Collaborative, trust-based security mechanisms for a regional utility intranet
This article investigates network policies and mechanisms to enhance security in SCADA networks using a mix of TCP and UDP transport protocols over IP. It recommends creating a trust system that can be added in strategic locations to protect existing legacy architectures and to accommodate a transit...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | |
container_volume | |
creator | Coates, G. Hopkinson, K. Graham, S. Kurkowski, S. |
description | This article investigates network policies and mechanisms to enhance security in SCADA networks using a mix of TCP and UDP transport protocols over IP. It recommends creating a trust system that can be added in strategic locations to protect existing legacy architectures and to accommodate a transition to IP through the introduction of equipment based on modern standards such as IEC 61850. The trust system is based on a best-of-breed application of standard information technology (IT) network security mechanisms and IP protocols. The trust system provides seamless, automated command and control for the suppression of network attacks and other suspicious events. It also supplies access control, format validation, event analysis, alerting, blocking, and event logging at any network-level and can do so on behalf of any system that does not have the resources to perform these functions itself. Latency calculations are used to estimate limits of applicability within a company and between geographically separated company and area control centers, scalable to hierarchical regional implementations. |
doi_str_mv | 10.1109/PES.2009.5275808 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5275808</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5275808</ieee_id><sourcerecordid>5275808</sourcerecordid><originalsourceid>FETCH-ieee_primary_52758083</originalsourceid><addsrcrecordid>eNp9jkELgjAYhgcVZOU96LIfkLapSz2L0SmCusunfdZiamwz8N9n0LnDw3t43sNDyJozn3OW7s75xQ8YS30RxCJhyYS4aZzwKIiiEb6fEoenYeAJweM5WRjzZEyEo3fIKeuUgrLTYOUbt9Tq3livBIM3arDqtbQDbbB6QCtNY2jdaQpU4112LSjaW6m-D9laDS3aFZnVoAy6v12SzSG_ZkdPImLx0rIBPRS_zPC__QAfSEB1</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Collaborative, trust-based security mechanisms for a regional utility intranet</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Coates, G. ; Hopkinson, K. ; Graham, S. ; Kurkowski, S.</creator><creatorcontrib>Coates, G. ; Hopkinson, K. ; Graham, S. ; Kurkowski, S.</creatorcontrib><description>This article investigates network policies and mechanisms to enhance security in SCADA networks using a mix of TCP and UDP transport protocols over IP. It recommends creating a trust system that can be added in strategic locations to protect existing legacy architectures and to accommodate a transition to IP through the introduction of equipment based on modern standards such as IEC 61850. The trust system is based on a best-of-breed application of standard information technology (IT) network security mechanisms and IP protocols. The trust system provides seamless, automated command and control for the suppression of network attacks and other suspicious events. It also supplies access control, format validation, event analysis, alerting, blocking, and event logging at any network-level and can do so on behalf of any system that does not have the resources to perform these functions itself. Latency calculations are used to estimate limits of applicability within a company and between geographically separated company and area control centers, scalable to hierarchical regional implementations.</description><identifier>ISSN: 1932-5517</identifier><identifier>ISBN: 9781424442416</identifier><identifier>ISBN: 1424442419</identifier><identifier>DOI: 10.1109/PES.2009.5275808</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access control ; Access protocols ; Collaboration ; Command and control systems ; IEC standards ; Information security ; Information technology ; Protection ; TCPIP ; Transport protocols</subject><ispartof>2009 IEEE Power & Energy Society General Meeting, 2009, p.1-1</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5275808$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2056,27923,54918</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5275808$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Coates, G.</creatorcontrib><creatorcontrib>Hopkinson, K.</creatorcontrib><creatorcontrib>Graham, S.</creatorcontrib><creatorcontrib>Kurkowski, S.</creatorcontrib><title>Collaborative, trust-based security mechanisms for a regional utility intranet</title><title>2009 IEEE Power & Energy Society General Meeting</title><addtitle>PES</addtitle><description>This article investigates network policies and mechanisms to enhance security in SCADA networks using a mix of TCP and UDP transport protocols over IP. It recommends creating a trust system that can be added in strategic locations to protect existing legacy architectures and to accommodate a transition to IP through the introduction of equipment based on modern standards such as IEC 61850. The trust system is based on a best-of-breed application of standard information technology (IT) network security mechanisms and IP protocols. The trust system provides seamless, automated command and control for the suppression of network attacks and other suspicious events. It also supplies access control, format validation, event analysis, alerting, blocking, and event logging at any network-level and can do so on behalf of any system that does not have the resources to perform these functions itself. Latency calculations are used to estimate limits of applicability within a company and between geographically separated company and area control centers, scalable to hierarchical regional implementations.</description><subject>Access control</subject><subject>Access protocols</subject><subject>Collaboration</subject><subject>Command and control systems</subject><subject>IEC standards</subject><subject>Information security</subject><subject>Information technology</subject><subject>Protection</subject><subject>TCPIP</subject><subject>Transport protocols</subject><issn>1932-5517</issn><isbn>9781424442416</isbn><isbn>1424442419</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2009</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNp9jkELgjAYhgcVZOU96LIfkLapSz2L0SmCusunfdZiamwz8N9n0LnDw3t43sNDyJozn3OW7s75xQ8YS30RxCJhyYS4aZzwKIiiEb6fEoenYeAJweM5WRjzZEyEo3fIKeuUgrLTYOUbt9Tq3livBIM3arDqtbQDbbB6QCtNY2jdaQpU4112LSjaW6m-D9laDS3aFZnVoAy6v12SzSG_ZkdPImLx0rIBPRS_zPC__QAfSEB1</recordid><startdate>200907</startdate><enddate>200907</enddate><creator>Coates, G.</creator><creator>Hopkinson, K.</creator><creator>Graham, S.</creator><creator>Kurkowski, S.</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>200907</creationdate><title>Collaborative, trust-based security mechanisms for a regional utility intranet</title><author>Coates, G. ; Hopkinson, K. ; Graham, S. ; Kurkowski, S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-ieee_primary_52758083</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Access control</topic><topic>Access protocols</topic><topic>Collaboration</topic><topic>Command and control systems</topic><topic>IEC standards</topic><topic>Information security</topic><topic>Information technology</topic><topic>Protection</topic><topic>TCPIP</topic><topic>Transport protocols</topic><toplevel>online_resources</toplevel><creatorcontrib>Coates, G.</creatorcontrib><creatorcontrib>Hopkinson, K.</creatorcontrib><creatorcontrib>Graham, S.</creatorcontrib><creatorcontrib>Kurkowski, S.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Coates, G.</au><au>Hopkinson, K.</au><au>Graham, S.</au><au>Kurkowski, S.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Collaborative, trust-based security mechanisms for a regional utility intranet</atitle><btitle>2009 IEEE Power & Energy Society General Meeting</btitle><stitle>PES</stitle><date>2009-07</date><risdate>2009</risdate><spage>1</spage><epage>1</epage><pages>1-1</pages><issn>1932-5517</issn><isbn>9781424442416</isbn><isbn>1424442419</isbn><abstract>This article investigates network policies and mechanisms to enhance security in SCADA networks using a mix of TCP and UDP transport protocols over IP. It recommends creating a trust system that can be added in strategic locations to protect existing legacy architectures and to accommodate a transition to IP through the introduction of equipment based on modern standards such as IEC 61850. The trust system is based on a best-of-breed application of standard information technology (IT) network security mechanisms and IP protocols. The trust system provides seamless, automated command and control for the suppression of network attacks and other suspicious events. It also supplies access control, format validation, event analysis, alerting, blocking, and event logging at any network-level and can do so on behalf of any system that does not have the resources to perform these functions itself. Latency calculations are used to estimate limits of applicability within a company and between geographically separated company and area control centers, scalable to hierarchical regional implementations.</abstract><pub>IEEE</pub><doi>10.1109/PES.2009.5275808</doi></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1932-5517 |
ispartof | 2009 IEEE Power & Energy Society General Meeting, 2009, p.1-1 |
issn | 1932-5517 |
language | eng |
recordid | cdi_ieee_primary_5275808 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Access control Access protocols Collaboration Command and control systems IEC standards Information security Information technology Protection TCPIP Transport protocols |
title | Collaborative, trust-based security mechanisms for a regional utility intranet |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-09T17%3A11%3A47IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Collaborative,%20trust-based%20security%20mechanisms%20for%20a%20regional%20utility%20intranet&rft.btitle=2009%20IEEE%20Power%20&%20Energy%20Society%20General%20Meeting&rft.au=Coates,%20G.&rft.date=2009-07&rft.spage=1&rft.epage=1&rft.pages=1-1&rft.issn=1932-5517&rft.isbn=9781424442416&rft.isbn_list=1424442419&rft_id=info:doi/10.1109/PES.2009.5275808&rft_dat=%3Cieee_6IE%3E5275808%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5275808&rfr_iscdi=true |