Deploying Intrusion-Tolerant SCADA for the Power Grid
Title | Deploying Intrusion-Tolerant SCADA for the Power Grid |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Babay, Amy, Schultz, John, Tantillo, Thomas, Beckley, Samuel, Jordan, Eamon, Ruddell, Kevin, Jordan, Kevin, Amir, Yair |
Conference Name | 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) |
Date Published | jun |
Keywords | composability, compositionality, deployment, Human Behavior, Intrusion detection, intrusion tolerance, intrusion-tolerant SCADA system, machine learning, power engineering computing, power generation, power grid, power grid protection, power grid SCADA systems, power grid supervisory control and data acquisition systems, power grids, Power industry, power plant, Power system protection, Protocols, pubcrawl, red team, Resiliency, SCADA, SCADA systems, SCADA Systems Security, security of data |
Abstract | While there has been considerable research on making power grid Supervisory Control and Data Acquisition (SCADA) systems resilient to attacks, the problem of transitioning these technologies into deployed SCADA systems remains largely unaddressed. We describe our experience and lessons learned in deploying an intrusion-tolerant SCADA system in two realistic environments: a red team experiment in 2017 and a power plant test deployment in 2018. These experiences resulted in technical lessons related to developing an intrusion-tolerant system with a real deployable application, preparing a system for deployment in a hostile environment, and supporting protocol assumptions in that hostile environment. We also discuss some meta-lessons regarding the cultural aspects of transitioning academic research into practice in the power industry. |
DOI | 10.1109/DSN.2019.00043 |
Citation Key | babay_deploying_2019 |
- power grid supervisory control and data acquisition systems
- security of data
- SCADA Systems Security
- SCADA systems
- SCADA
- Resiliency
- red team
- pubcrawl
- Protocols
- Power system protection
- power plant
- Power industry
- power grids
- Compositionality
- power grid SCADA systems
- power grid protection
- Power Grid
- power generation
- power engineering computing
- machine learning
- intrusion-tolerant SCADA system
- intrusion tolerance
- Intrusion Detection
- Human behavior
- deployment
- composability