/10.1109/RWEEK.2018.8473515","url":null,"abstract":"Unsupervised classification methods based on polarization features are considered for the problem of associating frequency-hopped pulses according to their transmission source. The problem is considered in frequency-selective propagation channels, where discrimination cannot be obtained simply through signal amplitude information, and where angle-of-arrival methods are challenged by multipath. Source discrimination is based on polarization-frequency behavior, leveraging polarization mode dispersion (PMD) associated with each propagation channel. The passive receiver employs a dual-polarized antenna to collect orthogonally-polarized complex baseband signals, measure PMD responses, and compare the responses with a dynamic library of responses to identify signals that likely originated from the same source. The PMD responses are updated upon reception of each pulse and the number of unique sources may also be estimated.","PeriodicalId":206638,"journal":{"name":"2018 Resilience Week (RWS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125252607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Structure and Function of Interconnected Critical Infrastructures 互联关键基础设施的结构与功能
Pub Date : 2018-08-01 DOI: 10.1109/RWEEK.2018.8473545
G. Weaver, T. Klett, T. Holcomb
This paper presents ongoing research to understand the interplay between the structure and behavior of critical infrastructure systems. The National Infrastructure Protection Plan (NIPP), Presidential Policy Directive 21 (PPD 21), and other documents underscore the need to conduct risk assessments on critical infrastructure and discover high-risk assets. Complicating this problem however, is that interdependencies that aren’t explicitly modeled as part of the system can be important and greatly impact the system being studied. For example, the reported BadBIOS attack illustrates that through unexpected interactions (e.g. inaudible sounds), systems thought to be air-gapped may communicate with one another. Moreover, the impact of a disruption may be defined relative to some spatial or temporal scale and this may not always be explicit in a risk assessment. By combining graph complexity metrics with simulation, we hope to efficiently identify critical assets as well as understand more about the relationship between structure and function with critical infrastructure systems. This paper presents preliminary results from the electrical power grid as part of our ongoing research effort.
本文介绍了正在进行的研究,以了解关键基础设施系统的结构和行为之间的相互作用。国家基础设施保护计划(NIPP)、总统政策指令21 (PPD 21)和其他文件强调了对关键基础设施进行风险评估和发现高风险资产的必要性。然而,使这个问题复杂化的是,没有作为系统的一部分显式建模的相互依赖关系可能很重要,并且会极大地影响所研究的系统。例如,报道的BadBIOS攻击说明,通过意想不到的交互(例如,听不见的声音),被认为是气隙的系统可能会相互通信。此外,中断的影响可以相对于某些空间或时间尺度来定义,这在风险评估中可能并不总是明确的。通过将图形复杂性度量与仿真相结合,我们希望能够有效地识别关键资产,并更多地了解关键基础设施系统的结构和功能之间的关系。本文介绍了电网的初步结果,作为我们正在进行的研究工作的一部分。
{"title":"Structure and Function of Interconnected Critical Infrastructures","authors":"G. Weaver, T. Klett, T. Holcomb","doi":"10.1109/RWEEK.2018.8473545","DOIUrl":"https://doi.org/10.1109/RWEEK.2018.8473545","url":null,"abstract":"This paper presents ongoing research to understand the interplay between the structure and behavior of critical infrastructure systems. The National Infrastructure Protection Plan (NIPP), Presidential Policy Directive 21 (PPD 21), and other documents underscore the need to conduct risk assessments on critical infrastructure and discover high-risk assets. Complicating this problem however, is that interdependencies that aren’t explicitly modeled as part of the system can be important and greatly impact the system being studied. For example, the reported BadBIOS attack illustrates that through unexpected interactions (e.g. inaudible sounds), systems thought to be air-gapped may communicate with one another. Moreover, the impact of a disruption may be defined relative to some spatial or temporal scale and this may not always be explicit in a risk assessment. By combining graph complexity metrics with simulation, we hope to efficiently identify critical assets as well as understand more about the relationship between structure and function with critical infrastructure systems. This paper presents preliminary results from the electrical power grid as part of our ongoing research effort.","PeriodicalId":206638,"journal":{"name":"2018 Resilience Week (RWS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133614636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards Modeling Attacker’s Opportunity for Improving Cyber Resilience in Energy Delivery Systems 建模攻击者的机会,提高能源输送系统的网络弹性
Pub Date : 2018-08-01 DOI: 10.1109/RWEEK.2018.8473511
Sharif Ullah, S. Shetty, Amin Hassanzadeh
Cyber resiliency of Energy Delivery Systems (EDS) is critical for secure and resilient cyber infrastructure. Defense-in-depth architecture forces attackers to conduct lateral propagation until the target is compromised. Researchers developed techniques based on graph spectral matrices to model lateral propagation. However, these techniques ignore host criticality which is critical in EDS. In this paper, we model attacker’s opportunity by developing three criticality metrics for each host along the path to the target. The first metric refers the opportunity of attackers before they penetrate the infrastructure. The second metric measure the opportunity a host provides by allowing attackers to propagate through the network. Along with vulnerability we also take into account the attributes of hosts and links within each path. Then, we derive third criticality metric to reflect the information flow dependency from each host to target. Finally, we provide system design for instantiating the proposed metrics for real network scenarios in EDS. We present simulation results which illustrates the effectiveness of the metrics for efficient defense deployment in EDS cyber infrastructure.
能源输送系统(EDS)的网络弹性对于安全和弹性的网络基础设施至关重要。纵深防御架构迫使攻击者进行横向传播,直到目标被攻破。研究人员开发了基于图谱矩阵的技术来模拟横向传播。然而,这些技术忽略了主机临界性,这在EDS中是至关重要的。在本文中,我们通过为每个主机开发三个关键指标来模拟攻击者的机会。第一个指标是指攻击者在渗透基础设施之前的机会。第二个指标衡量主机通过允许攻击者通过网络传播而提供的机会。除了漏洞,我们还考虑了每个路径中的主机和链接的属性。然后,我们导出第三个临界度量来反映从每个主机到目标的信息流依赖性。最后,我们提供了在EDS中实例化所提出的度量标准的系统设计。我们给出的仿真结果说明了这些指标在EDS网络基础设施中有效防御部署的有效性。
{"title":"Towards Modeling Attacker’s Opportunity for Improving Cyber Resilience in Energy Delivery Systems","authors":"Sharif Ullah, S. Shetty, Amin Hassanzadeh","doi":"10.1109/RWEEK.2018.8473511","DOIUrl":"https://doi.org/10.1109/RWEEK.2018.8473511","url":null,"abstract":"Cyber resiliency of Energy Delivery Systems (EDS) is critical for secure and resilient cyber infrastructure. Defense-in-depth architecture forces attackers to conduct lateral propagation until the target is compromised. Researchers developed techniques based on graph spectral matrices to model lateral propagation. However, these techniques ignore host criticality which is critical in EDS. In this paper, we model attacker’s opportunity by developing three criticality metrics for each host along the path to the target. The first metric refers the opportunity of attackers before they penetrate the infrastructure. The second metric measure the opportunity a host provides by allowing attackers to propagate through the network. Along with vulnerability we also take into account the attributes of hosts and links within each path. Then, we derive third criticality metric to reflect the information flow dependency from each host to target. Finally, we provide system design for instantiating the proposed metrics for real network scenarios in EDS. We present simulation results which illustrates the effectiveness of the metrics for efficient defense deployment in EDS cyber infrastructure.","PeriodicalId":206638,"journal":{"name":"2018 Resilience Week (RWS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132271247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Locating Microgrids to Improve Smart City Resilience 定位微电网,提高智慧城市弹性
Pub Date : 2018-08-01 DOI: 10.1109/RWEEK.2018.8473464
Abdulaziz Alqahtani, D. Tipper, Katrina Kelly-Pitou
Determining the best location and configuration of microgrids to support post-disaster critical infrastructure operation in smart cities is a significant issue for policymakers and electric system planners. In this paper, we propose a two-phase approach to locating microgrids to increase critical infrastructure resilience. In the first phase, we consider how to prioritize critical infrastructure components in smart cities using either a normalized combination of characteristics or a ranked list of lists method. Numerical results show that the two methods give similar results. In the second phase, we propose to combine prioritization information across multiple infrastructures geographically to identify potential locations for microgrids. A simple heuristic for location of a microgrid is proposed and compared with an optimization model that seeks to find the location that minimizes a weighted combination of prioritization information and cost.
确定微电网的最佳位置和配置,以支持智能城市灾后关键基础设施的运行,是政策制定者和电力系统规划者面临的一个重要问题。在本文中,我们提出了一种两阶段的方法来定位微电网,以增加关键基础设施的弹性。在第一阶段,我们考虑如何使用特征的标准化组合或列表的排序列表方法来优先考虑智慧城市中的关键基础设施组件。数值结果表明,两种方法得到的结果相似。在第二阶段,我们建议结合多个基础设施的地理优先级信息,以确定微电网的潜在位置。提出了一种简单的微电网定位启发式算法,并与寻求最小化优先级信息和成本加权组合的优化模型进行了比较。
{"title":"Locating Microgrids to Improve Smart City Resilience","authors":"Abdulaziz Alqahtani, D. Tipper, Katrina Kelly-Pitou","doi":"10.1109/RWEEK.2018.8473464","DOIUrl":"https://doi.org/10.1109/RWEEK.2018.8473464","url":null,"abstract":"Determining the best location and configuration of microgrids to support post-disaster critical infrastructure operation in smart cities is a significant issue for policymakers and electric system planners. In this paper, we propose a two-phase approach to locating microgrids to increase critical infrastructure resilience. In the first phase, we consider how to prioritize critical infrastructure components in smart cities using either a normalized combination of characteristics or a ranked list of lists method. Numerical results show that the two methods give similar results. In the second phase, we propose to combine prioritization information across multiple infrastructures geographically to identify potential locations for microgrids. A simple heuristic for location of a microgrid is proposed and compared with an optimization model that seeks to find the location that minimizes a weighted combination of prioritization information and cost.","PeriodicalId":206638,"journal":{"name":"2018 Resilience Week (RWS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114850063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Hierarchical Multi-Agent Based Anomaly Detection for Wide-Area Protection in Smart Grid 基于分层多智能体的智能电网广域保护异常检测
Pub Date : 2018-08-01 DOI: 10.1109/RWEEK.2018.8473514
Vivek Kumar Singh, Altay Ozen, M. Govindarasu
Future smart grid capabilities provide assurance to expand the advanced information and communication technologies to evolve into densely interconnected cyber physical system. Remedial Action Scheme (RAS), widely used for wide-area protection, relies on the interconnected networks and data sharing devices, which are exposed to the multitude of vulnerabilities. This paper presents our proposed approach to developing multi-agent based RAS scheme against the system-aware stealthy cyber-attacks. Specifically, we propose the two-level hierarchical architecture which consists of distributed local RAS controllers (RAScs) as local agents, operating at different zones/ areas, which are constantly monitored by an overseer, the central agent. The local controllers receive local and randomly changing outside zonal measurements and cyclically forwards to the overseer. The overseer identifies the corrupted controller using the anomaly detection algorithm which processes the measurements coming from the local controllers, compute measurement errors using local and outside zonal measurements, perform validation checks, and finally detect anomalies based on the two-step verification. Next, as a proof of concept, we have implemented and validated the proposed methodology in cyber physical environment at Iowa State’s PowerCyber testbed. We have also implemented the coordinated attack vectors which involve corrupting the local controller and later performing stealthy attacks on the system’s generator. We have evaluated its performance during the online testing in terms of detection rate and Iatency. The experimental results show that it is efficient in detecting different classes of attacks, including ramp and pulse attacks.
未来的智能电网能力为扩展先进的信息通信技术向密集互联的网络物理系统演进提供了保证。补救行动方案(RAS)广泛用于广域保护,依赖于互联网络和数据共享设备,暴露在众多漏洞中。本文提出了一种基于多智能体的RAS方案,用于对抗系统感知的隐形网络攻击。具体来说,我们提出了两级分层架构,该架构由分布式本地RAS控制器(rasc)组成,作为本地代理,在不同的区域/区域运行,由监督者(中央代理)不断监控。本地控制器接收本地和随机变化的外部区域测量,并循环转发给监督员。监督员使用异常检测算法识别损坏的控制器,该算法处理来自本地控制器的测量,使用本地和外部区域测量计算测量误差,执行验证检查,最后根据两步验证检测异常。接下来,作为概念验证,我们在爱荷华州立大学PowerCyber试验台的网络物理环境中实施并验证了所提出的方法。我们还实现了协调攻击向量,包括破坏本地控制器,然后对系统的生成器进行隐形攻击。我们在在线测试期间对其检测率和延迟性进行了评估。实验结果表明,该方法可以有效地检测各种类型的攻击,包括斜坡攻击和脉冲攻击。
{"title":"A Hierarchical Multi-Agent Based Anomaly Detection for Wide-Area Protection in Smart Grid","authors":"Vivek Kumar Singh, Altay Ozen, M. Govindarasu","doi":"10.1109/RWEEK.2018.8473514","DOIUrl":"https://doi.org/10.1109/RWEEK.2018.8473514","url":null,"abstract":"Future smart grid capabilities provide assurance to expand the advanced information and communication technologies to evolve into densely interconnected cyber physical system. Remedial Action Scheme (RAS), widely used for wide-area protection, relies on the interconnected networks and data sharing devices, which are exposed to the multitude of vulnerabilities. This paper presents our proposed approach to developing multi-agent based RAS scheme against the system-aware stealthy cyber-attacks. Specifically, we propose the two-level hierarchical architecture which consists of distributed local RAS controllers (RAScs) as local agents, operating at different zones/ areas, which are constantly monitored by an overseer, the central agent. The local controllers receive local and randomly changing outside zonal measurements and cyclically forwards to the overseer. The overseer identifies the corrupted controller using the anomaly detection algorithm which processes the measurements coming from the local controllers, compute measurement errors using local and outside zonal measurements, perform validation checks, and finally detect anomalies based on the two-step verification. Next, as a proof of concept, we have implemented and validated the proposed methodology in cyber physical environment at Iowa State’s PowerCyber testbed. We have also implemented the coordinated attack vectors which involve corrupting the local controller and later performing stealthy attacks on the system’s generator. We have evaluated its performance during the online testing in terms of detection rate and Iatency. The experimental results show that it is efficient in detecting different classes of attacks, including ramp and pulse attacks.","PeriodicalId":206638,"journal":{"name":"2018 Resilience Week (RWS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128430859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Coping with communication challenges after the Formosa Fun Coast Dust Explosion 福尔摩沙娱乐海岸粉尘爆炸后的沟通挑战
Pub Date : 2018-08-01 DOI: 10.1109/RWEEK.2018.8473499
Sheuwen Chuang, Chia-Hsin Cheng, Hsiao-Chun Chen, Ching-An Lee, David D. Woods
The Formosa Fun Coast Dust Explosion (FFCDE) occurred on 27 June 2015. It is the largest man-made disaster in Taiwan’s history. The paper explores how participating actors dealt with the communication challenges to rescue 499 burn victims from the disaster scene and provide resuscitation and life support for mass burn casualties in hospitals following the FFCDE. Data collection was via review of government reports and journal publications as well as in-depth individual interviews with 36 key participants in this event. Technological communication issues and human related communication issues were identified. The analysis reveals that the remodel of local incident command post at the disaster scene improved the difficulties caused by inadequate communications, and hospital staff’ resilience to adapt was based on anticipation in the face of uncertainty and on coordination across roles and units to keep pace with the time varying demands.
2015年6月27日,福尔摩沙娱乐海岸粉尘爆炸(FFCDE)发生。这是台湾历史上最大的人为灾难。本文探讨了在FFCDE后,参与参与者如何应对通信挑战,从灾难现场救出499名烧伤受害者,并为医院的大量烧伤伤员提供复苏和生命支持。数据收集是通过审查政府报告和期刊出版物,以及对36名主要参与者进行深入的个人采访。确定了技术沟通问题和与人有关的沟通问题。分析表明,灾害现场当地事件指挥所的改造改善了通信不足造成的困难,医院工作人员的适应能力是基于面对不确定性的预期和跨角色和单位的协调,以跟上时间变化的需求。
{"title":"Coping with communication challenges after the Formosa Fun Coast Dust Explosion","authors":"Sheuwen Chuang, Chia-Hsin Cheng, Hsiao-Chun Chen, Ching-An Lee, David D. Woods","doi":"10.1109/RWEEK.2018.8473499","DOIUrl":"https://doi.org/10.1109/RWEEK.2018.8473499","url":null,"abstract":"The Formosa Fun Coast Dust Explosion (FFCDE) occurred on 27 June 2015. It is the largest man-made disaster in Taiwan’s history. The paper explores how participating actors dealt with the communication challenges to rescue 499 burn victims from the disaster scene and provide resuscitation and life support for mass burn casualties in hospitals following the FFCDE. Data collection was via review of government reports and journal publications as well as in-depth individual interviews with 36 key participants in this event. Technological communication issues and human related communication issues were identified. The analysis reveals that the remodel of local incident command post at the disaster scene improved the difficulties caused by inadequate communications, and hospital staff’ resilience to adapt was based on anticipation in the face of uncertainty and on coordination across roles and units to keep pace with the time varying demands.","PeriodicalId":206638,"journal":{"name":"2018 Resilience Week (RWS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114542031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Systems Level Evaluation of Resilience in Human-Autonomy Teaming under Degraded Conditions 退化条件下人类自主团队弹性的系统级评价
Pub Date : 2018-08-01 DOI: 10.1109/RWEEK.2018.8473561
David A. Grimm, Mustafa Demir, Jamie C. Gorman, Nancy J. Cooke
In this longitudinal study, we examined the performance of Human Autonomy Teams (HATs) in the context of a Remotely Piloted Aircraft System (RPAS) to determine team resilience of HATs under three types of degraded conditions – an automation failure, an autonomy failure, and a malicious cyber-attack. In this study, two human team members interacted with a “synthetic” agent who was actually a well-trained experimenter. First, we identified high- and low-performing teams by considering team performance score and overcoming number of failures across 10 40-minute missions. We calculated the amount of system level entropy (extracted from human and technological signals) over the course of the missions to track the amount of system reorganization in response to failures. We hypothesized that resilient teams would be more effective at reorganizing system level behavior, as observed through entropy. To explore team resilience, we examined how long it took these two teams to overcome the failures, as well as the amount of system reorganization each team displayed throughout the failure. Our findings from this exploratory analysis indicate that the high-performing team displayed more flexibility and adaptivity under degraded conditions than the low-performing team. This also underlines that effective systems level reorganization is needed in order to be adaptive and resilient in a dynamic task environment.
在这项纵向研究中,我们考察了远程驾驶飞机系统(RPAS)背景下人类自主团队(HATs)的表现,以确定HATs在三种退化条件下的团队弹性——自动化故障、自主性故障和恶意网络攻击。在这项研究中,两名人类团队成员与一名“合成”代理人进行互动,该代理人实际上是一名训练有素的实验者。首先,我们通过考虑团队绩效得分和克服10个40分钟任务中的失败次数来确定高绩效和低绩效团队。我们计算了整个任务过程中系统级熵(从人类和技术信号中提取)的数量,以跟踪响应故障的系统重组的数量。我们假设弹性团队在重组系统级行为方面更有效,正如通过熵观察到的那样。为了探索团队的弹性,我们检查了这两个团队克服失败所花费的时间,以及每个团队在整个失败过程中显示的系统重组的数量。我们的探索性分析结果表明,在退化条件下,高绩效团队比低绩效团队表现出更多的灵活性和适应性。这也强调需要有效的系统级重组,以便在动态任务环境中具有适应性和弹性。
{"title":"Systems Level Evaluation of Resilience in Human-Autonomy Teaming under Degraded Conditions","authors":"David A. Grimm, Mustafa Demir, Jamie C. Gorman, Nancy J. Cooke","doi":"10.1109/RWEEK.2018.8473561","DOIUrl":"https://doi.org/10.1109/RWEEK.2018.8473561","url":null,"abstract":"In this longitudinal study, we examined the performance of Human Autonomy Teams (HATs) in the context of a Remotely Piloted Aircraft System (RPAS) to determine team resilience of HATs under three types of degraded conditions – an automation failure, an autonomy failure, and a malicious cyber-attack. In this study, two human team members interacted with a “synthetic” agent who was actually a well-trained experimenter. First, we identified high- and low-performing teams by considering team performance score and overcoming number of failures across 10 40-minute missions. We calculated the amount of system level entropy (extracted from human and technological signals) over the course of the missions to track the amount of system reorganization in response to failures. We hypothesized that resilient teams would be more effective at reorganizing system level behavior, as observed through entropy. To explore team resilience, we examined how long it took these two teams to overcome the failures, as well as the amount of system reorganization each team displayed throughout the failure. Our findings from this exploratory analysis indicate that the high-performing team displayed more flexibility and adaptivity under degraded conditions than the low-performing team. This also underlines that effective systems level reorganization is needed in order to be adaptive and resilient in a dynamic task environment.","PeriodicalId":206638,"journal":{"name":"2018 Resilience Week (RWS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122554224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2018 Resilience Week (RWS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1