SlideShare a Scribd company logo
Yuning Jiang, Manfred Jeusfeld, Yacine Atif, Jianguo Ding
School of Informatics, University of Skövde,
Christoffer Brax, Eva Nero
Combitech AB,
Contact: yuning.jiang@his.se
A Language and Repository
for Cyber Security
of Smart Grids
IEEE EDOC 2018
10.16~18
Stockholm, Sweden
!1
ELVIRA Project: his.se/elvira
License: CC BY 4.0A Language and Repository for Cyber Security of Smart Grids__Yuning Jiang__EDOC’18_Stockholm
OUTLINE
• Motivation
• Research Question
• Smart Grid Taxonomy
• Domain Specific Language
• Repository Services
• Conclusion
2A Language and Repository for Cyber Security of Smart Grids__Yuning Jiang__EDOC’18_Stockholm
MOTIVATION
• Enterprise Modelling & Cybersecurity of Smart Grid
BUS
(cf ArchiMate)
3A Language and Repository for Cyber Security of Smart Grids__Yuning Jiang__EDOC’18_Stockholm
RESEARCH QUESTION & OBJECTIVES
• How to model smart grids for cyber-security?
• Objectives:
✓ Taxonomy of smart-grid components.
✓ Power and data connections representation.
✓ Security analysis of smart grid models.
4A Language and Repository for Cyber Security of Smart Grids__Yuning Jiang__EDOC’18_Stockholm
SMART GRID TAXONOMY
• Three levels:
✓ Top level
✓ Physical components
✓ Cyber components
5A Language and Repository for Cyber Security of Smart Grids__Yuning Jiang__EDOC’18_Stockholm
SMART GRID TAXONOMY: TOP LEVEL
6
(cf Telos)
A Language and Repository for Cyber Security of Smart Grids__Yuning Jiang__EDOC’18_Stockholm
SMART GRID TAXONOMY: PHYSICAL COMPONENTS
7A Language and Repository for Cyber Security of Smart Grids__Yuning Jiang__EDOC’18_Stockholm
SMART GRID TAXONOMY: CYBER COMPONENTS
8A Language and Repository for Cyber Security of Smart Grids__Yuning Jiang__EDOC’18_Stockholm
DOMAIN SPECIFIC LANGUAGE
• Example: power station represented as instance of the taxonomy.
9
Taxonomy
Physical
Components
Instances
A Language and Repository for Cyber Security of Smart Grids__Yuning Jiang__EDOC’18_Stockholm
DOMAIN SPECIFIC LANGUAGE
• Example: power station represented as instance of the taxonomy.
10
Taxonomy
Instances
A Language and Repository for Cyber Security of Smart Grids__Yuning Jiang__EDOC’18_Stockholm
DOMAIN SPECIFIC LANGUAGE
• Example: the IEEE 9-bus model with IT components.
11
Power Station 1
Wide Area Network 1
Control Centre 1
A Language and Repository for Cyber Security of Smart Grids__Yuning Jiang__EDOC’18_Stockholm
DOMAIN SPECIFIC LANGUAGE
• Static analysis by queries (example)
12
Unmonitored in QueryClass isA PowergridComponent with
constraint
notmon : $ not exists sp/ApplicationSoftware
sc/ScadaServer rt/RTU m/MTU stat/AnyStation
(sc subcomponent sp) and
(rt dataflow sp) and (m dataflow sp) and
(m dataconnection rt) and(rt dataconnection this) and
(stat subcomponent this) and (stat subcomponent rt)
and
(stat subcomponent m) $
end
Taxonomy and smart grid models are stored in the same repository; we thus can query
smart grid models to analyze it; implemented with ConceptBase system
(conceptbase.cc)
Further analysis is investigated in the other work packages, in particular the dynamic
analysis via simulators.
A Language and Repository for Cyber Security of Smart Grids__Yuning Jiang__EDOC’18_Stockholm
REPOSITORY SERVICES
13
(See “Unmonitored Query” in the paper)
XML export
format
A Language and Repository for Cyber Security of Smart Grids__Yuning Jiang__EDOC’18_Stockholm
CONCLUSION
14
• A extensible taxonomy of smart grid components that can
be used as a domain-specific language;
• Next work focuses on representing vulnerabilities and
threats, and developing smart grid generators based on
the repository.
• The repository serves as a database of smart grid models
analysed by external tools;
A Language and Repository for Cyber Security of Smart Grids__Yuning Jiang__EDOC’18_Stockholm
Thanks for your attention.”“
Contact: yuning.jiang@his.se
ELVIRA Project: his.se/elvira
Sources of the taxonomy and models:
http://conceptbase.sourceforge.net/elvirarep/
Yuning Jiang
A Language and Repository for Cyber Security of Smart Grids__Yuning Jiang__EDOC’18_Stockholm 15

More Related Content

Similar to IEEE_EDOC_2018 Presentation | A Language and Repository for Cyber Security of Smart Grids | 20181018

IRJET - A Review on Crypto-Algorithm using Different Hardware
IRJET -  	  A Review on Crypto-Algorithm using Different HardwareIRJET -  	  A Review on Crypto-Algorithm using Different Hardware
IRJET - A Review on Crypto-Algorithm using Different Hardware
IRJET Journal
 
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...
IJECEIAES
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Topics in Networking for project and thesis
Topics in Networking for project and thesisTopics in Networking for project and thesis
Topics in Networking for project and thesis
Techsparks
 
Design of Tele command SOC-IP by AES Cryptographic Method Using VHDL
Design of Tele command SOC-IP by AES Cryptographic Method Using VHDLDesign of Tele command SOC-IP by AES Cryptographic Method Using VHDL
Design of Tele command SOC-IP by AES Cryptographic Method Using VHDL
dbpublications
 
Aicis'18 evaluation paper 47
Aicis'18 evaluation paper 47Aicis'18 evaluation paper 47
Aicis'18 evaluation paper 47
Seddiq Q. Abd Al-Rahman
 
Coco co-desing and co-verification of masked software implementations on cp us
Coco   co-desing and co-verification of masked software implementations on cp usCoco   co-desing and co-verification of masked software implementations on cp us
Coco co-desing and co-verification of masked software implementations on cp us
RISC-V International
 
Lightweight ANU-II block cipher on field programmable gate array
Lightweight ANU-II block cipher on field programmable gate  arrayLightweight ANU-II block cipher on field programmable gate  array
Lightweight ANU-II block cipher on field programmable gate array
IJECEIAES
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdl
eSAT Publishing House
 
Lecture_IIITD.pptx
Lecture_IIITD.pptxLecture_IIITD.pptx
Lecture_IIITD.pptx
achakracu
 
First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...
First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...
First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...
DETER-Project
 
PERFORMANCE ANALYSIS OF SYMMETRIC KEY CIPHERS IN LINEAR AND GRID BASED SENSOR...
PERFORMANCE ANALYSIS OF SYMMETRIC KEY CIPHERS IN LINEAR AND GRID BASED SENSOR...PERFORMANCE ANALYSIS OF SYMMETRIC KEY CIPHERS IN LINEAR AND GRID BASED SENSOR...
PERFORMANCE ANALYSIS OF SYMMETRIC KEY CIPHERS IN LINEAR AND GRID BASED SENSOR...
cscpconf
 
User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs
IJECEIAES
 
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
IJCNCJournal
 
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
IJCNCJournal
 
A neural cryptography approach for digital image security using vigenere ciph...
A neural cryptography approach for digital image security using vigenere ciph...A neural cryptography approach for digital image security using vigenere ciph...
A neural cryptography approach for digital image security using vigenere ciph...
WilliamY3
 
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
IJNSA Journal
 
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
IJNSA Journal
 
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYNEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
ijcisjournal
 
B03302007012
B03302007012B03302007012
B03302007012
theijes
 

Similar to IEEE_EDOC_2018 Presentation | A Language and Repository for Cyber Security of Smart Grids | 20181018 (20)

IRJET - A Review on Crypto-Algorithm using Different Hardware
IRJET -  	  A Review on Crypto-Algorithm using Different HardwareIRJET -  	  A Review on Crypto-Algorithm using Different Hardware
IRJET - A Review on Crypto-Algorithm using Different Hardware
 
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Topics in Networking for project and thesis
Topics in Networking for project and thesisTopics in Networking for project and thesis
Topics in Networking for project and thesis
 
Design of Tele command SOC-IP by AES Cryptographic Method Using VHDL
Design of Tele command SOC-IP by AES Cryptographic Method Using VHDLDesign of Tele command SOC-IP by AES Cryptographic Method Using VHDL
Design of Tele command SOC-IP by AES Cryptographic Method Using VHDL
 
Aicis'18 evaluation paper 47
Aicis'18 evaluation paper 47Aicis'18 evaluation paper 47
Aicis'18 evaluation paper 47
 
Coco co-desing and co-verification of masked software implementations on cp us
Coco   co-desing and co-verification of masked software implementations on cp usCoco   co-desing and co-verification of masked software implementations on cp us
Coco co-desing and co-verification of masked software implementations on cp us
 
Lightweight ANU-II block cipher on field programmable gate array
Lightweight ANU-II block cipher on field programmable gate  arrayLightweight ANU-II block cipher on field programmable gate  array
Lightweight ANU-II block cipher on field programmable gate array
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdl
 
Lecture_IIITD.pptx
Lecture_IIITD.pptxLecture_IIITD.pptx
Lecture_IIITD.pptx
 
First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...
First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...
First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...
 
PERFORMANCE ANALYSIS OF SYMMETRIC KEY CIPHERS IN LINEAR AND GRID BASED SENSOR...
PERFORMANCE ANALYSIS OF SYMMETRIC KEY CIPHERS IN LINEAR AND GRID BASED SENSOR...PERFORMANCE ANALYSIS OF SYMMETRIC KEY CIPHERS IN LINEAR AND GRID BASED SENSOR...
PERFORMANCE ANALYSIS OF SYMMETRIC KEY CIPHERS IN LINEAR AND GRID BASED SENSOR...
 
User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs
 
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
 
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
 
A neural cryptography approach for digital image security using vigenere ciph...
A neural cryptography approach for digital image security using vigenere ciph...A neural cryptography approach for digital image security using vigenere ciph...
A neural cryptography approach for digital image security using vigenere ciph...
 
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
 
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
 
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYNEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
 
B03302007012
B03302007012B03302007012
B03302007012
 

Recently uploaded

0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
OWASP Beja
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
Howard Spence
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
eCommerce Institute
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
Vladimir Samoylov
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Sebastiano Panichella
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
OECD Directorate for Financial and Enterprise Affairs
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
faizulhassanfaiz1670
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Access Innovations, Inc.
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
gharris9
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
Access Innovations, Inc.
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Orkestra
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Matjaž Lipuš
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Sebastiano Panichella
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
IP ServerOne
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
Sebastiano Panichella
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
khadija278284
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
Faculty of Medicine And Health Sciences
 

Recently uploaded (17)

0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
 

IEEE_EDOC_2018 Presentation | A Language and Repository for Cyber Security of Smart Grids | 20181018

  • 1. Yuning Jiang, Manfred Jeusfeld, Yacine Atif, Jianguo Ding School of Informatics, University of Skövde, Christoffer Brax, Eva Nero Combitech AB, Contact: yuning.jiang@his.se A Language and Repository for Cyber Security of Smart Grids IEEE EDOC 2018 10.16~18 Stockholm, Sweden !1 ELVIRA Project: his.se/elvira License: CC BY 4.0A Language and Repository for Cyber Security of Smart Grids__Yuning Jiang__EDOC’18_Stockholm
  • 2. OUTLINE • Motivation • Research Question • Smart Grid Taxonomy • Domain Specific Language • Repository Services • Conclusion 2A Language and Repository for Cyber Security of Smart Grids__Yuning Jiang__EDOC’18_Stockholm
  • 3. MOTIVATION • Enterprise Modelling & Cybersecurity of Smart Grid BUS (cf ArchiMate) 3A Language and Repository for Cyber Security of Smart Grids__Yuning Jiang__EDOC’18_Stockholm
  • 4. RESEARCH QUESTION & OBJECTIVES • How to model smart grids for cyber-security? • Objectives: ✓ Taxonomy of smart-grid components. ✓ Power and data connections representation. ✓ Security analysis of smart grid models. 4A Language and Repository for Cyber Security of Smart Grids__Yuning Jiang__EDOC’18_Stockholm
  • 5. SMART GRID TAXONOMY • Three levels: ✓ Top level ✓ Physical components ✓ Cyber components 5A Language and Repository for Cyber Security of Smart Grids__Yuning Jiang__EDOC’18_Stockholm
  • 6. SMART GRID TAXONOMY: TOP LEVEL 6 (cf Telos) A Language and Repository for Cyber Security of Smart Grids__Yuning Jiang__EDOC’18_Stockholm
  • 7. SMART GRID TAXONOMY: PHYSICAL COMPONENTS 7A Language and Repository for Cyber Security of Smart Grids__Yuning Jiang__EDOC’18_Stockholm
  • 8. SMART GRID TAXONOMY: CYBER COMPONENTS 8A Language and Repository for Cyber Security of Smart Grids__Yuning Jiang__EDOC’18_Stockholm
  • 9. DOMAIN SPECIFIC LANGUAGE • Example: power station represented as instance of the taxonomy. 9 Taxonomy Physical Components Instances A Language and Repository for Cyber Security of Smart Grids__Yuning Jiang__EDOC’18_Stockholm
  • 10. DOMAIN SPECIFIC LANGUAGE • Example: power station represented as instance of the taxonomy. 10 Taxonomy Instances A Language and Repository for Cyber Security of Smart Grids__Yuning Jiang__EDOC’18_Stockholm
  • 11. DOMAIN SPECIFIC LANGUAGE • Example: the IEEE 9-bus model with IT components. 11 Power Station 1 Wide Area Network 1 Control Centre 1 A Language and Repository for Cyber Security of Smart Grids__Yuning Jiang__EDOC’18_Stockholm
  • 12. DOMAIN SPECIFIC LANGUAGE • Static analysis by queries (example) 12 Unmonitored in QueryClass isA PowergridComponent with constraint notmon : $ not exists sp/ApplicationSoftware sc/ScadaServer rt/RTU m/MTU stat/AnyStation (sc subcomponent sp) and (rt dataflow sp) and (m dataflow sp) and (m dataconnection rt) and(rt dataconnection this) and (stat subcomponent this) and (stat subcomponent rt) and (stat subcomponent m) $ end Taxonomy and smart grid models are stored in the same repository; we thus can query smart grid models to analyze it; implemented with ConceptBase system (conceptbase.cc) Further analysis is investigated in the other work packages, in particular the dynamic analysis via simulators. A Language and Repository for Cyber Security of Smart Grids__Yuning Jiang__EDOC’18_Stockholm
  • 13. REPOSITORY SERVICES 13 (See “Unmonitored Query” in the paper) XML export format A Language and Repository for Cyber Security of Smart Grids__Yuning Jiang__EDOC’18_Stockholm
  • 14. CONCLUSION 14 • A extensible taxonomy of smart grid components that can be used as a domain-specific language; • Next work focuses on representing vulnerabilities and threats, and developing smart grid generators based on the repository. • The repository serves as a database of smart grid models analysed by external tools; A Language and Repository for Cyber Security of Smart Grids__Yuning Jiang__EDOC’18_Stockholm
  • 15. Thanks for your attention.”“ Contact: yuning.jiang@his.se ELVIRA Project: his.se/elvira Sources of the taxonomy and models: http://conceptbase.sourceforge.net/elvirarep/ Yuning Jiang A Language and Repository for Cyber Security of Smart Grids__Yuning Jiang__EDOC’18_Stockholm 15