Collaborative, trust-based security mechanisms for a regional utility intranet

This article investigates network policies and mechanisms to enhance security in SCADA networks using a mix of TCP and UDP transport protocols over IP. It recommends creating a trust system that can be added in strategic locations to protect existing legacy architectures and to accommodate a transit...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Coates, G., Hopkinson, K., Graham, S., Kurkowski, S.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1
container_issue
container_start_page 1
container_title
container_volume
creator Coates, G.
Hopkinson, K.
Graham, S.
Kurkowski, S.
description This article investigates network policies and mechanisms to enhance security in SCADA networks using a mix of TCP and UDP transport protocols over IP. It recommends creating a trust system that can be added in strategic locations to protect existing legacy architectures and to accommodate a transition to IP through the introduction of equipment based on modern standards such as IEC 61850. The trust system is based on a best-of-breed application of standard information technology (IT) network security mechanisms and IP protocols. The trust system provides seamless, automated command and control for the suppression of network attacks and other suspicious events. It also supplies access control, format validation, event analysis, alerting, blocking, and event logging at any network-level and can do so on behalf of any system that does not have the resources to perform these functions itself. Latency calculations are used to estimate limits of applicability within a company and between geographically separated company and area control centers, scalable to hierarchical regional implementations.
doi_str_mv 10.1109/PES.2009.5275808
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5275808</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5275808</ieee_id><sourcerecordid>5275808</sourcerecordid><originalsourceid>FETCH-ieee_primary_52758083</originalsourceid><addsrcrecordid>eNp9jkELgjAYhgcVZOU96LIfkLapSz2L0SmCusunfdZiamwz8N9n0LnDw3t43sNDyJozn3OW7s75xQ8YS30RxCJhyYS4aZzwKIiiEb6fEoenYeAJweM5WRjzZEyEo3fIKeuUgrLTYOUbt9Tq3livBIM3arDqtbQDbbB6QCtNY2jdaQpU4112LSjaW6m-D9laDS3aFZnVoAy6v12SzSG_ZkdPImLx0rIBPRS_zPC__QAfSEB1</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Collaborative, trust-based security mechanisms for a regional utility intranet</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Coates, G. ; Hopkinson, K. ; Graham, S. ; Kurkowski, S.</creator><creatorcontrib>Coates, G. ; Hopkinson, K. ; Graham, S. ; Kurkowski, S.</creatorcontrib><description>This article investigates network policies and mechanisms to enhance security in SCADA networks using a mix of TCP and UDP transport protocols over IP. It recommends creating a trust system that can be added in strategic locations to protect existing legacy architectures and to accommodate a transition to IP through the introduction of equipment based on modern standards such as IEC 61850. The trust system is based on a best-of-breed application of standard information technology (IT) network security mechanisms and IP protocols. The trust system provides seamless, automated command and control for the suppression of network attacks and other suspicious events. It also supplies access control, format validation, event analysis, alerting, blocking, and event logging at any network-level and can do so on behalf of any system that does not have the resources to perform these functions itself. Latency calculations are used to estimate limits of applicability within a company and between geographically separated company and area control centers, scalable to hierarchical regional implementations.</description><identifier>ISSN: 1932-5517</identifier><identifier>ISBN: 9781424442416</identifier><identifier>ISBN: 1424442419</identifier><identifier>DOI: 10.1109/PES.2009.5275808</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access control ; Access protocols ; Collaboration ; Command and control systems ; IEC standards ; Information security ; Information technology ; Protection ; TCPIP ; Transport protocols</subject><ispartof>2009 IEEE Power &amp; Energy Society General Meeting, 2009, p.1-1</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5275808$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2056,27923,54918</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5275808$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Coates, G.</creatorcontrib><creatorcontrib>Hopkinson, K.</creatorcontrib><creatorcontrib>Graham, S.</creatorcontrib><creatorcontrib>Kurkowski, S.</creatorcontrib><title>Collaborative, trust-based security mechanisms for a regional utility intranet</title><title>2009 IEEE Power &amp; Energy Society General Meeting</title><addtitle>PES</addtitle><description>This article investigates network policies and mechanisms to enhance security in SCADA networks using a mix of TCP and UDP transport protocols over IP. It recommends creating a trust system that can be added in strategic locations to protect existing legacy architectures and to accommodate a transition to IP through the introduction of equipment based on modern standards such as IEC 61850. The trust system is based on a best-of-breed application of standard information technology (IT) network security mechanisms and IP protocols. The trust system provides seamless, automated command and control for the suppression of network attacks and other suspicious events. It also supplies access control, format validation, event analysis, alerting, blocking, and event logging at any network-level and can do so on behalf of any system that does not have the resources to perform these functions itself. Latency calculations are used to estimate limits of applicability within a company and between geographically separated company and area control centers, scalable to hierarchical regional implementations.</description><subject>Access control</subject><subject>Access protocols</subject><subject>Collaboration</subject><subject>Command and control systems</subject><subject>IEC standards</subject><subject>Information security</subject><subject>Information technology</subject><subject>Protection</subject><subject>TCPIP</subject><subject>Transport protocols</subject><issn>1932-5517</issn><isbn>9781424442416</isbn><isbn>1424442419</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2009</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNp9jkELgjAYhgcVZOU96LIfkLapSz2L0SmCusunfdZiamwz8N9n0LnDw3t43sNDyJozn3OW7s75xQ8YS30RxCJhyYS4aZzwKIiiEb6fEoenYeAJweM5WRjzZEyEo3fIKeuUgrLTYOUbt9Tq3livBIM3arDqtbQDbbB6QCtNY2jdaQpU4112LSjaW6m-D9laDS3aFZnVoAy6v12SzSG_ZkdPImLx0rIBPRS_zPC__QAfSEB1</recordid><startdate>200907</startdate><enddate>200907</enddate><creator>Coates, G.</creator><creator>Hopkinson, K.</creator><creator>Graham, S.</creator><creator>Kurkowski, S.</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>200907</creationdate><title>Collaborative, trust-based security mechanisms for a regional utility intranet</title><author>Coates, G. ; Hopkinson, K. ; Graham, S. ; Kurkowski, S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-ieee_primary_52758083</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Access control</topic><topic>Access protocols</topic><topic>Collaboration</topic><topic>Command and control systems</topic><topic>IEC standards</topic><topic>Information security</topic><topic>Information technology</topic><topic>Protection</topic><topic>TCPIP</topic><topic>Transport protocols</topic><toplevel>online_resources</toplevel><creatorcontrib>Coates, G.</creatorcontrib><creatorcontrib>Hopkinson, K.</creatorcontrib><creatorcontrib>Graham, S.</creatorcontrib><creatorcontrib>Kurkowski, S.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Coates, G.</au><au>Hopkinson, K.</au><au>Graham, S.</au><au>Kurkowski, S.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Collaborative, trust-based security mechanisms for a regional utility intranet</atitle><btitle>2009 IEEE Power &amp; Energy Society General Meeting</btitle><stitle>PES</stitle><date>2009-07</date><risdate>2009</risdate><spage>1</spage><epage>1</epage><pages>1-1</pages><issn>1932-5517</issn><isbn>9781424442416</isbn><isbn>1424442419</isbn><abstract>This article investigates network policies and mechanisms to enhance security in SCADA networks using a mix of TCP and UDP transport protocols over IP. It recommends creating a trust system that can be added in strategic locations to protect existing legacy architectures and to accommodate a transition to IP through the introduction of equipment based on modern standards such as IEC 61850. The trust system is based on a best-of-breed application of standard information technology (IT) network security mechanisms and IP protocols. The trust system provides seamless, automated command and control for the suppression of network attacks and other suspicious events. It also supplies access control, format validation, event analysis, alerting, blocking, and event logging at any network-level and can do so on behalf of any system that does not have the resources to perform these functions itself. Latency calculations are used to estimate limits of applicability within a company and between geographically separated company and area control centers, scalable to hierarchical regional implementations.</abstract><pub>IEEE</pub><doi>10.1109/PES.2009.5275808</doi></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1932-5517
ispartof 2009 IEEE Power & Energy Society General Meeting, 2009, p.1-1
issn 1932-5517
language eng
recordid cdi_ieee_primary_5275808
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Access control
Access protocols
Collaboration
Command and control systems
IEC standards
Information security
Information technology
Protection
TCPIP
Transport protocols
title Collaborative, trust-based security mechanisms for a regional utility intranet
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-09T17%3A11%3A47IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Collaborative,%20trust-based%20security%20mechanisms%20for%20a%20regional%20utility%20intranet&rft.btitle=2009%20IEEE%20Power%20&%20Energy%20Society%20General%20Meeting&rft.au=Coates,%20G.&rft.date=2009-07&rft.spage=1&rft.epage=1&rft.pages=1-1&rft.issn=1932-5517&rft.isbn=9781424442416&rft.isbn_list=1424442419&rft_id=info:doi/10.1109/PES.2009.5275808&rft_dat=%3Cieee_6IE%3E5275808%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5275808&rfr_iscdi=true