Evidence-Based Analysis of Cyber Attacks to Security Monitored Distributed Energy Resources
This work proposes an approach based on dynamic Bayesian networks to support the cybersecurity analysis of network-based controllers in distributed energy plants. We built a system model that exploits real world context information from both information and operational technology environments in the...
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2020-07-01
|
Series: | Applied Sciences |
Subjects: | |
Online Access: | https://www.mdpi.com/2076-3417/10/14/4725 |
_version_ | 1797562914362621952 |
---|---|
author | Davide Cerotti Daniele Codetta-Raiteri Giovanna Dondossola Lavinia Egidi Giuliana Franceschinis Luigi Portinale Roberta Terruggia |
author_facet | Davide Cerotti Daniele Codetta-Raiteri Giovanna Dondossola Lavinia Egidi Giuliana Franceschinis Luigi Portinale Roberta Terruggia |
author_sort | Davide Cerotti |
collection | DOAJ |
description | This work proposes an approach based on dynamic Bayesian networks to support the cybersecurity analysis of network-based controllers in distributed energy plants. We built a system model that exploits real world context information from both information and operational technology environments in the energy infrastructure, and we use it to demonstrate the value of security evidence for time-driven predictive and diagnostic analyses. The innovative contribution of this work is in the methodology capability of capturing the causal and temporal dependencies involved in the assessment of security threats, and in the introduction of security analytics supporting the configuration of anomaly detection platforms for digital energy infrastructures. |
first_indexed | 2024-03-10T18:35:22Z |
format | Article |
id | doaj.art-3611c0911b1046449b567659fc1b1df2 |
institution | Directory Open Access Journal |
issn | 2076-3417 |
language | English |
last_indexed | 2024-03-10T18:35:22Z |
publishDate | 2020-07-01 |
publisher | MDPI AG |
record_format | Article |
series | Applied Sciences |
spelling | doaj.art-3611c0911b1046449b567659fc1b1df22023-11-20T06:16:28ZengMDPI AGApplied Sciences2076-34172020-07-011014472510.3390/app10144725Evidence-Based Analysis of Cyber Attacks to Security Monitored Distributed Energy ResourcesDavide Cerotti0Daniele Codetta-Raiteri1Giovanna Dondossola2Lavinia Egidi3Giuliana Franceschinis4Luigi Portinale5Roberta Terruggia6DiSIT, University of Piemonte Orientale, 15121 Alessandria, ItalyDiSIT, University of Piemonte Orientale, 15121 Alessandria, ItalyTransmission and Distribution Technologies Department, RSE Ricerca Sistema Energetico, 20134 Milano, ItalyDiSIT, University of Piemonte Orientale, 15121 Alessandria, ItalyDiSIT, University of Piemonte Orientale, 15121 Alessandria, ItalyDiSIT, University of Piemonte Orientale, 15121 Alessandria, ItalyTransmission and Distribution Technologies Department, RSE Ricerca Sistema Energetico, 20134 Milano, ItalyThis work proposes an approach based on dynamic Bayesian networks to support the cybersecurity analysis of network-based controllers in distributed energy plants. We built a system model that exploits real world context information from both information and operational technology environments in the energy infrastructure, and we use it to demonstrate the value of security evidence for time-driven predictive and diagnostic analyses. The innovative contribution of this work is in the methodology capability of capturing the causal and temporal dependencies involved in the assessment of security threats, and in the introduction of security analytics supporting the configuration of anomaly detection platforms for digital energy infrastructures.https://www.mdpi.com/2076-3417/10/14/4725distributed energy resourcescyber threatsearly evidence-based anomaly detectiontime-driven attack analysiscountermeasuressecurity analytic |
spellingShingle | Davide Cerotti Daniele Codetta-Raiteri Giovanna Dondossola Lavinia Egidi Giuliana Franceschinis Luigi Portinale Roberta Terruggia Evidence-Based Analysis of Cyber Attacks to Security Monitored Distributed Energy Resources Applied Sciences distributed energy resources cyber threats early evidence-based anomaly detection time-driven attack analysis countermeasures security analytic |
title | Evidence-Based Analysis of Cyber Attacks to Security Monitored Distributed Energy Resources |
title_full | Evidence-Based Analysis of Cyber Attacks to Security Monitored Distributed Energy Resources |
title_fullStr | Evidence-Based Analysis of Cyber Attacks to Security Monitored Distributed Energy Resources |
title_full_unstemmed | Evidence-Based Analysis of Cyber Attacks to Security Monitored Distributed Energy Resources |
title_short | Evidence-Based Analysis of Cyber Attacks to Security Monitored Distributed Energy Resources |
title_sort | evidence based analysis of cyber attacks to security monitored distributed energy resources |
topic | distributed energy resources cyber threats early evidence-based anomaly detection time-driven attack analysis countermeasures security analytic |
url | https://www.mdpi.com/2076-3417/10/14/4725 |
work_keys_str_mv | AT davidecerotti evidencebasedanalysisofcyberattackstosecuritymonitoreddistributedenergyresources AT danielecodettaraiteri evidencebasedanalysisofcyberattackstosecuritymonitoreddistributedenergyresources AT giovannadondossola evidencebasedanalysisofcyberattackstosecuritymonitoreddistributedenergyresources AT laviniaegidi evidencebasedanalysisofcyberattackstosecuritymonitoreddistributedenergyresources AT giulianafranceschinis evidencebasedanalysisofcyberattackstosecuritymonitoreddistributedenergyresources AT luigiportinale evidencebasedanalysisofcyberattackstosecuritymonitoreddistributedenergyresources AT robertaterruggia evidencebasedanalysisofcyberattackstosecuritymonitoreddistributedenergyresources |