Sample records for trustworthy cyber infrastructure

  1. Sandia Energy - Cyber Security for Electric Infrastructure

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber Security for Electric Infrastructure Home Stationary Power Grid Modernization Cyber Security for Electric Infrastructure Cyber Security for Electric Infrastructureashoter2015...

  2. Cyber and physical infrastructure interdependencies.

    SciTech Connect (OSTI)

    Phillips, Laurence R.; Kelic, Andjelka; Warren, Drake E.

    2008-09-01T23:59:59.000Z

    The goal of the work discussed in this document is to understand the risk to the nation of cyber attacks on critical infrastructures. The large body of research results on cyber attacks against physical infrastructure vulnerabilities has not resulted in clear understanding of the cascading effects a cyber-caused disruption can have on critical national infrastructures and the ability of these affected infrastructures to deliver services. This document discusses current research and methodologies aimed at assessing the translation of a cyber-based effect into a physical disruption of infrastructure and thence into quantification of the economic consequences of the resultant disruption and damage. The document discusses the deficiencies of the existing methods in correlating cyber attacks with physical consequences. The document then outlines a research plan to correct those deficiencies. When completed, the research plan will result in a fully supported methodology to quantify the economic consequences of events that begin with cyber effects, cascade into other physical infrastructure impacts, and result in degradation of the critical infrastructure's ability to deliver services and products. This methodology enables quantification of the risks to national critical infrastructure of cyber threats. The work addresses the electric power sector as an example of how the methodology can be applied.

  3. Guide to Critical Infrastructure Protection Cyber Vulnerability...

    Office of Environmental Management (EM)

    Infrastructure Protection Cyber Vulnerability Assessment More Documents & Publications Wireless System Considerations When Implementing NERC Critical Infrastructure Protection...

  4. Cyber Threats to Nuclear Infrastructures

    SciTech Connect (OSTI)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01T23:59:59.000Z

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  5. Status Report on Protected Domains for Cyber Infrastructure Management

    E-Print Network [OSTI]

    Irvine, Cynthia E.

    through the use of distributed, highly secure, protected domains. Instead of creating a costly physically, Network Security, Information Assurance 1 Introduction Currently, our national cyber infrastructure to the President for Cyber Space Security and Chairman, President's Critical Infrastructure Protection Board

  6. Integration of wireless sensor networks in environmental monitoring cyber infrastructure

    E-Print Network [OSTI]

    Huang, Yan

    Integration of wireless sensor networks in environmental monitoring cyber infrastructure Jue Yang Ă? to revolutionize many science and engineering domains. We present a novel environmental monitoring system collection, management, visualization, dissemination, and exchange, conforming to the new Sensor Web

  7. Sandia Energy - Cyber Security for Electric Infrastructure

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Scienceand RequirementsCoatings Initiated at PNNL's SequimReactors To ReceiveCyber HomeCyberCyber

  8. Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop

    SciTech Connect (OSTI)

    Sheldon, Frederick T [ORNL; Krings, Axel [ORNL; Yoo, Seong-Moo [ORNL; Mili, Ali [ORNL; Trien, Joseph P [ORNL

    2006-01-01T23:59:59.000Z

    The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .

  9. A Cooperative Cyber Defense for Securing Critical Infrastructures

    E-Print Network [OSTI]

    Fulp, Errin W.

    .g., the numerous private companies that make up North America's electrical power grids) that share computationalA Cooperative Cyber Defense for Securing Critical Infrastructures Glenn A. Fink glenn networked relationships. At electrical substations, it is common to find equipment from several companies

  10. Risk assessment for physical and cyber attacks on critical infrastructures.

    SciTech Connect (OSTI)

    Smith, Bryan J.; Sholander, Peter E.; Phelan, James M.; Wyss, Gregory Dane; Varnado, G. Bruce; Depoy, Jennifer Mae

    2005-08-01T23:59:59.000Z

    Assessing the risk of malevolent attacks against large-scale critical infrastructures requires modifications to existing methodologies. Existing risk assessment methodologies consider physical security and cyber security separately. As such, they do not accurately model attacks that involve defeating both physical protection and cyber protection elements (e.g., hackers turning off alarm systems prior to forced entry). This paper presents a risk assessment methodology that accounts for both physical and cyber security. It also preserves the traditional security paradigm of detect, delay and respond, while accounting for the possibility that a facility may be able to recover from or mitigate the results of a successful attack before serious consequences occur. The methodology provides a means for ranking those assets most at risk from malevolent attacks. Because the methodology is automated the analyst can also play 'what if with mitigation measures to gain a better understanding of how to best expend resources towards securing the facilities. It is simple enough to be applied to large infrastructure facilities without developing highly complicated models. Finally, it is applicable to facilities with extensive security as well as those that are less well-protected.

  11. Cyber Security & Smart Grid

    E-Print Network [OSTI]

    Shapiro, J.

    2011-01-01T23:59:59.000Z

    of the impacts of long-term power shortages from the destruction of critical electric infrastructure. ? A Hitachi factory north of Tokyo that makes 60% of the world?s supply of airflow sensors was shut down. This caused General Motors to shut a plant... at The University of Texas at Dallas ? Next Generation Control Systems ? Trustworthy Cyber Infrastructure for the Power Grid ? Active Defense Systems ? System Vulnerability Assessments ? Grid Test Bed ? Integrated Risk Analysis ? Modeling and Simulation...

  12. TCIP: Trustworthy CyberInfrastructure for the Power Grid | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,ZaleskiThis Decision considers an Appeal ofIn1097 - In the Matter

  13. Reducing Cyber Risk to Critical Infrastructure: NIST Framework...

    Energy Savers [EERE]

    of Control Systems (650 KB PDF) The Vulnerability Analysis of Energy Delivery Control Systems Report Guidelines for Smart Grid Cyber Security (3.4 MB PDF) A Guide to...

  14. Methodology for prioritizing cyber-vulnerable critical infrastructure equipment and mitigation strategies.

    SciTech Connect (OSTI)

    Dawson, Lon Andrew; Stinebaugh, Jennifer A.

    2010-04-01T23:59:59.000Z

    The Department of Homeland Security (DHS), National Cyber Security Division (NSCD), Control Systems Security Program (CSSP), contracted Sandia National Laboratories to develop a generic methodology for prioritizing cyber-vulnerable, critical infrastructure assets and the development of mitigation strategies for their loss or compromise. The initial project has been divided into three discrete deliverables: (1) A generic methodology report suitable to all Critical Infrastructure and Key Resource (CIKR) Sectors (this report); (2) a sector-specific report for Electrical Power Distribution; and (3) a sector-specific report for the water sector, including generation, water treatment, and wastewater systems. Specific reports for the water and electric sectors are available from Sandia National Laboratories.

  15. ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention

    SciTech Connect (OSTI)

    Cui, Xiaohui [ORNL; Beaver, Justin M [ORNL; Treadwell, Jim N [ORNL

    2012-01-01T23:59:59.000Z

    The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other vital services to cloned virtual machines in a quarantined environment. This is done transparently from the point of view of both the attacker and normal users. Existing connections, such as SSH sessions, are not interrupted. Any malicious activity performed by the attacker on a quarantined server is not reflected on the production server. The attacker is provided services from the quarantined server, which creates the impression that the attacks performed are successful. The activities of the attacker on the quarantined system are able to be recorded much like a honeypot system for forensic analysis.

  16. Sandia National Laboratories: Cyber Security for Electric Infrastructu...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SystemsCyber Security for Electric Infrastructure Cyber Security for Electric Infrastructure Electric power systems and power-system operators are more reliant on telemetry,...

  17. CyberNET is a research infrastructure that enables cybersecurity scientists and engineers to rigorously develop,

    E-Print Network [OSTI]

    National Laboratory through funding provided by the U.S. Department of Energy. For more information is an Agent-based System for Simulating an Enterprise's Cyber Social Interactions. A hybrid approach For FY 2014, HAYSTACK focused on email-based anthropogenic system activity models. Next year, we

  18. Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentatio...

    Office of Environmental Management (EM)

    Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations - Trustworthy Cyber Infrastructure for the...

  19. An inter-realm, cyber-security infrastructure for virtual supercomputing

    SciTech Connect (OSTI)

    Al-Muhtadi, J. (Jalal); Feng, W. C. (Wu-Chun); Fisk, M. E. (Mike E. )

    2001-01-01T23:59:59.000Z

    Virtual supercomputing, (ise ., high-performance grid computing), is poised to revolutionize the way we think about and use computing. However, the security of the links interconnecting the nodes within such an environment will be its Achilles heel, particularly when secure communication is required to tunnel through heterogeneous domains. In this paper we examine existing security mechanisms, show their inadequacy, and design a comprehensive cybersecurity infrastructure that meets the security requirements of virtual supercomputing. Keywords Security, virtual supercomputing, grid computing, high-performance computing, GSS-API, SSL, IPsec, component-based software, dynamic reconfiguration.

  20. Cyber-infrastructure to Support Science and Data Management for the Dark Energy Survey

    E-Print Network [OSTI]

    C. Ngeow; J. J. Mohr; T. Alam; W. A. Barkhouse; C. Beldica; D. Cai; G. Daues; R. Plante; J. Annis; H. Lin; D. Tucker; R. C. Smith

    2006-08-11T23:59:59.000Z

    The Dark Energy Survey (DES; operations 2009-2015) will address the nature of dark energy using four independent and complementary techniques: (1) a galaxy cluster survey over 4000 deg2 in collaboration with the South Pole Telescope Sunyaev-Zel'dovich effect mapping experiment, (2) a cosmic shear measurement over 5000 deg2, (3) a galaxy angular clustering measurement within redshift shells to redshift=1.35, and (4) distance measurements to 1900 supernovae Ia. The DES will produce 200 TB of raw data in four bands, These data will be processed into science ready images and catalogs and co-added into deeper, higher quality images and catalogs. In total, the DES dataset will exceed 1 PB, including a 100 TB catalog database that will serve as a key science analysis tool for the astronomy/cosmology community. The data rate, volume, and duration of the survey require a new type of data management (DM) system that (1) offers a high degree of automation and robustness and (2) leverages the existing high performance computing infrastructure to meet the project's DM targets. The DES DM system consists of (1) a grid-enabled, flexible and scalable middleware developed at NCSA for the broader scientific community, (2) astronomy modules that build upon community software, and (3) a DES archive to support automated processing and to serve DES catalogs and images to the collaboration and the public. In the recent DES Data Challenge 1 we deployed and tested the first version of the DES DM system, successfully reducing 700 GB of raw simulated images into 5 TB of reduced data products and cataloguing 50 million objects with calibrated astrometry and photometry.

  1. Moving Toward Trustworthy Systems

    E-Print Network [OSTI]

    Dasgupta, Dipankar

    Perspective and Emerging Cyberspace R&D Themes Presented at: Cyber Security Expo Center for Information Federal Policy Perspective and Emerging Cyberspace R&D Themes · Background and Scope ­ Recap of federal the Federal Cybersecurity R&D Themes Kickoff Event presentations held at the IEEE Symposium on Security

  2. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    cyber-security analysis of the SCADA system of the Gignac water distributioncyber security of SCADA systems managing other infrastructures (e.g. , oil and natural gas distribution

  3. DOE Issues Energy Sector Cyber Organization NOI

    Office of Environmental Management (EM)

    cooperatively with DOE and other federal agencies to enhance cyber security of the bulk power electric grid and energy infrastructure. Approximately 8.5 million is expected to...

  4. Third Annual Cyber Security and Information

    E-Print Network [OSTI]

    Krings, Axel W.

    Third Annual Cyber Security and Information Infrastructure Research Workshop May 14-15, 2007 TOWARDS COMPREHENSIVE STRATEGIES THAT MEET THE CYBER SECURITY CHALLENGES OF THE 21ST CENTURY Frederick Sheldon, Axel Krings, Seong-Moo Yoo, and Ali Mili (Editors) #12;CSIIRW07: Cyber Security and Information

  5. INL@Work Cyber Security

    SciTech Connect (OSTI)

    Chaffin, May

    2010-01-01T23:59:59.000Z

    May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

  6. INL@Work Cyber Security

    ScienceCinema (OSTI)

    Chaffin, May

    2013-05-28T23:59:59.000Z

    May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

  7. CyberPhysical System Security for the Electric Power Grid

    E-Print Network [OSTI]

    Manimaran, Govindarasu

    INVITED P A P E R Cyber­Physical System Security for the Electric Power Grid Control in power of cyber infrastructure security in conjunction with power application security to pre- vent, mitigate on its cyber infrastructure and its ability to tolerate potential failures. A further exploration

  8. Cyber Security

    Energy Savers [EERE]

    Associate CIO for Cyber Security (IM-30) Rod Turk Deputy Associate CIO for Cyber Security (IM-30) Michael Maraya Incident Management Division (IM-32) Rob Ciochon Director Policy,...

  9. Office of Electricity Delivery and Energy Reliability Cyber Security...

    Energy Savers [EERE]

    the Nation's Energy Infrastructure from Cyber Attacks Working to Achieve Cybersecurity in the Energy Sector Roadmap to Achieve Energy Delivery Systems Cybersecurity - 2011...

  10. Critical Infrastructure and Cyber Security

    E-Print Network [OSTI]

    Doll, Abby; Pirrong, Renee; Jennings, Matthew; Stasny, George; Giblin, Andy; Shaffer, Steph; Anderson, Aimee

    2011-01-01T23:59:59.000Z

    that employ stealth methods such as steganography, allowing botmasters to exploit public forums and search engines #1; As U.S. national elections draw near, an increase in phishing, scams and malicious code targeting candidates, campaigns, etc.... Chemical Manufacturing The Chemical Manufacturing sector combines organic and inorganic materials to make chemicals used in everyday life and that contribute to the national security, public safety, and economic security. The components...

  11. Outline of a proposal responding to E.U. and U.S. calls for trustworthy globalscale IdM and CKM designs

    E-Print Network [OSTI]

    on Cyber Security and Information Intelligence Research (April 21­23, 2010) c # ACM, 2010. 1. INTRODUCTION distribution nodes (aka key distri­ bution centers) [10] that was secure against a collusion of up to m­1@pqs.io ABSTRACT In 2007, the E.U. FP6 SecurIST called [31] for trustworthy international identity management (Id

  12. Outline of a proposal responding to E.U. and U.S. calls for trustworthy global-scale IdM and CKM designs

    E-Print Network [OSTI]

    on Cyber Security and Information Intelligence Research (April 21-23, 2010) c ACM, 2010. 1. INTRODUCTION distribution nodes (aka key distri- bution centers) [10] that was secure against a collusion of up to m-1@pqs.io ABSTRACT In 2007, the E.U. FP6 SecurIST called [31] for trustworthy international identity management (Id

  13. EPSCoR Research Infrastructure Improvement Program: Inter-Campus and Intra-Campus Cyber Connectivity (RII C2) in Idaho

    E-Print Network [OSTI]

    Walden, Von P.

    and libraries to high-speed, broadband access, with plans to have 80 high schools connected by early 2010. The project will support long-term, sustainable cyber connectivity and broadband access capabilities between of these improvements has documented commitments for long-term sustainability after the end of the RII C2 project

  14. SPIDERS JCTD Smart Cyber-Secure Microgrids

    Broader source: Energy.gov [DOE]

    The Smart Power Infrastructure Demonstration for Energy Reliability and Security (SPIDERS) Joint Capability Technology Demonstration (JCTD) is a groundbreaking program to bolster the cyber security and energy efficiency of U.S. military installations and transfer the knowhow to non-military critical infrastructure.

  15. A Taxonomy of Cyber Attacks on 3G Networks Kameswari Kotapati, Peng Liu, Yan Sun, Thomas F. LaPorta

    E-Print Network [OSTI]

    Yener, Aylin

    1 A Taxonomy of Cyber Attacks on 3G Networks Kameswari Kotapati, Peng Liu, Yan Sun, Thomas F. La Infrastructure Cyber Attack. This paper is the first to propose attack taxonomy for 3G networks. The uniqueness of this taxonomy is the inclusion of Cross Infrastructure Cyber Attacks in addition to the standard Single

  16. A Game Theoretic Approach to Cyber Attack Prediction

    SciTech Connect (OSTI)

    Peng Liu

    2005-11-28T23:59:59.000Z

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  17. Open Cyber-Architecture for Electrical Energy Markets

    E-Print Network [OSTI]

    Gunes, Mehmet Hadi

    and robust power grid, which is less vulnerable to blackouts due to cascaded events, this paper discusses-owner infrastructure systems are many, we focus on the power grid in this paper. We propose an "Open CyberOpen Cyber-Architecture for Electrical Energy Markets M. Yuksel, K. Bekris, C. Y. Evrenosoglu, M. H

  18. Cyber Vulnerability Disclosure Policies for the Department of Electrical and

    E-Print Network [OSTI]

    Manimaran, Govindarasu

    Cyber Vulnerability Disclosure Policies for the Smart Grid Adam Hahn Department of Electrical ATTRIBUTES The "Vulnerability Disclosure Framework" developed by the National Infrastructure Advisory Council Department of Electrical and Computer Engineering Iowa State University Ames, IA 50011 Email: gmani

  19. Cyber Security and Resilient Systems

    SciTech Connect (OSTI)

    Robert S. Anderson

    2009-07-01T23:59:59.000Z

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.

  20. Networked Control Systems under Cyber Attacks with Applications to Power Networks

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    Terms-- Networked Control Systems, Fault Detection, Power Systems I. INTRODUCTION Several infrastructure infrastructure systems are vulnerable to cyber attacks [1], [2], which are performed on the information residingNetworked Control Systems under Cyber Attacks with Applications to Power Networks Andr´e Teixeira

  1. Cyber Security

    Energy Savers [EERE]

    Management Office (IM-62) VACANT Director IT Service Management Division (IM-621) Bryan Long Director Infrastructure Division (IM-622) Greg Doan Director Applications Support...

  2. Cyber Incidents Involving Control Systems

    SciTech Connect (OSTI)

    Robert J. Turk

    2005-10-01T23:59:59.000Z

    The Analysis Function of the US-CERT Control Systems Security Center (CSSC) at the Idaho National Laboratory (INL) has prepared this report to document cyber security incidents for use by the CSSC. The description and analysis of incidents reported herein support three CSSC tasks: establishing a business case; increasing security awareness and private and corporate participation related to enhanced cyber security of control systems; and providing informational material to support model development and prioritize activities for CSSC. The stated mission of CSSC is to reduce vulnerability of critical infrastructure to cyber attack on control systems. As stated in the Incident Management Tool Requirements (August 2005) ''Vulnerability reduction is promoted by risk analysis that tracks actual risk, emphasizes high risk, determines risk reduction as a function of countermeasures, tracks increase of risk due to external influence, and measures success of the vulnerability reduction program''. Process control and Supervisory Control and Data Acquisition (SCADA) systems, with their reliance on proprietary networks and hardware, have long been considered immune to the network attacks that have wreaked so much havoc on corporate information systems. New research indicates this confidence is misplaced--the move to open standards such as Ethernet, Transmission Control Protocol/Internet Protocol, and Web technologies is allowing hackers to take advantage of the control industry's unawareness. Much of the available information about cyber incidents represents a characterization as opposed to an analysis of events. The lack of good analyses reflects an overall weakness in reporting requirements as well as the fact that to date there have been very few serious cyber attacks on control systems. Most companies prefer not to share cyber attack incident data because of potential financial repercussions. Uniform reporting requirements will do much to make this information available to Department of Homeland Security (DHS) and others who require it. This report summarizes the rise in frequency of cyber attacks, describes the perpetrators, and identifies the means of attack. This type of analysis, when used in conjunction with vulnerability analyses, can be used to support a proactive approach to prevent cyber attacks. CSSC will use this document to evolve a standardized approach to incident reporting and analysis. This document will be updated as needed to record additional event analyses and insights regarding incident reporting. This report represents 120 cyber security incidents documented in a number of sources, including: the British Columbia Institute of Technology (BCIT) Industrial Security Incident Database, the 2003 CSI/FBI Computer Crime and Security Survey, the KEMA, Inc., Database, Lawrence Livermore National Laboratory, the Energy Incident Database, the INL Cyber Incident Database, and other open-source data. The National Memorial Institute for the Prevention of Terrorism (MIPT) database was also interrogated but, interestingly, failed to yield any cyber attack incidents. The results of this evaluation indicate that historical evidence provides insight into control system related incidents or failures; however, that the limited available information provides little support to future risk estimates. The documented case history shows that activity has increased significantly since 1988. The majority of incidents come from the Internet by way of opportunistic viruses, Trojans, and worms, but a surprisingly large number are directed acts of sabotage. A substantial number of confirmed, unconfirmed, and potential events that directly or potentially impact control systems worldwide are also identified. Twelve selected cyber incidents are presented at the end of this report as examples of the documented case studies (see Appendix B).

  3. IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 835 Cyber Attack Exposure Evaluation Framework for

    E-Print Network [OSTI]

    Manimaran, Govindarasu

    . The coupling of the power infrastructure with complex computer networks substantially expand current cyber, that is, threats, vulnerabilities, and attack consequences for current and emerging power grid systems. The substantial attack surface presented by the advanced metering infrastructure (AMI) along

  4. Cyber-Vulnerability of Power Grid Monitoring and Control Systems

    E-Print Network [OSTI]

    Manimaran, Govindarasu

    Cyber-Vulnerability of Power Grid Monitoring and Control Systems Chee-Wooi Ten Iowa State, and power infrastructures due to the complexity of required compliances [5]. Although the complex outages. Three modes of malicious attacks on the power infrastructure are (i) attack upon the system, (ii

  5. Data Intensive Architecture for Scalable Cyber Analytics

    SciTech Connect (OSTI)

    Olsen, Bryan K.; Johnson, John R.; Critchlow, Terence J.

    2011-12-19T23:59:59.000Z

    Cyber analysts are tasked with the identification and mitigation of network exploits and threats. These compromises are difficult to identify due to the characteristics of cyber communication, the volume of traffic, and the duration of possible attack. In this paper, we describe a prototype implementation designed to provide cyber analysts an environment where they can interactively explore a month’s worth of cyber security data. This prototype utilized On-Line Analytical Processing (OLAP) techniques to present a data cube to the analysts. The cube provides a summary of the data, allowing trends to be easily identified as well as the ability to easily pull up the original records comprising an event of interest. The cube was built using SQL Server Analysis Services (SSAS), with the interface to the cube provided by Tableau. This software infrastructure was supported by a novel hardware architecture comprising a Netezza TwinFin® for the underlying data warehouse and a cube server with a FusionIO drive hosting the data cube. We evaluated this environment on a month’s worth of artificial, but realistic, data using multiple queries provided by our cyber analysts. As our results indicate, OLAP technology has progressed to the point where it is in a unique position to provide novel insights to cyber analysts, as long as it is supported by an appropriate data intensive architecture.

  6. Trust Management Considerations For the Cooperative Infrastructure Defense Framework: Trust Relationships, Evidence, and Decisions

    SciTech Connect (OSTI)

    Maiden, Wendy M.

    2009-12-01T23:59:59.000Z

    Cooperative Infrastructure Defense (CID) is a hierarchical, agent-based, adaptive, cyber-security framework designed to collaboratively protect multiple enclaves or organizations participating in a complex infrastructure. CID employs a swarm of lightweight, mobile agents called Sensors designed to roam hosts throughout a security enclave to find indications of anomalies and report them to host-based Sentinels. The Sensors’ findings become pieces of a larger puzzle, which the Sentinel puts together to determine the problem and respond per policy as given by the enclave-level Sergeant agent. Horizontally across multiple enclaves and vertically within each enclave, authentication and access control technologies are necessary but insufficient authorization mechanisms to ensure that CID agents continue to fulfill their roles in a trustworthy manner. Trust management fills the gap, providing mechanisms to detect malicious agents and offering more robust mechanisms for authorization. This paper identifies the trust relationships throughout the CID hierarchy, the types of trust evidence that could be gathered, and the actions that the CID system could take if an entity is determined to be untrustworthy.

  7. Energy-Sector Stakeholders Attend the Department of Energy's...

    Office of Environmental Management (EM)

    the National SCADA Test Bed (NSTB) partners and Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) project-presented DOE-supported efforts involving secured SCADA...

  8. Trustworthy Computing | Microsoft's Approach to Compliance in the Cloud 1 The Microsoft Approach to

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Trustworthy Computing | Microsoft's Approach to Compliance in the Cloud 1 The Microsoft Approach to Compliance in the Cloud Microsoft Trustworthy Computing Executive summary Microsoft recognizes that trust Microsoft cloud services create customer choice 11 #12;Trustworthy Computing | The Microsoft Approach

  9. Help for the Developers of Control System Cyber Security Standards

    SciTech Connect (OSTI)

    Robert P. Evans

    2008-05-01T23:59:59.000Z

    A Catalog of Control Systems Security: Recommendations for Standards Developers (Catalog), aimed at assisting organizations to facilitate the development and implementation of control system cyber security standards, has been developed. This catalog contains requirements that can help protect control systems from cyber attacks and can be applied to the Critical Infrastructures and Key Resources of the United States and other nations. The requirements contained in the catalog are a compilation of practices or various industry bodies used to increase the security of control systems from both physical and cyber attacks. They should be viewed as a collection of recommendations to be considered and judiciously employed, as appropriate, when reviewing and developing cyber security standards for control systems. The recommendations in the Catalog are intended to be broad enough to provide any industry using control systems the flexibility needed to develop sound cyber security standards specific to their individual security requirements.

  10. Control Systems Cyber Security Standards Support Activities

    SciTech Connect (OSTI)

    Robert Evans

    2009-01-01T23:59:59.000Z

    The Department of Homeland Security’s Control Systems Security Program (CSSP) is working with industry to secure critical infrastructure sectors from cyber intrusions that could compromise control systems. This document describes CSSP’s current activities with industry organizations in developing cyber security standards for control systems. In addition, it summarizes the standards work being conducted by organizations within the sector and provides a brief listing of sector meetings and conferences that might be of interest for each sector. Control systems cyber security standards are part of a rapidly changing environment. The participation of CSSP in the development effort for these standards has provided consistency in the technical content of the standards while ensuring that information developed by CSSP is included.

  11. Student Research Abstract: Trustworthy Remote Entities in the Smart Grid

    E-Print Network [OSTI]

    Oxford, University of

    Student Research Abstract: Trustworthy Remote Entities in the Smart Grid Andrew J. Paverd to enhance user privacy by introducing a novel element into the smart grid architecture. The Trustworthy a group of smart meters and the external smart grid entities. The TRE enhances user privacy by providing

  12. Enhance your Cyber Security Knowledge

    E-Print Network [OSTI]

    Enhance your Cyber Security Knowledge About NPS CS FUNDAMENTALS: Create a strong foundational by increasing the effectiveness of the armed forces of the United States and its allies. Cyber Security-4015 About CISR #12;Cyber Security Adversarial Techniques Cyber Security Defense Cyber Security Fundamentals

  13. Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1

    E-Print Network [OSTI]

    Krings, Axel W.

    : Security, Vulnerabilities, Cyber Attack, Critical Infrastructure Protection, Electric Power Management present a model developed for Electric Power Management Systems (EPMS) and Supervisory Control and Data vulnerable to cyber attack. We use graph theory to model electric power control and protection devices

  14. Impact Analysis of Transient Stability Due to Cyber Attack on FACTS Devices

    E-Print Network [OSTI]

    Kundur, Deepa

    vulnerabilities that threat- en the security of cyber-physical power system span across generation, transmission that the losses caused by cyber attack on power grid infrastructure will increase significantly, if no proper. Butler-Purry Electrical and Computer Engineering Department Texas A&M University College Station, TX, USA

  15. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08T23:59:59.000Z

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  16. Final report : impacts analysis for cyber attack on electric power systems (National SCADA Test Bed FY08).

    SciTech Connect (OSTI)

    Phillips, Laurence R.; Richardson, Bryan T.; Stamp, Jason Edwin; LaViolette, Randall A.

    2009-02-01T23:59:59.000Z

    To analyze the risks due to cyber attack against control systems used in the United States electrical infrastructure, new algorithms are needed to determine the possible impacts. This research is studying the Reliability Impact of Cyber ttack (RICA) in a two-pronged approach. First, malevolent cyber actions are analyzed in terms of reduced grid reliability. Second, power system impacts are investigated using an abstraction of the grid's dynamic model. This second year of esearch extends the work done during the first year.

  17. Embedded Cyber-Physical Anomaly Detection in Smart Meters

    E-Print Network [OSTI]

    vulnerabilities that arise from deployment of local cyber-physical attacks at a smart metering location and physical domains. 1 Introduction Limitations of today's power networks, combined with the need we address the risk of manipula- tions at the end-user level, even when a trusted infrastructure

  18. Critical infrastructure systems of systems assessment methodology.

    SciTech Connect (OSTI)

    Sholander, Peter E.; Darby, John L.; Phelan, James M.; Smith, Bryan; Wyss, Gregory Dane; Walter, Andrew; Varnado, G. Bruce; Depoy, Jennifer Mae

    2006-10-01T23:59:59.000Z

    Assessing the risk of malevolent attacks against large-scale critical infrastructures requires modifications to existing methodologies that separately consider physical security and cyber security. This research has developed a risk assessment methodology that explicitly accounts for both physical and cyber security, while preserving the traditional security paradigm of detect, delay, and respond. This methodology also accounts for the condition that a facility may be able to recover from or mitigate the impact of a successful attack before serious consequences occur. The methodology uses evidence-based techniques (which are a generalization of probability theory) to evaluate the security posture of the cyber protection systems. Cyber threats are compared against cyber security posture using a category-based approach nested within a path-based analysis to determine the most vulnerable cyber attack path. The methodology summarizes the impact of a blended cyber/physical adversary attack in a conditional risk estimate where the consequence term is scaled by a ''willingness to pay'' avoidance approach.

  19. Cyber Security Testing and Training Programs for Industrial Control Systems

    SciTech Connect (OSTI)

    Daniel Noyes

    2012-03-01T23:59:59.000Z

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  20. Intrusion-Tolerant Protection for Critical Infrastructures

    E-Print Network [OSTI]

    Neves, Nuno

    of an organization in the face of accidents and attacks. How- ever, they are not simple firewalls but distributed]. In recent years these systems evolved in several aspects that greatly increased their exposure to cyber-attacks, a critical information infrastructure is formed by facilities, like power transformation substations or cor

  1. Process Control System Cyber Security Standards - An Overview

    SciTech Connect (OSTI)

    Robert P. Evans; V Stanley Scown; Rolf Carlson; Shabbir Shamsuddin; George Shaw; Jeff Dagle; Paul W Oman; Jeannine Schmidt

    2005-10-01T23:59:59.000Z

    The use of cyber security standards can greatly assist in the protection of critical infrastructure by providing guidelines and requisite imperatives in the implementation of computer-controlled systems. These standards are most effective when the engineers and operators using the standards understand what each of the standards addresses and does not address. This paper provides a review and comparison of ten documents dealing with control system cyber security. It is not meant to be a complete treatment of all applicable standards; rather, this is an exemplary analysis showing the benefits of comparing and contrasting differing documents.

  2. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01T23:59:59.000Z

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  3. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08T23:59:59.000Z

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  4. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12T23:59:59.000Z

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

  5. Hardware Assistance for Trustworthy Systems through 3-D Integration

    E-Print Network [OSTI]

    California at Santa Barbara, University of

    Hardware Assistance for Trustworthy Systems through 3-D Integration Jonathan Valamehr , Mohit a separate control plane, stacked using 3- D integration, that allows for the function and economics computation plane by at- taching an optional control plane using 3-D integration. In a developed example we

  6. Extended Abstract: Trustworthy System Security through 3-D Integrated Hardware

    E-Print Network [OSTI]

    Kastner, Ryan

    , isolation, and protec- tion. This problem is exacerbated by the movement to multi-core processors since@nps.edu While hardware resources in the form of both tran- sistors and full microprocessor cores are now these problems, we are pursuing a radical transformation in the way trustworthy systems are de- veloped

  7. Cyber threat metrics.

    SciTech Connect (OSTI)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01T23:59:59.000Z

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  8. Cyber Friendly Fire

    SciTech Connect (OSTI)

    Greitzer, Frank L.; Carroll, Thomas E.; Roberts, Adam D.

    2011-09-01T23:59:59.000Z

    Cyber friendly fire (FF) is a new concept that has been brought to the attention of Department of Defense (DoD) stakeholders through two workshops that were planned and conducted by the Air Force Research Laboratory (AFRL) and research conducted for AFRL by the Pacific Northwest National Laboratory. With this previous work in mind, we offer a definition of cyber FF as intentional offensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintentionally harms the mission effectiveness of friendly or neutral forces. Just as with combat friendly fire, a fundamental need in avoiding cyber FF is to maintain situation awareness (SA). We suggest that cyber SA concerns knowledge of a system's topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system (and that populate the nodes), the nature of the activities or work performed, and the available defensive (and offensive) countermeasures that may be applied to thwart network attacks. A training implication is to raise awareness and understanding of these critical knowledge units; an approach to decision aids and/or visualizations is to focus on supporting these critical knowledge units. To study cyber FF, we developed an unclassified security test range comprising a combination of virtual and physical devices that present a closed network for testing, simulation, and evaluation. This network offers services found on a production network without the associated costs of a real production network. Containing enough detail to appear realistic, this virtual and physical environment can be customized to represent different configurations. For our purposes, the test range was configured to appear as an Internet-connected Managed Service Provider (MSP) offering specialized web applications to the general public. The network is essentially divided into a production component that hosts the web and network services, and a user component that hosts thirty employee workstations and other end devices. The organization's network is separated from the Internet by a Cisco ASA network security device that both firewalls and detects intrusions. Business sensitive information is stored in various servers. This includes data comprising thousands of internal documents, such as finance and technical designs, email messages for the organization's employees including the CEO, CFO, and CIO, the organization's source code, and Personally Identifiable client data. Release of any of this information to unauthorized parties would have a significant, detrimental impact on the organization's reputation, which would harm earnings. The valuable information stored in these servers pose obvious points of interest for an adversary. We constructed several scenarios around this environment to support studies in cyber SA and cyber FF that may be run in the test range. We describe mitigation strategies to combat cyber FF including both training concepts and suggestions for decision aids and visualization approaches. Finally, we discuss possible future research directions.

  9. Defense on the Move: Ant-Based Cyber Defense

    SciTech Connect (OSTI)

    Fink, Glenn A.; Haack, Jereme N.; McKinnon, Archibald D.; Fulp, Errin W.

    2014-04-15T23:59:59.000Z

    Many common cyber defenses (like firewalls and IDS) are as static as trench warfare allowing the attacker freedom to probe them at will. The concept of Moving Target Defense (MTD) adds dynamism to the defender side, but puts the systems to be defended themselves in motion, potentially at great cost to the defender. An alternative approach is a mobile resilient defense that removes attackers’ ability to rely on prior experience without requiring motion in the protected infrastructure itself. The defensive technology absorbs most of the cost of motion, is resilient to attack, and is unpredictable to attackers. The Ant-Based Cyber Defense (ABCD) is a mobile resilient defense providing a set of roaming, bio-inspired, digital-ant agents working with stationary agents in a hierarchy headed by a human supervisor. The ABCD approach provides a resilient, extensible, and flexible defense that can scale to large, multi-enterprise infrastructures like the smart electric grid.

  10. Elisa Bertino Cyber Center

    E-Print Network [OSTI]

    Ginzel, Matthew

    on Information and System Security, ACM Transactions on Web, Acta Informatica, the Parallel and Distributed Society Tsutomu Kanai Award "For pioneering and innovative research contributions to secure distributed Elisa Bertino Director, Cyber Center bertino@purdue.edu 765-496-2399 Elisa Bertino is professor

  11. PACIFIC NORTHWEST CYBER SUMMIT

    SciTech Connect (OSTI)

    Lesperance, Ann M.; Matlock, Gordon W.; Becker-Dippmann, Angela S.; Smith, Karen S.

    2013-08-07T23:59:59.000Z

    On March 26, 2013, the Snohomish County Public Utility District (PUD) and the U.S. Department of Energy’s (DOE’s) Pacific Northwest National Laboratory (PNNL) jointly hosted the Pacific Northwest Cyber Summit with the DOE’s Office of Electricity Delivery and Energy Reliability, the White House, Washington State congressional delegation, Washington State National Guard, and regional energy companies.

  12. Extension of DOE Directive on Cyber Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-06-04T23:59:59.000Z

    DOE N 205.4, Handling Cyber Security Alerts and Advisories and Reporting Cyber Security Incidents, is extended until 6/4/04.

  13. Information Security: Coordination of Federal Cyber Security...

    Office of Environmental Management (EM)

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

  14. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12T23:59:59.000Z

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

  15. Cyber Defense Overview

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    infrastructure. New threats demand new defenses Page-3 SPIDERS Program Summary CAMP SMITH ENERGY ISLAND * Entire Installation Smart Microgrid * Islanded Installation * High...

  16. Fuzzy Logic Based Anomaly Detection for Embedded Network Security Cyber Sensor

    SciTech Connect (OSTI)

    Ondrej Linda; Todd Vollmer; Jason Wright; Milos Manic

    2011-04-01T23:59:59.000Z

    Resiliency and security in critical infrastructure control systems in the modern world of cyber terrorism constitute a relevant concern. Developing a network security system specifically tailored to the requirements of such critical assets is of a primary importance. This paper proposes a novel learning algorithm for anomaly based network security cyber sensor together with its hardware implementation. The presented learning algorithm constructs a fuzzy logic rule based model of normal network behavior. Individual fuzzy rules are extracted directly from the stream of incoming packets using an online clustering algorithm. This learning algorithm was specifically developed to comply with the constrained computational requirements of low-cost embedded network security cyber sensors. The performance of the system was evaluated on a set of network data recorded from an experimental test-bed mimicking the environment of a critical infrastructure control system.

  17. Rethinking the Cyber Threat A Framework and Path Forward

    E-Print Network [OSTI]

    Bernstein, Phil

    Rethinking the Cyber Threat A Framework and Path Forward SCOTT CHARNEY Corporate Vice President ..................................................................................................................................................5 Understanding the Cyber Threat .................................................................................................................5 Rethinking the Cyber Threat

  18. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08T23:59:59.000Z

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

  19. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08T23:59:59.000Z

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

  20. Optimal Allocation of Interconnecting Links in Cyber-Physical Systems: Interdependence,

    E-Print Network [OSTI]

    Yagan, Osman

    infrastructure networks involving Internet services, power grids and financial markets [3]. Real- world examples.zhang, cochran}@asu.edu School of Electrical, Computer and Energy Engineering Arizona State University, Tempe, AZ.e., a cyber-network overlaying a physical-network. It is envisioned that these systems are more vulnerable

  1. Cyber Security for Power Grids Frank Mueller, Subhashish Bhattacharya, Christopher Zimmer

    E-Print Network [OSTI]

    Mueller, Frank

    systems. 1 Introduction The power grid in the US is one-century old and aging in terms of infrastructure methods to remove bugs as well as security vulnerabilities in soft- ware for intelligent power devicesCyber Security for Power Grids Frank Mueller, Subhashish Bhattacharya, Christopher Zimmer Dept

  2. Towards a Framework for Cyber Attack Impact Analysis of the Electric Smart Grid

    E-Print Network [OSTI]

    Kundur, Deepa

    ? Is the information available through advanced cyber infrastructure worth the increased security risk? Vulnerability analysis for electric power utilities has begun to aid in answering these questions [11]­[13]. However influenced by the needs of electric power utilities. Section II introduces and motivates the problem of smart

  3. Seeing is believing: Trustworthiness as a dynamic belief Luke J. Chang a

    E-Print Network [OSTI]

    with experienced trustworthiness in a repeated Trust Game. Consistent with our hypotheses, these two factors willing to entrust to their partner and also in their post-game subjective ratings of trustworthiness (Rempel, Holmes, & Zanna, 1985) and economic prosperity (Zak & Knack, 2001). How- ever, as anyone who has

  4. Sandia Energy - Cyber

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Scienceand RequirementsCoatings Initiated at PNNL's SequimReactors To ReceiveCyber Home

  5. First-Ever Demonstration of Quantum Cryptography to Improve Security...

    Energy Savers [EERE]

    was conducted in the test bed that is part of the OE-funded Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) project at the University of Illinois Urbana-Champaign....

  6. LOS ALAMOS, N.M., Feb. 14, 2013-Recently a Los Alamos National...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    was performed in the electric grid test bed that is part of the Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) project at the University of Illinois Urbana-Champaign...

  7. Pacific Basin Nuclear Conference (PBNC 2012), BEXCO, Busan, Korea, March 18 ~ 23, 2012 CHALLENGES OF CYBER SECURITY FOR NUCLEAR POWER PLANTS

    E-Print Network [OSTI]

    Kim, Kwangjo

    .kim@kustar.ac.ae Abstract Nuclear Power Plants (NPPs) become one of the most important infrastructures in providing improvement. 1. Introduction Nuclear Power Plants (NPPs) become one of the most important infrastructures PBNC 2012 CHALLENGES OF CYBER SECURITY FOR NUCLEAR POWER PLANTS Kwangjo Kim KAIST, Daejeon, Korea

  8. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12T23:59:59.000Z

    The Manual establishes minimum implementation standards for cyber security management processes throughout the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B. No cancellations.

  9. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08T23:59:59.000Z

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

  10. Social infrastructure

    E-Print Network [OSTI]

    Kurlbaum, Ryan E. (Ryan Edward)

    2013-01-01T23:59:59.000Z

    Current urbanization patterns and aging transportation infrastructures have marginalized millions of US citizens. The result is that 4 .5 million US residents live within 100 meters of a four-lane highway' and have become ...

  11. Lively Infrastructure

    E-Print Network [OSTI]

    Amin, Ash

    2014-10-06T23:59:59.000Z

    and slack within and across the city’s infrastructural networks (Lahoud, 2010; Vale and Campanella, 2005; Batty, 2013). Importantly, this writing shows that there is nothing purely technical or mechanical about even the most digitised infrastructures... given to, and commanded by, building a house piece by piece when time and resource allow, the measures taken to pirate water and electricity, build sanitary pits, and make indoor or outdoor showers and kitchens, making a house into a home...

  12. A Hierarchical Security Architecture for Cyber-Physical Systems

    SciTech Connect (OSTI)

    Quanyan Zhu; Tamer Basar

    2011-08-01T23:59:59.000Z

    Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

  13. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  14. Cyber Security Grand Challenges and Prognosis

    E-Print Network [OSTI]

    Sandhu, Ravi

    Cyber Security Grand Challenges and Prognosis Prof. Ravi Sandhu Executive Director and Institute for Cyber Security Executive Director and Endowed Chair ravi.sandhu@utsa.edu www.profsandhu.com www.ics.utsa.edu © Ravi Sandhu World-Leading Research with Real Cyber Security Grand Challenges and Prognosis Prof. Ravi

  15. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  16. Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM Flash2011-12 OPAMGeneral GuidanceEnergyServices »Department|

  17. Reducing Cyber Risk to Critical Infrastructure: NIST Framework | Department

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently20,000 RussianBy: ThomasDepartment ofThisHiTek logo HiTekLoansRafaelAprilPoliciesThis

  18. Materials Informatics for the ICME CyberInfrastructure | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment3311, 3312), October 20122 DOE Technologies Office

  19. Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently Asked Questions for DOE FYAffairs, and InternationalPlanning,Analysis

  20. Cyber Security Indications and Warning System (SV): CRADA 1573.94 Project Accomplishments Summary

    SciTech Connect (OSTI)

    Hu, Tan Chang (PI, Sandia); Robinson, David G. (Technical PI)

    2011-09-08T23:59:59.000Z

    As the national focus on cyber security increases, there is an evolving need for a capability to provide for high-speed sensing of events, correlation of events, and decision-making based on the adverse events seen across multiple independent large-scale network environments. The purpose of this Shared Vision project, Cyber Security Indications and Warning System, was to combine both Sandia's and LMC's expertise to discover new solutions to the challenge of protecting our nation's infrastructure assets. The objectives and scope of the proposal was limited to algorithm and High Performance Computing (HPC) model assessment in the unclassified environment within funding and schedule constraints. The interest is the identification, scalability assessment, and applicability of current utilized cyber security algorithms as applied in an HPC environment.

  1. BROOKHAVEN NATIONAL LABORATORYS CAPABILITIES FOR ADVANCED ANALYSES OF CYBER THREATS

    SciTech Connect (OSTI)

    DePhillips M. P.

    2014-06-06T23:59:59.000Z

    BNL has several ongoing, mature, and successful programs and areas of core scientific expertise that readily could be modified to address problems facing national security and efforts by the IC related to securing our nation’s computer networks. In supporting these programs, BNL houses an expansive, scalable infrastructure built exclusively for transporting, storing, and analyzing large disparate data-sets. Our ongoing research projects on various infrastructural issues in computer science undoubtedly would be relevant to national security. Furthermore, BNL frequently partners with researchers in academia and industry worldwide to foster unique and innovative ideas for expanding research opportunities and extending our insights. Because the basic science conducted at BNL is unique, such projects have led to advanced techniques, unlike any others, to support our mission of discovery. Many of them are modular techniques, thus making them ideal for abstraction and retrofitting to other uses including those facing national security, specifically the safety of the nation’s cyber space.

  2. Ideal Based Cyber Security Technical Metrics for Control Systems

    SciTech Connect (OSTI)

    W. F. Boyer; M. A. McQueen

    2007-10-01T23:59:59.000Z

    Much of the world's critical infrastructure is at risk from attack through electronic networks connected to control systems. Security metrics are important because they provide the basis for management decisions that affect the protection of the infrastructure. A cyber security technical metric is the security relevant output from an explicit mathematical model that makes use of objective measurements of a technical object. A specific set of technical security metrics are proposed for use by the operators of control systems. Our proposed metrics are based on seven security ideals associated with seven corresponding abstract dimensions of security. We have defined at least one metric for each of the seven ideals. Each metric is a measure of how nearly the associated ideal has been achieved. These seven ideals provide a useful structure for further metrics development. A case study shows how the proposed metrics can be applied to an operational control system.

  3. High energy physics experiment triggers and the trustworthiness of software

    SciTech Connect (OSTI)

    Nash, T.

    1991-10-01T23:59:59.000Z

    For all the time and frustration that high energy physicists expend interacting with computers, it is surprising that more attention is not paid to the critical role computers play in the science. With large, expensive colliding beam experiments now dependent on complex programs working at startup, questions of reliability -- the trustworthiness of software -- need to be addressed. This issue is most acute in triggers, used to select data to record -- and data to discard -- in the real time environment of an experiment. High level triggers are built on codes that now exceed 2 million source lines -- and for the first time experiments are truly dependent on them. This dependency will increase at the accelerators planned for the new millennium (SSC and LHC), where cost and other pressures will reduce tolerance for first run problems, and the high luminosities will make this on-line data selection essential. A sense of this incipient crisis motivated the unusual juxtaposition to topics in these lectures. 37 refs., 1 fig.

  4. Cyber Security | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power Administration would likeConstitution4Customer-Comments Sign In About |Cyber SecurityCyber

  5. INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY

    SciTech Connect (OSTI)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01T23:59:59.000Z

    Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

  6. Assessment of current cybersecurity practices in the public domain : cyber indications and warnings domain.

    SciTech Connect (OSTI)

    Hamlet, Jason R.; Keliiaa, Curtis M.

    2010-09-01T23:59:59.000Z

    This report assesses current public domain cyber security practices with respect to cyber indications and warnings. It describes cybersecurity industry and government activities, including cybersecurity tools, methods, practices, and international and government-wide initiatives known to be impacting current practice. Of particular note are the U.S. Government's Trusted Internet Connection (TIC) and 'Einstein' programs, which are serving to consolidate the Government's internet access points and to provide some capability to monitor and mitigate cyber attacks. Next, this report catalogs activities undertaken by various industry and government entities. In addition, it assesses the benchmarks of HPC capability and other HPC attributes that may lend themselves to assist in the solution of this problem. This report draws few conclusions, as it is intended to assess current practice in preparation for future work, however, no explicit references to HPC usage for the purpose of analyzing cyber infrastructure in near-real-time were found in the current practice. This report and a related SAND2010-4766 National Cyber Defense High Performance Computing and Analysis: Concepts, Planning and Roadmap report are intended to provoke discussion throughout a broad audience about developing a cohesive HPC centric solution to wide-area cybersecurity problems.

  7. Energy Infrastructure Events and Expansions Infrastructure Security...

    Office of Environmental Management (EM)

    Year-in-Review: 2010 Energy Infrastructure Events and Expansions Infrastructure Security and Energy Restoration Office of Electricity Delivery and Energy Reliability U.S....

  8. HYDROGEN REGIONAL INFRASTRUCTURE PROGRAM

    E-Print Network [OSTI]

    HYDROGEN REGIONAL INFRASTRUCTURE PROGRAM IN PENNSYLVANIA HYDROGEN REGIONAL INFRASTRUCTURE PROGRAM date ­ November 23, 2004 · Contract end date ­ March 31, 2006 #12;Hydrogen Regional Infrastructure Program in Pennsylvania Hydrogen Regional Infrastructure Program in Pennsylvania · Objectives ­ Capture

  9. arvutimnguritus world cyber: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    cyber-insurer, thereby making 74 SESSION: CYBER-PHYSICAL SYSTEM SECURITY IN A SMART GRID ENVIROMENT 1 Cyber-Security of SCADA Systems Fission and Nuclear Technologies Websites...

  10. alleged russian cyber: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    cyber-insurer, thereby making 69 SESSION: CYBER-PHYSICAL SYSTEM SECURITY IN A SMART GRID ENVIROMENT 1 Cyber-Security of SCADA Systems Fission and Nuclear Technologies Websites...

  11. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn Other News link toInfluenceInfrared MappingInfrastructure

  12. Common Cyber Security Vulnerabilities Observed in Control System...

    Energy Savers [EERE]

    Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by...

  13. Using Operational Security (OPSEC) to Support a Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

  14. A Scalable Framework for Cyber Attack Discovery and Situational...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Scalable Framework for Cyber Attack Discovery and Situational Understanding (SITU) May 15, 2013 Problem Statement: Cyber attacks cost commercial and governmental organizations vast...

  15. NNSA Seeking Comments on Consolidated IT and Cyber Security Support...

    Broader source: Energy.gov (indexed) [DOE]

    NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft July 17, 2013...

  16. Protecting Intelligent Distributed Power Grids Against Cyber...

    Broader source: Energy.gov (indexed) [DOE]

    will help protect intelligent distributed power grids from cyber attacks. Intelligent power grids are interdependent energy management systems-encompassing generation,...

  17. Office of Cyber Assessments | Department of Energy

    Energy Savers [EERE]

    program of announced and unannounced testing for DOE network vulnerabilities through scanning and penetration testing. Performs complex-wide reviews of cyber security topical...

  18. Graph anomalies in cyber communications

    SciTech Connect (OSTI)

    Vander Wiel, Scott A [Los Alamos National Laboratory; Storlie, Curtis B [Los Alamos National Laboratory; Sandine, Gary [Los Alamos National Laboratory; Hagberg, Aric A [Los Alamos National Laboratory; Fisk, Michael [Los Alamos National Laboratory

    2011-01-11T23:59:59.000Z

    Enterprises monitor cyber traffic for viruses, intruders and stolen information. Detection methods look for known signatures of malicious traffic or search for anomalies with respect to a nominal reference model. Traditional anomaly detection focuses on aggregate traffic at central nodes or on user-level monitoring. More recently, however, traffic is being viewed more holistically as a dynamic communication graph. Attention to the graph nature of the traffic has expanded the types of anomalies that are being sought. We give an overview of several cyber data streams collected at Los Alamos National Laboratory and discuss current work in modeling the graph dynamics of traffic over the network. We consider global properties and local properties within the communication graph. A method for monitoring relative entropy on multiple correlated properties is discussed in detail.

  19. Microgrid cyber security reference architecture.

    SciTech Connect (OSTI)

    Veitch, Cynthia K.; Henry, Jordan M.; Richardson, Bryan T.; Hart, Derek H.

    2013-07-01T23:59:59.000Z

    This document describes a microgrid cyber security reference architecture. First, we present a high-level concept of operations for a microgrid, including operational modes, necessary power actors, and the communication protocols typically employed. We then describe our motivation for designing a secure microgrid; in particular, we provide general network and industrial control system (ICS)-speci c vulnerabilities, a threat model, information assurance compliance concerns, and design criteria for a microgrid control system network. Our design approach addresses these concerns by segmenting the microgrid control system network into enclaves, grouping enclaves into functional domains, and describing actor communication using data exchange attributes. We describe cyber actors that can help mitigate potential vulnerabilities, in addition to performance bene ts and vulnerability mitigation that may be realized using this reference architecture. To illustrate our design approach, we present a notional a microgrid control system network implementation, including types of communica- tion occurring on that network, example data exchange attributes for actors in the network, an example of how the network can be segmented to create enclaves and functional domains, and how cyber actors can be used to enforce network segmentation and provide the neces- sary level of security. Finally, we describe areas of focus for the further development of the reference architecture.

  20. RESEARCH INFRASTRUCTURES Roadmap 2008

    E-Print Network [OSTI]

    Horn, David

    RESEARCH INFRASTRUCTURES FOR FRANCE Roadmap 2008 #12;INTRODUCTION European research infrastructures and development, benefiting to Europe's economy and competitiveness. This roadmap for the research infrastructures....................................................................................................6 3. The roadmap: existing and already decided RIs and others at the planning stage

  1. INFRASTRUCTURE SECURITY & ENERGY

    E-Print Network [OSTI]

    Schrijver, Karel

    INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Delivery and Energy Reliability #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY Federal agencies to support waivers and specific response legal authorities #12;INFRASTRUCTURE SECURITY

  2. A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator

    E-Print Network [OSTI]

    Teixeira, André; Sandberg, Henrik; Johansson, Karl H

    2010-01-01T23:59:59.000Z

    The electrical power network is a critical infrastructure in today's society, so its safe and reliable operation is of major concern. State estimators are commonly used in power networks, for example, to detect faulty equipment and to optimally route power flows. The estimators are often located in control centers, to which large numbers of measurements are sent over unencrypted communication channels. Therefore cyber security for state estimators becomes an important issue. In this paper we analyze the cyber security of state estimators in supervisory control and data acquisition (SCADA) for energy management systems (EMS) operating the power network. Current EMS state estimation algorithms have bad data detection (BDD) schemes to detect outliers in the measurement data. Such schemes are based on high measurement redundancy. Although these methods may detect a set of basic cyber attacks, they may fail in the presence of an intelligent attacker. We explore the latter by considering scenarios where stealthy de...

  3. Department of Energy Cyber Security Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-12-04T23:59:59.000Z

    The purpose of the DOE Cyber Security Management Program is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE O 205.1. Canceled by DOE O 205.1B.

  4. Engineering Resilient Cyber-Physical Systems

    E-Print Network [OSTI]

    Engineering Resilient Cyber-Physical Systems Future Grid Thrust Area 6 White Paper Power Systems Engineering Research Center Empowering Minds to Engineer the Future Electric Energy System #12;Thrust Area 6 White Paper Engineering Resilient Cyber-Physical Systems Project Team Thomas J. Overbye University

  5. Department of Energy Cyber Security Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-21T23:59:59.000Z

    The purpose of the Department of Energy (DOE) Cyber Security Management Program (hereafter called the Program) is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE N 205.1

  6. Cyber Security in Smart Grid Substations

    E-Print Network [OSTI]

    Utrecht, Universiteit

    Cyber Security in Smart Grid Substations Thijs Baars Lucas van den Bemd Michail Theuns Robin van.089 3508 TB Utrecht The Netherlands #12;CYBER SECURITY IN SMART GRID SUBSTATIONS Thijs Baars T.Brinkkemper@uu.nl Abstract. This report describes the state of smart grid security in Europe, specifically the Netherlands

  7. Cyber-Physical System Verification Embedded Systems Group

    E-Print Network [OSTI]

    Berns, Karsten

    (Felipe Bichued) 21 Introducing Simulation of Hybrid Systems with the Modelica Tool 32 #12;Cyber Physical

  8. Cyber Security Major R&D Challenges Ram Krishnan

    E-Print Network [OSTI]

    Sandhu, Ravi

    1 Cyber Security Major R&D Challenges Ram Krishnan http://engineering.utsa.edu/~krishnan/ Cyber Security Research Institute (CSRI) Cyber Security R&D Workshop April 19-20, 2012 World-Leading Research with Real-World Impact! Institute for Cyber Security Prof. Ravi Sandhu conveys his regrets for inability

  9. Mathematical and Statistical Opportunities in Cyber Security

    SciTech Connect (OSTI)

    Meza, Juan; Campbell, Scott; Bailey, David

    2009-03-23T23:59:59.000Z

    The role of mathematics in a complex system such as the Internet has yet to be deeply explored. In this paper, we summarize some of the important and pressing problems in cyber security from the viewpoint of open science environments. We start by posing the question 'What fundamental problems exist within cyber security research that can be helped by advanced mathematics and statistics'? Our first and most important assumption is that access to real-world data is necessary to understand large and complex systems like the Internet. Our second assumption is that many proposed cyber security solutions could critically damage both the openness and the productivity of scientific research. After examining a range of cyber security problems, we come to the conclusion that the field of cyber security poses a rich set of new and exciting research opportunities for the mathematical and statistical sciences.

  10. Gamification for Measuring Cyber Security Situational Awareness

    SciTech Connect (OSTI)

    Fink, Glenn A.; Best, Daniel M.; Manz, David O.; Popovsky, V. M.; Endicott-Popovsky, Barbara E.

    2013-03-01T23:59:59.000Z

    Cyber defense competitions arising from U.S. service academy exercises, offer a platform for collecting data that can inform research that ranges from characterizing the ideal cyber warrior to describing behaviors during certain challenging cyber defense situations. This knowledge could lead to better preparation of cyber defenders in both military and civilian settings. This paper describes how one regional competition, the PRCCDC, a participant in the national CCDC program, conducted proof of concept experimentation to collect data during the annual competition for later analysis. The intent is to create an ongoing research agenda that expands on this current work and incorporates augmented cognition and gamification methods for measuring cybersecurity situational awareness under the stress of cyber attack.

  11. It is often difficult to come up with metrics to describe the resiliency of a cyber system. We might feel a system is in a good

    E-Print Network [OSTI]

    Contingency Analysis Tool for Electric Power Grids Each Account Has Access to Files with Different compromised or disabled? A similar problem exists with power systems. To deal with this, power grid operators, methodologies, and algorithms that will enable a resilient cyber infrastructure with an asymmetric advantage

  12. Control Systems Cyber Security: Defense-in-Depth Strategies

    SciTech Connect (OSTI)

    Mark Fabro

    2007-10-01T23:59:59.000Z

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: • Maintenance of various field devices, telemetry collection, and/or industrial-level process systems • Access to facilities via remote data link or modem • Public facing services for customer or corporate operations • A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

  13. Control Systems Cyber Security:Defense in Depth Strategies

    SciTech Connect (OSTI)

    David Kuipers; Mark Fabro

    2006-05-01T23:59:59.000Z

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

  14. National cyber defense high performance computing and analysis : concepts, planning and roadmap.

    SciTech Connect (OSTI)

    Hamlet, Jason R.; Keliiaa, Curtis M.

    2010-09-01T23:59:59.000Z

    There is a national cyber dilemma that threatens the very fabric of government, commercial and private use operations worldwide. Much is written about 'what' the problem is, and though the basis for this paper is an assessment of the problem space, we target the 'how' solution space of the wide-area national information infrastructure through the advancement of science, technology, evaluation and analysis with actionable results intended to produce a more secure national information infrastructure and a comprehensive national cyber defense capability. This cybersecurity High Performance Computing (HPC) analysis concepts, planning and roadmap activity was conducted as an assessment of cybersecurity analysis as a fertile area of research and investment for high value cybersecurity wide-area solutions. This report and a related SAND2010-4765 Assessment of Current Cybersecurity Practices in the Public Domain: Cyber Indications and Warnings Domain report are intended to provoke discussion throughout a broad audience about developing a cohesive HPC centric solution to wide-area cybersecurity problems.

  15. Cyber Security | More Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power Administration would likeConstitution4Customer-Comments Sign In About |Cyber Security

  16. Towards A Theory of Autonomous Reconstitution of Compromised Cyber-Systems

    SciTech Connect (OSTI)

    Ramuhalli, Pradeep; Halappanavar, Mahantesh; Coble, Jamie B.; Dixit, Mukul

    2013-11-12T23:59:59.000Z

    The ability to maintain mission-critical operations in cyber-systems in the face of disruptions is critical. Faults in cyber systems can come from accidental sources (e.g., natural failure of a component) or deliberate sources (e.g., an intelligent adversary). Natural and intentional manipulation of data, computing, or coordination are the most impactful ways that an attacker can prevent an infrastructure from realizing its mission goals. Under these conditions, the ability to reconstitute critical infrastructure becomes important. Specifically, the question is: Given an intelligent adversary, how can cyber systems respond to keep critical infrastructure operational? In cyber systems, the distributed nature of the system poses serious difficulties in maintaining operations, in part due to the fact that a centralized command and control apparatus is unlikely to provide a robust framework for resilience. Resilience in cyber-systems, in general, has several components, and requires the ability to anticipate and withstand attacks or faults, as well as recover from faults and evolve the system to improve future resilience. The recovery effort (and any subsequent evolution) may require significant reconfiguration of the system (at all levels – hardware, software, services, permissions, etc.) if the system is to be made resilient to further attack or faults. This is especially important in the case of ongoing attacks, where reconfiguration decisions must be taken with care to avoid further compromising the system while maintaining continuity of operations. Collectively, we will label this recovery and evolution process as “reconstitution”. Currently, reconstitution is performed manually, generally after-the-fact, and usually consists of either standing up redundant systems, check-points (rolling back the configuration to a “clean” state), or re-creating the system using “gold-standard” copies. For enterprise systems, such reconstitution may be performed either directly on hardware, or using virtual machines. A significant challenge within this context is the ability to verify that the reconstitution is performed in a manner that renders the cyber-system resilient to ongoing and future attacks or faults. Fundamentally, the need is to determine optimal configuration of the cyber system when a fault is determined to be present. While existing theories for fault tolerance (for example, Byzantine fault tolerance) can guarantee resilience under certain conditions, in practice, these theories can break down in the face of an intelligent adversary. Further, it is difficult, in a dynamically evolving environment, to determine whether the necessary conditions for resilience have been met, resulting in difficulties in achieving resilient operation. In addition, existing theories do not sufficiently take into account the cost for attack and defense (the adversary is generally assumed to have infinite resources and time), hierarchy of importance (all network resources are assumed to be equally important), and the dynamic nature of some attacks (i.e., as the attack evolves, can resilience be maintained?). Alternative approaches to resilience based on a centralized command and control structure suffer from a single-point-failure. This paper presents preliminary research towards concepts for effective autonomous reconstitution of compromised cyber systems. We describe a mathematical framework as a first step towards a theoretical basis for autonomous reconstitution in dynamic cyber-system environments. We then propose formulating autonomous reconstitution as an optimization problem and describe some of the challenges associated with this formulation. This is followed by a brief discussion on potential solutions to these challenges.

  17. S3A: Secure System Simplex Architecture for Enhanced Security of Cyber-Physical Systems

    E-Print Network [OSTI]

    Mohan, Sibin; Betti, Emiliano; Yun, Heechul; Sha, Lui; Caccamo, Marco

    2012-01-01T23:59:59.000Z

    Until recently, cyber-physical systems, especially those with safety-critical properties that manage critical infrastructure (e.g. power generation plants, water treatment facilities, etc.) were considered to be invulnerable against software security breaches. The recently discovered 'W32.Stuxnet' worm has drastically changed this perception by demonstrating that such systems are susceptible to external attacks. Here we present an architecture that enhances the security of safety-critical cyber-physical systems despite the presence of such malware. Our architecture uses the property that control systems have deterministic execution behavior, to detect an intrusion within 0.6 {\\mu}s while still guaranteeing the safety of the plant. We also show that even if an attack is successful, the overall state of the physical system will still remain safe. Even if the operating system's administrative privileges have been compromised, our architecture will still be able to protect the physical system from coming to harm.

  18. Handling Cyber Security Alerts and Advisories and Reporting Cyber Security Incidents

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-03-18T23:59:59.000Z

    To establish Department of Energy (DOE) requirements and responsibilities for reporting cyber security incidents involving classified and unclassified systems and responding to cyber security alerts and advisories; and to implement requirements of DOE N 205.1, Unclassified Cyber Security Program, and DOE M 471.2-2, Classified Information Systems Security Manual. DOE N 205.13, dated 7-6-04, extends this notice until 7-6-05. Cancels DOE M 471.2-2, Chapter III, section 8.

  19. Running Amok in Labyrinthine Systems: The Cyber-Behaviorist Origins of Soft Torture

    E-Print Network [OSTI]

    Lemov, Rebecca

    2011-01-01T23:59:59.000Z

    Labyrinthine Systems: The Cyber-Behaviorist Origins of SoftLabyrinthine Systems: The Cyber-Behaviorist Origins of Soft

  20. An Amulet for Trustworthy Wearable mHealth Jacob Sorber, Minho Shin, Ronald Peterson, Cory Cornelius, Shrirang Mare,

    E-Print Network [OSTI]

    Myers, Lawrence C.

    An Amulet for Trustworthy Wearable mHealth Jacob Sorber, Minho Shin, Ronald Peterson, Cory advantage and that copies bear this notice and the full citation on the first page. To copy otherwise

  1. Interdependence of Electricity System Infrastructure and Natural...

    Energy Savers [EERE]

    Interdependence of Electricity System Infrastructure and Natural Gas Infrastructure - EAC 2011 Interdependence of Electricity System Infrastructure and Natural Gas Infrastructure -...

  2. Jitk: A Trustworthy In-Kernel Interpreter Infrastructure Xi Wang, David Lazar, Nickolai Zeldovich, Adam Chlipala, Zachary Tatlock

    E-Print Network [OSTI]

    Chlipala, Adam

    ]. Interpreters are also used outside of kernels, such as in Bitcoin's transaction scripting [2]. As an example

  3. Assessing Vulnerabilities, Risks, and Consequences of Damage to Critical Infrastructure

    SciTech Connect (OSTI)

    Suski, N; Wuest, C

    2011-02-04T23:59:59.000Z

    Since the publication of 'Critical Foundations: Protecting America's Infrastructure,' there has been a keen understanding of the complexity, interdependencies, and shared responsibility required to protect the nation's most critical assets that are essential to our way of life. The original 5 sectors defined in 1997 have grown to 18 Critical Infrastructures and Key Resources (CIKR), which are discussed in the 2009 National Infrastructure Protection Plan (NIPP) and its supporting sector-specific plans. The NIPP provides the structure for a national program dedicated to enhanced protection and resiliency of the nation's infrastructure. Lawrence Livermore National Laboratory (LLNL) provides in-depth, multi-disciplinary assessments of threat, vulnerability, and consequence across all 18 sectors at scales ranging from specific facilities to infrastructures spanning multi-state regions, such as the Oil and Natural Gas (ONG) sector. Like many of the CIKR sectors, the ONG sector is comprised of production, processing, distribution, and storage of highly valuable and potentially dangerous commodities. Furthermore, there are significant interdependencies with other sectors, including transportation, communication, finance, and government. Understanding the potentially devastating consequences and collateral damage resulting from a terrorist attack or natural event is an important element of LLNL's infrastructure security programs. Our work began in the energy sector in the late 1990s and quickly expanded other critical infrastructure sectors. We have performed over 600 physical assessments with a particular emphasis on those sectors that utilize, store, or ship potentially hazardous materials and for whom cyber security is important. The success of our approach is based on building awareness of vulnerabilities and risks and working directly with industry partners to collectively advance infrastructure protection. This approach consists of three phases: The Pre-Assessment Phase brings together infrastructure owners and operators to identify critical assets and help the team create a structured information request. During this phase, we gain information about the critical assets from those who are most familiar with operations and interdependencies, making the time we spend on the ground conducting the assessment much more productive and enabling the team to make actionable recommendations. The Assessment Phase analyzes 10 areas: Threat environment, cyber architecture, cyber penetration, physical security, physical penetration, operations security, policies and procedures, interdependencies, consequence analysis, and risk characterization. Each of these individual tasks uses direct and indirect data collection, site inspections, and structured and facilitated workshops to gather data. Because of the importance of understanding the cyber threat, LLNL has built both fixed and mobile cyber penetration, wireless penetration and supporting tools that can be tailored to fit customer needs. The Post-Assessment Phase brings vulnerability and risk assessments to the customer in a format that facilitates implementation of mitigation options. Often the assessment findings and recommendations are briefed and discussed with several levels of management and, if appropriate, across jurisdictional boundaries. The end result is enhanced awareness and informed protective measures. Over the last 15 years, we have continued to refine our methodology and capture lessons learned and best practices. The resulting risk and decision framework thus takes into consideration real-world constraints, including regulatory, operational, and economic realities. In addition to 'on the ground' assessments focused on mitigating vulnerabilities, we have integrated our computational and atmospheric dispersion capability with easy-to-use geo-referenced visualization tools to support emergency planning and response operations. LLNL is home to the National Atmospheric Release Advisory Center (NARAC) and the Interagency Modeling and Atmospheric Assessment Center (IMAAC). NA

  4. Realizing Scientific Methods for Cyber Security

    SciTech Connect (OSTI)

    Carroll, Thomas E.; Manz, David O.; Edgar, Thomas W.; Greitzer, Frank L.

    2012-07-18T23:59:59.000Z

    There is little doubt among cyber security researchers about the lack of scientic rigor that underlies much of the liter-ature. The issues are manifold and are well documented. Further complicating the problem is insufficient scientic methods to address these issues. Cyber security melds man and machine: we inherit the challenges of computer science, sociology, psychology, and many other elds and create new ones where these elds interface. In this paper we detail a partial list of challenges imposed by rigorous science and survey how other sciences have tackled them, in the hope of applying a similar approach to cyber security science. This paper is by no means comprehensive: its purpose is to foster discussion in the community on how we can improve rigor in cyber security science.

  5. Cyber Security Audit and Attack Detection Toolkit

    SciTech Connect (OSTI)

    Peterson, Dale

    2012-05-31T23:59:59.000Z

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  6. Sandia National Laboratories: Hydrogen Infrastructure

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Hydrogen Infrastructure Widespread Hydrogen Fueling Infrastructure Is the Goal of H2FIRST Project On June 4, 2014, in Capabilities, Center for Infrastructure Research and...

  7. Sandia Energy - Water Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Infrastructure Security Home Climate & Earth Systems WaterEnergy Nexus Decision Models for Integrating EnergyWater Water Infrastructure Security Water Infrastructure...

  8. Security Informatics Research Challenges for Mitigating Cyber Friendly Fire

    SciTech Connect (OSTI)

    Carroll, Thomas E.; Greitzer, Frank L.; Roberts, Adam D.

    2014-09-30T23:59:59.000Z

    This paper addresses cognitive implications and research needs surrounding the problem of cyber friendly re (FF). We dene cyber FF as intentional o*ensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintentionally harms the mission e*ectiveness of friendly or neutral forces. We describe examples of cyber FF and discuss how it ts within a general conceptual framework for cyber security failures. Because it involves human failure, cyber FF may be considered to belong to a sub-class of cyber security failures characterized as unintentional insider threats. Cyber FF is closely related to combat friendly re in that maintaining situation awareness (SA) is paramount to avoiding unintended consequences. Cyber SA concerns knowledge of a system's topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system and its nodes, the nature of the activities or work performed, and the available defensive and o*ensive countermeasures that may be applied to thwart network attacks. We describe a test bed designed to support empirical research on factors a*ecting cyber FF. Finally, we discuss mitigation strategies to combat cyber FF, including both training concepts and suggestions for decision aids and visualization approaches.

  9. Naval Postgraduate School Cyber Academic Group Graduation Checklist for MS Cyber Systems and Operations (CSO) Degree

    E-Print Network [OSTI]

    Environment (3-2) ________ ___CY4700 Cyber Wargame: Blue Force Operations (2-5) ________ ___CY4710 Cyber Planned Qtr ___NW3230 Strategy & Policy (4-2) ________ ___NW3275 Joint Maritime Operations Part 1 (4-0) ________ ___NW3276 Joint Maritime Operations Part 2 (2-2) ________ ___NW3285 National Security Decision Making (4

  10. Naval Postgraduate School Cyber Academic Group Graduation Checklist for MS Cyber Systems and Operations (CSO) Degree

    E-Print Network [OSTI]

    Environment (3-2) ________ ___CY4700 Cyber Wargame: Blue Force Operations (2-5) ________ ___CY4710 Cyber Strategy & Policy (4-2) ________ ___NW3275 Joint Maritime Operations Part 1 (4-0) ________ ___NW3276 Joint and Operations (CSO) Degree 6208P Subspecialty Code (Effective for students commencing Fall AY11 to Winter AY13

  11. Cyber Friendly Fire: Research Challenges for Security Informatics

    SciTech Connect (OSTI)

    Greitzer, Frank L.; Carroll, Thomas E.; Roberts, Adam D.

    2013-06-06T23:59:59.000Z

    This paper addresses cognitive implications and research needs surrounding the problem of cyber friendly fire (FF). We define cyber FF as intentional offensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintention-ally harms the mission effectiveness of friendly or neutral forces. Just as with combat friendly fire, maintaining situation awareness (SA) is paramount to avoiding cyber FF incidents. Cyber SA concerns knowledge of a system’s topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system and its nodes, the nature of the activities or work performed, and the available defensive and offensive countermeasures that may be applied to thwart network attacks. Mitigation strategies to combat cyber FF— including both training concepts and suggestions for decision aids and visualization approaches—are discussed.

  12. Cyber Security Audit and Attack Detection Toolkit: National SCADA...

    Energy Savers [EERE]

    Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber...

  13. cyber

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved:AdministrationAnalysisDarby Dietrich5 |0/%2A en6/%2A en2/%2A en8/%2A

  14. Mission Assurance and Cyber Security

    E-Print Network [OSTI]

    Memphis, University of

    , IPSes, TLS ZigBee X10 Wifi Smart Meter SubstationDistribution FAN/AMI Field Area Network SAN Substation assets Take action by remapping our business processes What is your attack surface look like? What threats ride on the ubiquitous attack surfaces of our infrastructure) #12;mccuskero@sonalysts.com 16 What

  15. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    critical infrastructure systems, such as electric powerinfrastructures, for e.g. , the next generation electric power

  16. Public Works Transportation Infrastructure Study

    E-Print Network [OSTI]

    Minnesota, University of

    Public Works Transportation Infrastructure Study Minneapolis City of Lakes Minneapolis Public Works Transportation Infrastructure Study #12;Public Works Transportation Infrastructure Study Minneapolis City Works Transportation Infrastructure Study Minneapolis City of Lakes Background: · Currently, funding

  17. Hydrogen Fueling Systems and Infrastructure

    E-Print Network [OSTI]

    ;Projects Hydrogen Infrastructure Development · Turnkey Commercial Hydrogen Fueling Station · Autothermal

  18. INSTITUTE FOR CYBER SECURITY Application-Centric Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

  19. INSTITUTE FOR CYBER SECURITY The PEI Framework for

    E-Print Network [OSTI]

    Sandhu, Ravi

    not the right decision for securing distributed systems © Ravi Sandhu 5 #12;INSTITUTE FOR CYBER SECURITY PostINSTITUTE FOR CYBER SECURITY 1 The PEI Framework for Application-Centric Security Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio May

  20. Mathematical and Statistical Opportunities in Cyber Security Scott Campbell

    E-Print Network [OSTI]

    Bailey, David H.

    Mathematical and Statistical Opportunities in Cyber Security Juan Meza Scott Campbell David Bailey problems exist within cyber security research that can be helped by advanced mathematics and statistics large and complex systems like the Internet. Our second assumption is that many proposed cyber security

  1. INSTITUTE FOR CYBER SECURITY A Hybrid Enforcement Model for

    E-Print Network [OSTI]

    Sandhu, Ravi

    -leading research with real-world impact! #12;INSTITUTE FOR CYBER SECURITY Super vs Micro-distribution in g-SIS 8INSTITUTE FOR CYBER SECURITY A Hybrid Enforcement Model for Group-Centric Secure Information Executive Director and Endowed Professor Institute for Cyber Security University of Texas at San Antonio

  2. Developing a Power Measurement Framework for Cyber Defense

    E-Print Network [OSTI]

    Pouchard, Line

    substations and hydroelectric facilities is a normal part of guerilla warfare [3]. Cyber attack of EDS systems, they have become more vulnerable to cyber-attacks as well. As part of a systems health monitoring approach, Experimentation, Security. Keywords Energy Delivery Systems, malware, rootkits, cyber-attacks, Power Distribution

  3. A Mathematical Framework for the Analysis of Cyber-Resilient Control Systems

    SciTech Connect (OSTI)

    Melin, Alexander M [ORNL; Ferragut, Erik M [ORNL; Laska, Jason A [ORNL; Fugate, David L [ORNL; Kisner, Roger [ORNL

    2013-01-01T23:59:59.000Z

    The increasingly recognized vulnerability of industrial control systems to cyber-attacks has inspired a considerable amount of research into techniques for cyber-resilient control systems. The majority of this effort involves the application of well known information security (IT) techniques to control system networks. While these efforts are important to protect the control systems that operate critical infrastructure, they are never perfectly effective. Little research has focused on the design of closed-loop dynamics that are resilient to cyber-attack. The majority of control system protection measures are concerned with how to prevent unauthorized access and protect data integrity. We believe that the ability to analyze how an attacker can effect the closed loop dynamics of a control system configuration once they have access is just as important to the overall security of a control system. To begin to analyze this problem, consistent mathematical definitions of concepts within resilient control need to be established so that a mathematical analysis of the vulnerabilities and resiliencies of a particular control system design methodology and configuration can be made. In this paper, we propose rigorous definitions for state awareness, operational normalcy, and resiliency as they relate to control systems. We will also discuss some mathematical consequences that arise from the proposed definitions. The goal is to begin to develop a mathematical framework and testable conditions for resiliency that can be used to build a sound theoretical foundation for resilient control research.

  4. Parallel digital forensics infrastructure.

    SciTech Connect (OSTI)

    Liebrock, Lorie M. (New Mexico Tech, Socorro, NM); Duggan, David Patrick

    2009-10-01T23:59:59.000Z

    This report documents the architecture and implementation of a Parallel Digital Forensics infrastructure. This infrastructure is necessary for supporting the design, implementation, and testing of new classes of parallel digital forensics tools. Digital Forensics has become extremely difficult with data sets of one terabyte and larger. The only way to overcome the processing time of these large sets is to identify and develop new parallel algorithms for performing the analysis. To support algorithm research, a flexible base infrastructure is required. A candidate architecture for this base infrastructure was designed, instantiated, and tested by this project, in collaboration with New Mexico Tech. Previous infrastructures were not designed and built specifically for the development and testing of parallel algorithms. With the size of forensics data sets only expected to increase significantly, this type of infrastructure support is necessary for continued research in parallel digital forensics. This report documents the implementation of the parallel digital forensics (PDF) infrastructure architecture and implementation.

  5. Embracing the Cloud for Better Cyber Security

    SciTech Connect (OSTI)

    Shue, Craig A [ORNL; Lagesse, Brent J [ORNL

    2011-01-01T23:59:59.000Z

    The future of cyber security is inextricably tied to the future of computing. Organizational needs and economic factors will drive computing outcomes. Cyber security researchers and practitioners must recognize the path of computing evolution and position themselves to influence the process to incorporate security as an inherent property. The best way to predict future computing trends is to look at recent developments and their motivations. Organizations are moving towards outsourcing their data storage, computation, and even user desktop environments. This trend toward cloud computing has a direct impact on cyber security: rather than securing user machines, preventing malware access, and managing removable media, a cloud-based security scheme must focus on enabling secure communication with remote systems. This change in approach will have profound implications for cyber security research efforts. In this work, we highlight existing and emerging technologies and the limitations of cloud computing systems. We then discuss the cyber security efforts that would support these applications. Finally, we discuss the implications of these computing architecture changes, in particular with respect to malware and social engineering.

  6. Quantifying Availability in SCADA Environments Using the Cyber Security Metric MFC

    SciTech Connect (OSTI)

    Aissa, Anis Ben [Université de Tunis El Manar, Tunisia; Rabai, Latifa Ben Arfa [Université de Tunis, Tunisia; Abercrombie, Robert K [ORNL; Sheldon, Frederick T [ORNL; Mili, Ali [New Jersey Insitute of Technology

    2014-01-01T23:59:59.000Z

    Supervisory Control and Data Acquisition (SCADA) systems are distributed networks dispersed over large geographic areas that aim to monitor and control industrial processes from remote areas and/or a centralized location. They are used in the management of critical infrastructures such as electric power generation, transmission and distribution, water and sewage, manufacturing/industrial manufacturing as well as oil and gas production. The availability of SCADA systems is tantamount to assuring safety, security and profitability. SCADA systems are the backbone of the national cyber-physical critical infrastructure. Herein, we explore the definition and quantification of an econometric measure of availability, as it applies to SCADA systems; our metric is a specialization of the generic measure of mean failure cost.

  7. Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues

    SciTech Connect (OSTI)

    Wayne F. Boyer; Scott A. McBride

    2009-04-01T23:59:59.000Z

    This document provides information for a report to congress on Smart Grid security as required by Section 1309 of Title XIII of the Energy Independence and Security Act of 2007. The security of any future Smart Grid is dependent on successfully addressing the cyber security issues associated with the nation’s current power grid. Smart Grid will utilize numerous legacy systems and technologies that are currently installed. Therefore, known vulnerabilities in these legacy systems must be remediated and associated risks mitigated in order to increase the security and success of the Smart Grid. The implementation of Smart Grid will include the deployment of many new technologies and multiple communication infrastructures. This report describes the main technologies that support Smart Grid and summarizes the status of implementation into the existing U.S. electrical infrastructure.

  8. Sandia Energy - Cyber Engineering Research Laboratory (CERL)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Scienceand RequirementsCoatings Initiated at PNNL's SequimReactors To ReceiveCyber HomeCyber

  9. Cyber safety : a systems thinking and systems theory approach to managing cyber security risks

    E-Print Network [OSTI]

    Salim, Hamid M

    2014-01-01T23:59:59.000Z

    If we are to manage cyber security risks more effectively in today's complex and dynamic Web 2.0 environment, then a new way of thinking is needed to complement traditional approaches. According to Symantec's 2014 Internet ...

  10. Hydrogen Transition Infrastructure Analysis

    SciTech Connect (OSTI)

    Melendez, M.; Milbrandt, A.

    2005-05-01T23:59:59.000Z

    Presentation for the 2005 U.S. Department of Energy Hydrogen Program review analyzes the hydrogen infrastructure needed to accommodate a transitional hydrogen fuel cell vehicle demand.

  11. Hydrogen Production Infrastructure Options Analysis | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Infrastructure Options Analysis Hydrogen Production Infrastructure Options Analysis Presentation on hydrogen production and infrastructure options presented at the DOE Transition...

  12. Real-Time SCADA Cyber Protection Using Compression Techniques

    SciTech Connect (OSTI)

    Lyle G. Roybal; Gordon H Rueff

    2013-11-01T23:59:59.000Z

    The Department of Energy’s Office of Electricity Delivery and Energy Reliability (DOE-OE) has a critical mission to secure the energy infrastructure from cyber attack. Through DOE-OE’s Cybersecurity for Energy Delivery Systems (CEDS) program, the Idaho National Laboratory (INL) has developed a method to detect malicious traffic on Supervisory, Control, and Data Acquisition (SCADA) network using a data compression technique. SCADA network traffic is often repetitive with only minor differences between packets. Research performed at the INL showed that SCADA network traffic has traits desirable for using compression analysis to identify abnormal network traffic. An open source implementation of a Lempel-Ziv-Welch (LZW) lossless data compression algorithm was used to compress and analyze surrogate SCADA traffic. Infected SCADA traffic was found to have statistically significant differences in compression when compared against normal SCADA traffic at the packet level. The initial analyses and results are clearly able to identify malicious network traffic from normal traffic at the packet level with a very high confidence level across multiple ports and traffic streams. Statistical differentiation between infected and normal traffic level was possible using a modified data compression technique at the 99% probability level for all data analyzed. However, the conditions tested were rather limited in scope and need to be expanded into more realistic simulations of hacking events using techniques and approaches that are better representative of a real-world attack on a SCADA system. Nonetheless, the use of compression techniques to identify malicious traffic on SCADA networks in real time appears to have significant merit for infrastructure protection.

  13. Cyber Center Highlights Mission: Advancing computing research and enabling science and engineering through cyber infrastructure is the

    E-Print Network [OSTI]

    Holland, Jeffrey

    . The Computing Research Institute (CRI) held its second successful Purdue-Industry High Performance Computing

  14. rtino is prof of Cyber Ce

    E-Print Network [OSTI]

    Holland, Jeffrey

    Program Technolo Worksho Bertino is Compute systems Compute to secure rtino is prof of Cyber Ce internatio Database Indexing Intelligen Services the Very on the e Security& on Web, Program VLDB, A Data Eng distributed fessor of Co enter and R nce and Se mputer Scien EC laborator maden) in S ers Universi arch

  15. MODELING SECURITY IN CYBER-PHYSICAL SYSTEMS

    E-Print Network [OSTI]

    Burmester, Mike

    network at the Davis-Besse nuclear power plant in Oak Harbor, Ohio, was infected [39]. There have been the behavior of the adversary is controlled by a threat model that captures both the cyber aspects (with-physical systems, threat models, protocols for treaty verification. 1. Introduction The rapid growth of information

  16. Department of Energy Cyber Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2012-12-06T23:59:59.000Z

    Modifications correct changes to the composition of Senior DOE Management organizations, name change from DOE Cyber Incident Response Capability to Joint Cybersecurity Coordination Center and transfer of responsibility for communications security and TEMPEST to the Office of Health, Safety and Security.

  17. Department of Energy Cyber Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-05-16T23:59:59.000Z

    The order sets forth requirements and responsibilities for a Departmental Cyber Security Program. Cancels DOE O 205.1A, DOE M 205.1-4, DOE M 205.1-5, DOE M 205.1-6, DOE M 205.1-7 and DOE M 205.1-8

  18. Department of Energy Cyber Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-05-16T23:59:59.000Z

    The order sets forth requirements and responsibilities for a Departmental Cyber Security Program (CSP) that protects information and information systems for the Department of Energy (DOE). Chg 1 dated 12-7-2012; Chg 2 dated 3-11-2013; Chg 3, dated 4-29-2014, cancels Chg 2.

  19. Foreign National Access to DOE Cyber Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-11-01T23:59:59.000Z

    DOE N 205.16, dated 9-15-05, extends this Notice until 9-30-06, unless sooner rescinded. To ensure foreign national access to DOE cyber systems continues to advance DOE program objectives while enforcing information access restrictions.

  20. Cyber-T web server: differential analysis of high-throughput data

    E-Print Network [OSTI]

    Kayala, M. A; Baldi, P.

    2012-01-01T23:59:59.000Z

    10.1093/nar/gks420 Cyber-T web server: differential analysisin the Cyber-T web server, is one of the most widelyan update to the Cyber-T web server, incorporating several

  1. Norwich University Applied Research Institutes Cyber Security Education/Training and Exercises

    E-Print Network [OSTI]

    Dasgupta, Dipankar

    Training Emergency Management for IT Professionals Cyber Security Exercise Development Tools ­ Cyber Smart for cybersecurity event response #12;Cyber Exercising · What is unique about cybersecurity? · More akin to Warfare

  2. Global Infrastructures Abstract/Summary

    E-Print Network [OSTI]

    Sahay, Sundeep

    facilities, electricity supply, state of the physical building etc. The socioeconomic and geopolitical in large hospitals (and other corporate infrastructures) and infrastructures supporting the governance the practical development of infrastructures supporting the governance of the health care sector in developing

  3. ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber...

    Energy Savers [EERE]

    Utilities Form Consortium to Fund SCADAEMS Cyber Security Assessment at National SCADA Test Bed ABB and Energy Utilities Form Consortium to Fund SCADAEMS Cyber Security...

  4. Sandia Energy - Resilient Electric Infrastructures

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Resilient Electric Infrastructures Home Stationary Power Grid Modernization Resilient Electric Infrastructures Resilient Electric Infrastructuresashoter2015-04-29T22:16:42+00:00...

  5. Hydrogen Delivery Infrastructure Option Analysis

    Broader source: Energy.gov (indexed) [DOE]

    Infrastructure Hydrogen Delivery Infrastructure Option Analysis Option Analysis DOE and FreedomCAR & Fuel Partnership Hydrogen Delivery and On-Board Storage Analysis Workshop...

  6. Cyber Security Requirements for Wireless Devices and Information Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-11T23:59:59.000Z

    The Notice establishes DOE policy requirements and responsibilities for using wireless networks and devices within DOE and implements the requirements of DOE 0 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, including requirements for cyber resource protection, risk management, program evaluation, and cyber security plan development and maintenance. No cancellation. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

  7. 7 Key Challenges for Visualization in Cyber Network Defense

    SciTech Connect (OSTI)

    Best, Daniel M.; Endert, Alexander; Kidwell, Dan

    2014-12-02T23:59:59.000Z

    In this paper we present seven challenges, informed by two user studies, to be considered when developing a visualization for cyber security purposes. Cyber security visualizations must go beyond isolated solutions and “pretty picture” visualizations in order to make impact to users. We provide an example prototype that addresses the challenges with a description of how they are met. Our aim is to assist in increasing utility and adoption rates for visualization capabilities in cyber security.

  8. Microsoft Word - Cyber Effects Analysis Using VCSE 09.doc

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Unlimited Release Printed September 2008 Cyber Effects Analysis Using VCSE Promoting Control System Reliability Michael J. McDonald, Gregory N. Conrad, Travis C. Service, Regis...

  9. Lessons Learned from Cyber Security Assessments of SCADA and...

    Broader source: Energy.gov (indexed) [DOE]

    Department of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB September 2006 LESSONS LEARNED FROM CYBER...

  10. Obama's Call for Public-Private Cyber Security Collaboration...

    Office of Environmental Management (EM)

    companies, equipment vendors, and government agencies to create a Control Systems Roadmap to secure the sector's computer control systems against cyber attack. As a result of...

  11. The NIAC Convergence of Physical and Cyber Technbologies and...

    Energy Savers [EERE]

    and cyber technologies for Supervisory Control and Data Acquisition (SCADA) and process control systems and their consolidated network management. The Working Group convened a...

  12. Lessons Learned from Cyber Security Assessments of SCADA and...

    Energy Savers [EERE]

    Energy Management Systems Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems were reviewed to identify common...

  13. Cyber Security Audit and Attack Detection Toolkit: Bandolier...

    Broader source: Energy.gov (indexed) [DOE]

    This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection...

  14. IPHE Infrastructure Workshop Proceedings

    Fuel Cell Technologies Publication and Product Library (EERE)

    This proceedings contains information from the IPHE Infrastructure Workshop, a two-day interactive workshop held on February 25-26, 2010, to explore the market implementation needs for hydrogen fuelin

  15. MFC Communications Infrastructure Study

    SciTech Connect (OSTI)

    Michael Cannon; Terry Barney; Gary Cook; George Danklefsen, Jr.; Paul Fairbourn; Susan Gihring; Lisa Stearns

    2012-01-01T23:59:59.000Z

    Unprecedented growth of required telecommunications services and telecommunications applications change the way the INL does business today. High speed connectivity compiled with a high demand for telephony and network services requires a robust communications infrastructure.   The current state of the MFC communication infrastructure limits growth opportunities of current and future communication infrastructure services. This limitation is largely due to equipment capacity issues, aging cabling infrastructure (external/internal fiber and copper cable) and inadequate space for telecommunication equipment. While some communication infrastructure improvements have been implemented over time projects, it has been completed without a clear overall plan and technology standard.   This document identifies critical deficiencies with the current state of the communication infrastructure in operation at the MFC facilities and provides an analysis to identify needs and deficiencies to be addressed in order to achieve target architectural standards as defined in STD-170. The intent of STD-170 is to provide a robust, flexible, long-term solution to make communications capabilities align with the INL mission and fit the various programmatic growth and expansion needs.

  16. Department of Energy Cyber Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-05-16T23:59:59.000Z

    The order sets forth requirements and responsibilities for a Departmental Cyber Security Program that protects information and information systems for DOE. Cancels DOE O 205.1A, DOE M 205.1-4, DOE M 205.1-5, DOE M 205.1-6, DOE M 205.1-7 and DOE M 205.1-8. Admin Chg 1, dated 12-7-2012.

  17. Department of Energy Cyber Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-05-16T23:59:59.000Z

    The order sets forth requirements and responsibilities for a Departmental Cyber Security Program that protects information and information systems for DOE. Cancels DOE O 205.1A, DOE M 205.1-4, DOE M 205.1-5, DOE M 205.1-6, DOE M 205.1-7 and DOE M 205.1-8. Admin Chg 1, dated 12-7-2012; Chg 2, dated 3-11-13.

  18. Cyber Security Requirements for Risk Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19T23:59:59.000Z

    The Notice ensures that system owners consistently assess the threats to and vulnerabilities of systems in order to implement adequate security controls. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

  19. Designing and Operating Through Compromise: Architectural Analysis of CKMS for the Advanced Metering Infrastructure

    SciTech Connect (OSTI)

    Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC; Aldridge, Hal [ORNL] [ORNL; Abercrombie, Robert K [ORNL] [ORNL; Sheldon, Frederick T [ORNL] [ORNL

    2013-01-01T23:59:59.000Z

    Compromises attributable to the Advanced Persistent Threat (APT) highlight the necessity for constant vigilance. The APT provides a new perspective on security metrics (e.g., statistics based cyber security) and quantitative risk assessments. We consider design principals and models/tools that provide high assurance for energy delivery systems (EDS) operations regardless of the state of compromise. Cryptographic keys must be securely exchanged, then held and protected on either end of a communications link. This is challenging for a utility with numerous substations that must secure the intelligent electronic devices (IEDs) that may comprise complex control system of systems. For example, distribution and management of keys among the millions of intelligent meters within the Advanced Metering Infrastructure (AMI) is being implemented as part of the National Smart Grid initiative. Without a means for a secure cryptographic key management system (CKMS) no cryptographic solution can be widely deployed to protect the EDS infrastructure from cyber-attack. We consider 1) how security modeling is applied to key management and cyber security concerns on a continuous basis from design through operation, 2) how trusted models and key management architectures greatly impact failure scenarios, and 3) how hardware-enabled trust is a critical element to detecting, surviving, and recovering from attack.

  20. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    buildings and smart structures portend immense datavehicles and buildings equipped with smart meters). Thebuilding’s occupants). The operating systems of upcoming infrastructures such as smart

  1. Towards Efficient Collaboration in Cyber Security

    SciTech Connect (OSTI)

    Hui, Peter SY; Bruce, Joseph R.; Fink, Glenn A.; Gregory, Michelle L.; Best, Daniel M.; McGrath, Liam R.; Endert, Alexander

    2010-06-03T23:59:59.000Z

    Cyber security analysts in different geographical and organizational domains are often largely tasked with similar duties, albeit with domain-specific variations. These analysts necessarily perform much of the same work independently— for instance, analyzing the same list of security bulletins released by largely the same set of software vendors. As such, communication and collaboration between such analysts would be mutually beneficial to the analysts involved, potentially reducing redundancy and offering the opportunity to preemptively alert each other to high-severity security alerts in a more timely fashion. However, several barriers to practical and efficient collaboration exist, and as such, no such framework exists to support such efforts. In this paper, we discuss the inherent difficulties which make efficient collaboration between cyber security analysts a difficult goal to achieve. We discuss preliminary ideas and concepts towards a collaborative cyber-security framework currently under development, whose goal is to facilitate analyst collaboration across these boundaries. While still in its early stages, we describe work-in-progress towards achieving this goal, including motivation, functionality, concepts, and a high-level description of the proposed system architecture.

  2. On Cyber Security for Networked Control Systems Saurabh Amin

    E-Print Network [OSTI]

    random failures and secu- rity attacks. Cyber-security of Supervisory Control and Data Acquisition (SCADA, cyber-security assessment for SCADA systems is performed based on well-defined attacker and defender objectives. The mathematical model of SCADA systems considered in this work has two control levels

  3. COST FUNCTIONS FOR SCHEDULING TASKS IN CYBER-PHYSICAL SYSTEMS

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    COST FUNCTIONS FOR SCHEDULING TASKS IN CYBER-PHYSICAL SYSTEMS Abhinna Jain, C.M. Krishna, Israel, cost functions, controlled plant dynamics Abstract: In Cyber Physical Systems (CPS), computational response times are different. In this paper, we consider using cost functions of task response time

  4. Cyber Threat Trees for Large System Threat Cataloging and Analysis*

    E-Print Network [OSTI]

    Thornton, Mitchell

    Cyber Threat Trees for Large System Threat Cataloging and Analysis* P. Ongsakorn, K. Turney, M, kturney, mitch, nair, szygenda, manikas}@lyle.smu.edu Abstract--The implementation of cyber threat. Because large systems have many possible threats that may be interdependent, it is crucial

  5. Attack Detection and Identification in Cyber-Physical Systems

    E-Print Network [OSTI]

    Bullo, Francesco

    Attack Detection and Identification in Cyber-Physical Systems Fabio Pasqualetti, Florian D of unforeseen failures and external malicious attacks. In this paper (i) we propose a mathematical framework for cyber- physical systems, attacks, and monitors; (ii) we characterize fundamental monitoring limitations

  6. Deception used for Cyber Defense of Control Systems

    SciTech Connect (OSTI)

    Wayne F. Boyer; Miles A. McQueen

    2009-05-01T23:59:59.000Z

    Control system cyber security defense mechanisms may employ deception to make it more difficult for attackers to plan and execute successful attacks. These deceptive defense mechanisms are organized and initially explored according to a specific deception taxonomy and the seven abstract dimensions of security previously proposed as a framework for the cyber security of control systems.

  7. October 2014 Mid-South Cyber Security Summit

    E-Print Network [OSTI]

    Dasgupta, Dipankar

    government, industry, and academia. *Source: FCW citation: http://fcw.com/articles/2011/11/10/cybersecurity-workforce-planOctober 2014 Mid-South Cyber Security Summit Achieving Cybersecurity Excellence Through Evolution of the Nation's Cyber Workforce Benjamin Scribner Department of Homeland Security (DHS) National Cybersecurity

  8. Cyber-security Research Ethics Dialogue & Strategy Erin Kenneally

    E-Print Network [OSTI]

    California at San Diego, University of

    Cyber-security Research Ethics Dialogue & Strategy Workshop Erin Kenneally CAIDA/UC, San Diego La The inaugural Cyber-security Research Ethics Dialogue & Strat- egy Workshop was held on May 23, 2013, in the wake of struggles to resolve the aforementioned mounting tensions, ethics has re-emerged as a crucial

  9. Small-Scale Cyber Security Competitions Mike O'Leary

    E-Print Network [OSTI]

    O'Leary, Michael

    Small-Scale Cyber Security Competitions Mike O'Leary Towson University 16th Colloquium for Information Systems Security Education Orlando, FL June 11-13, 2012 M. O'Leary (Towson University) Small the Flag Competition M. O'Leary (Towson University) Small-Scale Cyber Security Competitions CISSE 2012 2

  10. Toward a Cyber-Physical Topology Language: Applications to NERC CIP Audit

    E-Print Network [OSTI]

    Sanders, William H.

    . For example, the NISTIR Guidelines for Smart-Grid Cyber Security state that "increasing the complexity

  11. LNG infrastructure and equipment

    SciTech Connect (OSTI)

    Forgash, D.J.

    1995-12-31T23:59:59.000Z

    Sound engineering principals have been used by every company involved in the development of the LNG infrastructure, but there is very little that is new. The same cryogenic technology that is used in the manufacture and sale of nitrogen, argon, and oxygen infrastructure is used in LNG infrastructure. The key component of the refueling infrastructure is the LNG tank which should have a capacity of at least 15,000 gallons. These stainless steel tanks are actually a tank within a tank separated by an annular space that is void of air creating a vacuum between the inner and outer tank where superinsulation is applied. Dispensing can be accomplished by pressure or pump. Either works well and has been demonstrated in the field. Until work is complete on NFPA 57 or The Texas Railroad Commission Rules for LNG are complete, the industry is setting the standards for the safe installation of refueling infrastructure. As a new industry, the safety record to date has been outstanding.

  12. Protecting Accelerator Control Systems in the Face of Sophisticated Cyber Attacks

    SciTech Connect (OSTI)

    Hartman, Steven M [ORNL] [ORNL

    2012-01-01T23:59:59.000Z

    Cyber security for industrial control systems has received significant attention in the past two years. The news coverage of the Stuxnet attack, believed to be targeted at the control system for a uranium enrichment plant, brought the issue to the attention of news media and policy makers. This has led to increased scrutiny of control systems for critical infrastructure such as power generation and distribution, and industrial systems such as chemical plants and petroleum refineries. The past two years have also seen targeted network attacks aimed at corporate and government entities including US Department of Energy National Laboratories. Both of these developments have potential repercussions for the control systems of particle accelerators. The need to balance risks from potential attacks with the operational needs of an accelerator present a unique challenge for the system architecture and access model.

  13. Agent-based Cyber Control Strategy Design for Resilient Control Systems: Concepts, Architecture and Methodologies

    SciTech Connect (OSTI)

    Craig Rieger; Milos Manic; Miles McQueen

    2012-08-01T23:59:59.000Z

    The implementation of automated regulatory control has been around since the middle of the last century through analog means. It has allowed engineers to operate the plant more consistently by focusing on overall operations and settings instead of individual monitoring of local instruments (inside and outside of a control room). A similar approach is proposed for cyber security, where current border-protection designs have been inherited from information technology developments that lack consideration of the high-reliability, high consequence nature of industrial control systems. Instead of an independent development, however, an integrated approach is taken to develop a holistic understanding of performance. This performance takes shape inside a multiagent design, which provides a notional context to model highly decentralized and complex industrial process control systems, the nervous system of critical infrastructure. The resulting strategy will provide a framework for researching solutions to security and unrecognized interdependency concerns with industrial control systems.

  14. Neural Network Based Intrusion Detection System for Critical Infrastructures

    SciTech Connect (OSTI)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01T23:59:59.000Z

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  15. Sandia National Laboratories: Center for Infrastructure Research...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Infrastructure Research and Innovation Widespread Hydrogen Fueling Infrastructure Is the Goal of H2FIRST Project On June 4, 2014, in Capabilities, Center for Infrastructure...

  16. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1846P CustomTraining Sandia providesPRAsandhowtheycanbemanaged to increase levels of safety and security. Like othertrainings,Sandiaexpertsdesigncoursesto beasbroadorin

  17. COLLEGE OF ENGINEERING Infrastructure

    E-Print Network [OSTI]

    solar energy (8). ME Ketul Popat and John Williams in the Department of Mechanical EngineeringCOLLEGE OF ENGINEERING Infrastructure #12;2 COLLEGE OF ENGINEERING This publication focuses on just a few of the incredible College of Engineering faculty and students who are conducting research related

  18. Cyber Train Videos | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisitingContract Management Fermi Site OfficeCoursePublicCurrentCurtis C.Cyber Train

  19. Office of Cyber Assessments | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613 122Commercial602 1,39732onMake YourDepartment ofC T O B EOff-GridCyber Assessments

  20. Sandia Energy - Cyber-Based Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Scienceand RequirementsCoatings Initiated at PNNL's SequimReactors To ReceiveCyber

  1. Cyber Security Through Science | More Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power Administration would likeConstitution4Customer-Comments Sign In About |Cyber Security SHARE

  2. Cyber Train Complete Training | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power Administration would likeConstitution4Customer-Comments Sign In About |Cyber

  3. Cyber Train Overview | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power Administration would likeConstitution4Customer-Comments Sign In About |Cyber

  4. Tom Harper receives cyber security award

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening a solidSynthesisAppliances Tips:Harper receives cyber security

  5. Microsoft Word - Critical Infrastructure Security and Resilience...

    Broader source: Energy.gov (indexed) [DOE]

    our defenses against physical and cyber incidents. In tandem with my Executive Order on cybersecurity, this directive strengthens information sharing within my Administration and...

  6. Modeling Cyber Conflicts Using an Extended Petri Net Formalism

    SciTech Connect (OSTI)

    Zakrzewska, Anita N [ORNL; Ferragut, Erik M [ORNL

    2011-01-01T23:59:59.000Z

    When threatened by automated attacks, critical systems that require human-controlled responses have difficulty making optimal responses and adapting protections in real- time and may therefore be overwhelmed. Consequently, experts have called for the development of automatic real-time reaction capabilities. However, a technical gap exists in the modeling and analysis of cyber conflicts to automatically understand the repercussions of responses. There is a need for modeling cyber assets that accounts for concurrent behavior, incomplete information, and payoff functions. Furthermore, we address this need by extending the Petri net formalism to allow real-time cyber conflicts to be modeled in a way that is expressive and concise. This formalism includes transitions controlled by players as well as firing rates attached to transitions. This allows us to model both player actions and factors that are beyond the control of players in real-time. We show that our formalism is able to represent situational aware- ness, concurrent actions, incomplete information and objective functions. These factors make it well-suited to modeling cyber conflicts in a way that allows for useful analysis. MITRE has compiled the Common Attack Pattern Enumera- tion and Classification (CAPEC), an extensive list of cyber attacks at various levels of abstraction. CAPEC includes factors such as attack prerequisites, possible countermeasures, and attack goals. These elements are vital to understanding cyber attacks and to generating the corresponding real-time responses. We demonstrate that the formalism can be used to extract precise models of cyber attacks from CAPEC. Several case studies show that our Petri net formalism is more expressive than other models, such as attack graphs, for modeling cyber conflicts and that it is amenable to exploring cyber strategies.

  7. In Situ Nuclear Characterization Infrastructure

    SciTech Connect (OSTI)

    James A. Smith; J. Rory Kennedy

    2011-11-01T23:59:59.000Z

    To be able to evolve microstructure with a prescribed in situ process, an effective measurement infrastructure must exist. This interdisciplinary infrastructure needs to be developed in parallel with in situ sensor technology. This paper discusses the essential elements in an effective infrastructure.

  8. INFRASTRUCTURE Engineering and Physical Sciences

    E-Print Network [OSTI]

    Berzins, M.

    the vital research that underpins this development. The UK Government Strategy for National Infrastructure and resilient infrastructure supplying water, energy, communications, transport systems and waste systems. Infrastructure is a broad topic and is relevant to other sectors including Healthcare, Renewable and Clean Energy

  9. Primer Control System Cyber Security Framework and Technical Metrics

    SciTech Connect (OSTI)

    Wayne F. Boyer; Miles A. McQueen

    2008-05-01T23:59:59.000Z

    The Department of Homeland Security National Cyber Security Division supported development of a control system cyber security framework and a set of technical metrics to aid owner-operators in tracking control systems security. The framework defines seven relevant cyber security dimensions and provides the foundation for thinking about control system security. Based on the developed security framework, a set of ten technical metrics are recommended that allow control systems owner-operators to track improvements or degradations in their individual control systems security posture.

  10. Critical Infrastructure Modeling: An Approach to Characterizing Interdependencies of Complex Networks & Control Systems

    SciTech Connect (OSTI)

    Stuart Walsh; Shane Cherry; Lyle Roybal

    2009-05-01T23:59:59.000Z

    Critical infrastructure control systems face many challenges entering the 21st century, including natural disasters, cyber attacks, and terrorist attacks. Revolutionary change is required to solve many existing issues, including gaining greater situational awareness and resiliency through embedding modeling and advanced control algorithms in smart sensors and control devices instead of in a central controller. To support design, testing, and component analysis, a flexible simulation and modeling capability is needed. Researchers at Idaho National Laboratory are developing and evaluating such a capability through their CIPRsim modeling and simulation framework.

  11. Controlled Hydrogen Fleet and Infrastructure Demonstration and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Controlled Hydrogen Fleet and Infrastructure Demonstration and Validation Project Solicitation Controlled Hydrogen Fleet and Infrastructure Demonstration and Validation Project...

  12. Controlled Hydrogen Fleet and Infrastructure Demonstration and...

    Office of Environmental Management (EM)

    Controlled Hydrogen Fleet and Infrastructure Demonstration and Validation Project Controlled Hydrogen Fleet and Infrastructure Demonstration and Validation Project 2009 DOE...

  13. Electric Drive Vehicle Demonstration and Vehicle Infrastructure...

    Broader source: Energy.gov (indexed) [DOE]

    Utilization Data Base Evaluate Infrastructure Effectiveness Develop Sustainable Business Models Develop Models For Future Infrastructure Deployments Relevance MILESTONES...

  14. Hydrogen Infrastructure Market Readiness Workshop: Preliminary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Workshop: Preliminary Results Hydrogen Infrastructure Market Readiness Workshop: Preliminary Results Preliminary results from the Hydrogen Infrastructure Market Readiness Workshop...

  15. Upcoming Webinar December 16: International Hydrogen Infrastructure...

    Energy Savers [EERE]

    Upcoming Webinar December 16: International Hydrogen Infrastructure Challenges NOW, DOE, and NEDO Upcoming Webinar December 16: International Hydrogen Infrastructure Challenges...

  16. Hybrid Multi-Layer Network Control for Emerging Cyber-Infrastructures

    SciTech Connect (OSTI)

    Summerhill, Richard

    2009-08-14T23:59:59.000Z

    There were four basic task areas identified for the Hybrid-MLN project. They are: o Multi-Layer, Multi-Domain, Control Plane Architecture and Implementation, o Heterogeneous DataPlane Testing, o Simulation, o Project Publications, Reports, and Presentations.

  17. A cyber-infrastructure for the measurement and estimation of large-scale hydrologic processes

    E-Print Network [OSTI]

    Kerkez, Branko

    2012-01-01T23:59:59.000Z

    and B. Spencer (2008), Structural health monitoring sensorFederspiel, 2009] structural health monitoring [Kim et al. ,

  18. A cyber-infrastructure for the measurement and estimation of large-scale hydrologic processes

    E-Print Network [OSTI]

    Kerkez, Branko

    2012-01-01T23:59:59.000Z

    >3.0.CO;2-Z. Das, A. and D. Kempe (2008). Algorithms forin linear models [Das and Kempe, A specific modeled-based

  19. A cyber-infrastructure for the measurement and estimation of large-scale hydrologic processes

    E-Print Network [OSTI]

    Kerkez, Branko

    2012-01-01T23:59:59.000Z

    a worst-case performance indicator, rather than serving as ato derive average indicators of performance. Gathered over abetter, indicator of network performance - an analysis of

  20. Engineering cyber infrastructure for U-Pb geochronology: Tripoli and U-Pb_Redux

    E-Print Network [OSTI]

    Bowring, J.F.; McLean, Noah M.; Bowring, S.A.

    2011-06-24T23:59:59.000Z

    ; uranium lead. Index Terms: 1115 Geochronology: Radioisotope geochronology; 1908 Informatics: Cyberinfrastructure; 1920 Informatics: Emerging informatics technologies. Received 21 December 2010; Revised 23 March 2011; Accepted 5 April 2011; Published 24... including uranium oxides, thallium, and barium phosphate. The filtered data can be exported to U?Pb_Redux or other analytical programs. 2. Motivation [10] Geochemists rely on a variety of data reduction software, ranging from proprietary products included...

  1. Collaborative-Hybrid Multi-Layer Network Control for Emerging Cyber-Infrastructures

    SciTech Connect (OSTI)

    Lehman, Tom [USC] [USC; Ghani, Nasir [UNM] [UNM; Boyd, Eric [UCAID] [UCAID

    2010-08-31T23:59:59.000Z

    At a high level, there were four basic task areas identified for the Hybrid-MLN project. They are: o Multi-Layer, Multi-Domain, Control Plane Architecture and Implementation, including ? OSCARS layer2 and InterDomain Adaptation, ? Integration of LambdaStation and Terapaths with Layer2 dynamic provisioning, ? Control plane software release, ? Scheduling, AAA, security architecture, ? Network Virtualization architecture, ? Multi-Layer Network Architecture Framework Definition; o Heterogeneous DataPlane Testing; o Simulation; o Project Publications, Reports, and Presentations.

  2. A cyber-infrastructure for the measurement and estimation of large-scale hydrologic processes

    E-Print Network [OSTI]

    Kerkez, Branko

    2012-01-01T23:59:59.000Z

    enclosure, batteries and solar panel totaled about $3000.reduced battery size and solar panel requirements, in whichradiation sensor, (8) 10W solar panel, (9) external 8dBi

  3. A cyber-infrastructure for the measurement and estimation of large-scale hydrologic processes

    E-Print Network [OSTI]

    Kerkez, Branko

    2012-01-01T23:59:59.000Z

    Potential Changes in hydropower production from globalirrigation, recreation, hydropower generation, and otheris also generated via hydropower. The major hydrologic

  4. A cyber-infrastructure for the measurement and estimation of large-scale hydrologic processes

    E-Print Network [OSTI]

    Kerkez, Branko

    2012-01-01T23:59:59.000Z

    Wireless systems for industrial automation: Process controltechnologies for industrial automation applications. The

  5. Engineering cyber infrastructure for U-Pb geochronology: Tripoli and U-Pb_Redux

    E-Print Network [OSTI]

    Bowring, J. F.

    In the past decade, major advancements in precision and accuracy of U-Pb geochronology, which stem from improved sample pretreatment and refined measurement techniques, have revealed previously unresolvable discrepancies ...

  6. CYBER SECURITY THREATS TO SAFETY-CRITICAL, SPACE-BASED INFRASTRUCTURES

    E-Print Network [OSTI]

    Johnson, Chris

    into advanced air-traffic management applications, rail signalling systems, energy distribution software etc of a combined safety and security risk assessment methodology. The aim is to identify attack scenarios, the inclusion of a combined safety-security risk based methodology for the identification of attack scenarios

  7. Ruminati : modeling the detection of textual cyber-bullying

    E-Print Network [OSTI]

    Dinakar, Karthik

    2012-01-01T23:59:59.000Z

    The scourge of cyber-bullying has received widespread attention at all levels of society including parents, educators, adolescents, social scientists, psychiatrists and policy makers at the highest echelons of power. ...

  8. Ninth Annual Cyber and Information Security Research Conference...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Ninth Annual Cyber and Information Security Research Conference Apr 08 2014 04-08-2014 08:30 AM - 04-10-2014 04:00 PM Multiple speakers, multiple disciplines, multiple affiliations...

  9. PSERC Webinar Series: Issues in Designing the Future Grid - Cyber...

    Office of Environmental Management (EM)

    Cyber-Physical Systems Security for the Smart Grid - February 7, 2012 PSERC is offering a free, public webinar series from January to May 2012 entitled "Issues in Designing the...

  10. Process Control System Cyber Security Standards - An Overview

    SciTech Connect (OSTI)

    Robert P. Evans

    2006-05-01T23:59:59.000Z

    The use of cyber security standards can greatly assist in the protection of process control systems by providing guidelines and requirements for the implementation of computer-controlled systems. These standards are most effective when the engineers and operators, using the standards, understand what each standard addresses. This paper provides an overview of several standards that deal with the cyber security of process measurements and control systems.

  11. PowerCyber: A Cyber-Physical Security Testbed for Smart Grid PI: Manimaran Govindarasu (gmani@iastate.edu)

    E-Print Network [OSTI]

    Manimaran, Govindarasu

    /Opal-RT, provide ability to simulate large power systems with monitoring, protecIon, control modeling bulk power system for cyber security experimentaIons. powercyber power system wherein, vulnerability analysis, system impact studies, risk assessment

  12. Lecture 13: Control System Cyber Security

    E-Print Network [OSTI]

    CERN. Geneva

    2013-01-01T23:59:59.000Z

    Today, the industralized world lives in symbiosis with control systems: it depends on power distribution, oil production, public transport, automatic production lines. While the convenience is at hand, still too many control systems are designed without any security in mind, lack basic security protections, and are not even robust enough to withstand basic attacks. The Stuxnet worm attacking Siemens PLCs in 2010 was another close call. Attackers currently enjoy hacking control systems, and aim to switch lights off. This presentation shall recap the current situation and outline why the presenter is still waiting for a change in paradigm. Stefan Lüders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadron Collider, he gathered expertise in cyber-security issues of control systems. Consequently in 2004, he took over responsibilities in securing CERN's accelerator and...

  13. CyberSafety: On the Interactions between CyberSecurity and the

    E-Print Network [OSTI]

    Johnson, Chris

    into the infrastructures that support safety-critical systems. These include network management tools, operating systems security concerns. Malware has been detected in power distribution, healthcare, military and transportation infrastructures. Most previous attacks do not seem to have deliberately targeted critical applications. However

  14. Infrastructure Projects | Jefferson Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn Other News link toInfluenceInfrared MappingInfrastructure

  15. Experiences and Challenges with Using Cert Data to Analyze International Cyber Security

    E-Print Network [OSTI]

    Madnick, Stuart

    With the increasing interconnection of computer networks and sophistication of cyber attacks, it is important to understand the dynamics of such situations, especially in regards to cyber international relations. The ...

  16. Anthem Cyber Attack: Information and Call-in Phone Number | Jefferson...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Anthem Cyber Attack: Information and Call-in Phone Number Colleagues, As you may have heard by now, Anthem was the latest victim of a cyber attack. Anthem reports that they were...

  17. Innovative Financing for Green Infrastructure

    Office of Energy Efficiency and Renewable Energy (EERE)

    Topic OverviewFinancing green infrastructure is critical to taking projects from planning to implementation and beyond, including sustaining operations and maintenance. This 90-minute webcast will...

  18. Sandia National Laboratories: Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    regulation, ... Portable Hydrogen Fuel-Cell Unit to Provide Green, Sustainable Power to Honolulu Port On March 13, 2014, in Center for Infrastructure Research and...

  19. Forecourt and Gas Infrastructure Optimization

    Broader source: Energy.gov (indexed) [DOE]

    Forecourt and Gas Infrastructure Optimization Bruce Kelly Nexant, Inc. Hydrogen Delivery Analysis Meeting May 8-9, 2007 Columbia, Maryland 2 Analysis of Market Demand and Supply...

  20. California Hydrogen Infrastructure Project

    SciTech Connect (OSTI)

    Edward C. Heydorn

    2013-03-12T23:59:59.000Z

    Air Products and Chemicals, Inc. has completed a comprehensive, multiyear project to demonstrate a hydrogen infrastructure in California. The specific primary objective of the project was to demonstrate a model of a ���¢��������real-world���¢������� retail hydrogen infrastructure and acquire sufficient data within the project to assess the feasibility of achieving the nation���¢��������s hydrogen infrastructure goals. The project helped to advance hydrogen station technology, including the vehicle-to-station fueling interface, through consumer experiences and feedback. By encompassing a variety of fuel cell vehicles, customer profiles and fueling experiences, this project was able to obtain a complete portrait of real market needs. The project also opened its stations to other qualified vehicle providers at the appropriate time to promote widespread use and gain even broader public understanding of a hydrogen infrastructure. The project engaged major energy companies to provide a fueling experience similar to traditional gasoline station sites to foster public acceptance of hydrogen. Work over the course of the project was focused in multiple areas. With respect to the equipment needed, technical design specifications (including both safety and operational considerations) were written, reviewed, and finalized. After finalizing individual equipment designs, complete station designs were started including process flow diagrams and systems safety reviews. Material quotes were obtained, and in some cases, depending on the project status and the lead time, equipment was placed on order and fabrication began. Consideration was given for expected vehicle usage and station capacity, standard features needed, and the ability to upgrade the station at a later date. In parallel with work on the equipment, discussions were started with various vehicle manufacturers to identify vehicle demand (short- and long-term needs). Discussions included identifying potential areas most suited for hydrogen fueling stations with a focus on safe, convenient, fast-fills. These potential areas were then compared to and overlaid with suitable sites from various energy companies and other potential station operators. Work continues to match vehicle needs with suitable fueling station locations. Once a specific site was identified, the necessary agreements could be completed with the station operator and expected station users. Detailed work could then begin on the site drawings, permits, safety procedures and training needs. Permanent stations were successfully installed in Irvine (delivered liquid hydrogen), Torrance (delivered pipeline hydrogen) and Fountain Valley (renewable hydrogen from anaerobic digester gas). Mobile fueling stations were also deployed to meet short-term fueling needs in Long Beach and Placerville. Once these stations were brought online, infrastructure data was collected and reported to DOE using Air Products���¢�������� Enterprise Remote Access Monitoring system. Feedback from station operators was incorporated to improve the station user���¢��������s fueling experience.

  1. Cyber Security Challenges in Using Cloud Computing in the Electric Utility Industry

    SciTech Connect (OSTI)

    Akyol, Bora A.

    2012-09-01T23:59:59.000Z

    This document contains introductory material that discusses cyber security challenges in using cloud computing in the electric utility industry.

  2. Cyber Security Companies, governments, and consumers depend on secure and reliable

    E-Print Network [OSTI]

    Hill, Wendell T.

    Cyber Security Companies, governments, and consumers depend on secure and reliable computer-speed computers all introduce new cyber-security challenges. Cyber- security researchers at the University in the software development cycle. e also creates secure authentication protocols for vulnerable distributed

  3. Two-Tier Hierarchical Cyber-Physical Security Analysis Framework For Smart Grid

    E-Print Network [OSTI]

    Kundur, Deepa

    Two-Tier Hierarchical Cyber-Physical Security Analysis Framework For Smart Grid Jin Wei and Deepa consequence of cyber and/or physical disruption) using distributed control. In particular, we consider, USA Abstract--We propose a two-tier hierarchical cyber-physical framework for analyzing transient

  4. Cyber-Physical Security via Geometric Control: Distributed Monitoring and Malicious Attacks

    E-Print Network [OSTI]

    Bullo, Francesco

    Cyber-Physical Security via Geometric Control: Distributed Monitoring and Malicious Attacks Fabio and extends our results on the security of cyber-physical systems based on geometric control theory: (i) we, and by various industrial security incidents [6], cyber-physical systems are prone to failures and attacks

  5. Cyber-Physical Systems under Attack Models, Fundamental limitations, and Monitor Design

    E-Print Network [OSTI]

    Hu, Fei

    , FL, Dec 11, 2011 F. Pasqualetti, F. D¨orfler, F. Bullo Cyber-Physical Systems Under Attack Security are cyber-physical systems: power generation and distribution networks water networks and mass-efficient buildings (heat transfer) F. Pasqualetti, F. D¨orfler, F. Bullo Cyber-Physical Systems Under Attack Security

  6. Simulation of PKI-Enabled Communication for Identity Management Using CyberCIEGE

    E-Print Network [OSTI]

    , authentication, provenance, and access control. Keywords-network cyber security; identity management; information environment, players1 are guided through a series of scenarios that highlight various cyber security education colleges. CyberCIEGE was created by the Center for Information Systems Security Studies and Research (CISR

  7. RT-Based Administrative Models for Community Cyber Security Information Sharing

    E-Print Network [OSTI]

    Sandhu, Ravi

    RT-Based Administrative Models for Community Cyber Security Information Sharing Ravi Sandhu, Khalid Zaman Bijon, Xin Jin, and Ram Krishnan Institute for Cyber Security & Department of Computer Science Institute for Cyber Security & Department of Electrical and Computer Engineering University of Texas at San

  8. Towards Efficient Collaboration in Cyber Security Peter Hui Joe Bruce Glenn Fink

    E-Print Network [OSTI]

    . INTRODUCTION Although distributed geographically and often across different organizations, cyber-securityTowards Efficient Collaboration in Cyber Security Peter Hui Joe Bruce Glenn Fink Michelle Gregory University aendert@cs.vt.edu ABSTRACT Cyber security analysts in different geographical and organizational

  9. Distributed Detection of Cyber-Physical Attacks in Power Networks: A Waveform Relaxation Approach

    E-Print Network [OSTI]

    Bullo, Francesco

    Distributed Detection of Cyber-Physical Attacks in Power Networks: A Waveform Relaxation Approach to operate safely and reliably against cyber-physical attacks. The large dimensionality and the difficulty system and cyber- physical attacks as unknown inputs. This modeling framework captures, for instance

  10. Switched System Models for Coordinated Cyber-Physical Attack Construction and Simulation

    E-Print Network [OSTI]

    Kundur, Deepa

    Switched System Models for Coordinated Cyber-Physical Attack Construction and Simulation Shan Liu the need to develop intelligent models of cyber-physical attacks that produce salient disruptions. In this paper, we present a foundation for the development of a class of intelligent cyber-physical attacks

  11. Michigan E85 Infrastructure

    SciTech Connect (OSTI)

    Sandstrom, Matthew M.

    2012-03-30T23:59:59.000Z

    This is the final report for a grant-funded project to financially assist and otherwise provide support to projects that increase E85 infrastructure in Michigan at retail fueling locations. Over the two-year project timeframe, nine E85 and/or flex-fuel pumps were installed around the State of Michigan at locations currently lacking E85 infrastructure. A total of five stations installed the nine pumps, all providing cost share toward the project. By using cost sharing by station partners, the $200,000 provided by the Department of Energy facilitated a total project worth $746,332.85. This project was completed over a two-year timetable (eight quarters). The first quarter of the project focused on project outreach to station owners about the incentive on the installation and/or conversion of E85 compatible fueling equipment including fueling pumps, tanks, and all necessary electrical and plumbing connections. Utilizing Clean Energy Coalition (CEC) extensive knowledge of gasoline/ethanol infrastructure throughout Michigan, CEC strategically placed these pumps in locations to strengthen the broad availability of E85 in Michigan. During the first and second quarters, CEC staff approved projects for funding and secured contracts with station owners; the second through eighth quarters were spent working with fueling station owners to complete projects; the third through eighth quarters included time spent promoting projects; and beginning in the second quarter and running for the duration of the project was spent performing project reporting and evaluation to the US DOE. A total of 9 pumps were installed (four in Elkton, two in Sebewaing, one in East Lansing, one in Howell, and one in Whitmore Lake). At these combined station locations, a total of 192,445 gallons of E85, 10,786 gallons of E50, and 19,159 gallons of E30 were sold in all reporting quarters for 2011. Overall, the project has successfully displaced 162,611 gallons (2,663 barrels) of petroleum, and reduced regional GHG emissions by 375 tons in the first year of station deployment.

  12. Implementing a Hydrogen Energy Infrastructure: Storage Options and System Design

    E-Print Network [OSTI]

    Ogden, Joan M; Yang, Christopher

    2005-01-01T23:59:59.000Z

    Natural Gas Based Hydrogen Infrastructure – Optimizingdevelopment of a hydrogen infrastructure has been identifiedrecent studies of hydrogen infrastructure have assessed

  13. Energy Transmission and Infrastructure

    SciTech Connect (OSTI)

    Mathison, Jane

    2012-12-31T23:59:59.000Z

    The objective of Energy Transmission and Infrastructure Northern Ohio (OH) was to lay the conceptual and analytical foundation for an energy economy in northern Ohio that will: • improve the efficiency with which energy is used in the residential, commercial, industrial, agricultural, and transportation sectors for Oberlin, Ohio as a district-wide model for Congressional District OH-09; • identify the potential to deploy wind and solar technologies and the most effective configuration for the regional energy system (i.e., the ratio of distributed or centralized power generation); • analyze the potential within the district to utilize farm wastes to produce biofuels; • enhance long-term energy security by identifying ways to deploy local resources and building Ohio-based enterprises; • identify the policy, regulatory, and financial barriers impeding development of a new energy system; and • improve energy infrastructure within Congressional District OH-09. This objective of laying the foundation for a renewable energy system in Ohio was achieved through four primary areas of activity: 1. district-wide energy infrastructure assessments and alternative-energy transmission studies; 2. energy infrastructure improvement projects undertaken by American Municipal Power (AMP) affiliates in the northern Ohio communities of Elmore, Oak Harbor, and Wellington; 3. Oberlin, OH-area energy assessment initiatives; and 4. a district-wide conference held in September 2011 to disseminate year-one findings. The grant supported 17 research studies by leading energy, policy, and financial specialists, including studies on: current energy use in the district and the Oberlin area; regional potential for energy generation from renewable sources such as solar power, wind, and farm-waste; energy and transportation strategies for transitioning the City of Oberlin entirely to renewable resources and considering pedestrians, bicyclists, and public transportation as well as drivers in developing transportation policies; energy audits and efficiency studies for Oberlin-area businesses and Oberlin College; identification of barriers to residential energy efficiency and development of programming to remove these barriers; mapping of the solar-photovoltaic and wind-energy supply chains in northwest Ohio; and opportunities for vehicle sharing and collaboration among the ten organizations in Lorain County from the private, government, non-profit, and educational sectors. With non-grant funds, organizations have begun or completed projects that drew on the findings of the studies, including: creation of a residential energy-efficiency program for the Oberlin community; installation of energy-efficient lighting in Oberlin College facilities; and development by the City of Oberlin and Oberlin College of a 2.27 megawatt solar photovoltaic facility that is expected to produce 3,000 megawatt-hours of renewable energy annually, 12% of the College’s yearly power needs. Implementation of these and other projects is evidence of the economic feasibility and technical effectiveness of grant-supported studies, and additional projects are expected to advance to implementation in the coming years. The public has benefited through improved energydelivery systems and reduced energy use for street lighting in Elmore, Oak Harbor, and Wellington; new opportunities for assistance and incentives for residential energy efficiency in the Oberlin community; new opportunities for financial and energy savings through vehicle collaboration within Lorain County; and decreased reliance on fossil fuels and expanded production of renewable energy in the region. The dissemination conference and the summary report developed for the conference also benefited the public, but making the findings and recommendations of the regional studies broadly available to elected officials, city managers, educators, representatives of the private sector, and the general public.

  14. Presented by Petascale System Infrastructure

    E-Print Network [OSTI]

    Presented by Petascale System Infrastructure Galen M. Shipman Group Leader, Technology Integration National Center for Computational Sciences #12;2 Managed by UT-Battelle for the U.S. Department of Energy and analysis cluster #12;3 Managed by UT-Battelle for the U.S. Department of Energy Shipman_Infrastructure_SC10

  15. Cyber Assessment Methods for SCADA Security

    SciTech Connect (OSTI)

    Not Available

    2005-06-01T23:59:59.000Z

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  16. Cyber Assessment Methods For SCADA Security

    SciTech Connect (OSTI)

    May Robin Permann; Kenneth Rohde

    2005-06-01T23:59:59.000Z

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  17. Human dimensions in cyber operations research and development priorities.

    SciTech Connect (OSTI)

    Forsythe, James Chris; Silva, Austin Ray; Stevens-Adams, Susan Marie; Bradshaw, Jeffrey [Institute for Human and Machine Cognition

    2012-11-01T23:59:59.000Z

    Within cyber security, the human element represents one of the greatest untapped opportunities for increasing the effectiveness of network defenses. However, there has been little research to understand the human dimension in cyber operations. To better understand the needs and priorities for research and development to address these issues, a workshop was conducted August 28-29, 2012 in Washington DC. A synthesis was developed that captured the key issues and associated research questions. Research and development needs were identified that fell into three parallel paths: (1) human factors analysis and scientific studies to establish foundational knowledge concerning factors underlying the performance of cyber defenders; (2) development of models that capture key processes that mediate interactions between defenders, users, adversaries and the public; and (3) development of a multi-purpose test environment for conducting controlled experiments that enables systems and human performance measurement. These research and development investments would transform cyber operations from an art to a science, enabling systems solutions to be engineered to address a range of situations. Organizations would be able to move beyond the current state where key decisions (e.g. personnel assignment) are made on a largely ad hoc basis to a state in which there exist institutionalized processes for assuring the right people are doing the right jobs in the right way. These developments lay the groundwork for emergence of a professional class of cyber defenders with defined roles and career progressions, with higher levels of personnel commitment and retention. Finally, the operational impact would be evident in improved performance, accompanied by a shift to a more proactive response in which defenders have the capacity to exert greater control over the cyber battlespace.

  18. CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...

    Energy Savers [EERE]

    CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...

  19. Hydrogen Infrastructure Transition Analysis: Milestone Report

    SciTech Connect (OSTI)

    Melendez, M.; Milbrandt, A.

    2006-01-01T23:59:59.000Z

    This milestone report identifies a minimum infrastructure that could support the introduction of hydrogen vehicles and develops and evaluates transition scenarios supported by this infrastructure.

  20. Hydrogen, Fuel Cells and Infrastructure Technologies Program...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Hydrogen, Fuel Cells and Infrastructure Technologies Program: 2002 Annual Progress Report Hydrogen, Fuel Cells and Infrastructure Technologies Program: 2002 Annual Progress Report...

  1. Hydrogen, Fuel Cells and Infrastructure Technologies Program...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Hydrogen, Fuel Cells and Infrastructure Technologies Program FY2003 Merit Review and Peer Evaluation Report Hydrogen, Fuel Cells and Infrastructure Technologies Program FY2003...

  2. 2nd International Hydrogen Infrastructure Challenges Webinar...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    nd International Hydrogen Infrastructure Challenges Webinar Slides 2nd International Hydrogen Infrastructure Challenges Webinar Slides Presentation slides from the Fuel Cell...

  3. Refueling Infrastructure for Alternative Fuel Vehicles: Lessons...

    Broader source: Energy.gov (indexed) [DOE]

    Refueling Infrastructure for Alternative Fuel Vehicles: Lessons Learned for Hydrogen Refueling Infrastructure for Alternative Fuel Vehicles: Lessons Learned for Hydrogen On April...

  4. Voluntary Protection Program Onsite Review, Infrastructure Support...

    Office of Environmental Management (EM)

    2013 Voluntary Protection Program Onsite Review, Infrastructure Support Contract Paducah Gaseous Diffusion Plant - May 2013 May 2013 Evaluation to determine whether Infrastructure...

  5. California Low Carbon Fuels Infrastructure Investment Initiative...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Low Carbon Fuels Infrastructure Investment Initiative California Low Carbon Fuels Infrastructure Investment Initiative 2012 DOE Hydrogen and Fuel Cells Program and Vehicle...

  6. Natural Gas and Hydrogen Infrastructure Opportunities Workshop...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Opportunities Workshop Agenda Natural Gas and Hydrogen Infrastructure Opportunities Workshop Agenda Agenda for the Natural Gas and Hydrogen Infrastructure Opportunities Workshop...

  7. Final Report - Hydrogen Delivery Infrastructure Options Analysis...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    - Hydrogen Delivery Infrastructure Options Analysis Final Report - Hydrogen Delivery Infrastructure Options Analysis This report, by the Nexant team, documents an in-depth analysis...

  8. Hydrogen Fueling Infrastructure Research and Station Technology...

    Broader source: Energy.gov (indexed) [DOE]

    An Overview of the Hydrogen Fueling Infrastructure Research and Station Technology (H2FIRST) Project" held on November 18, 2014. Hydrogen Fueling Infrastructure Research and...

  9. Hydrogen Vehicle and Infrastructure Demonstration and Validation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vehicle and Infrastructure Demonstration and Validation Hydrogen Vehicle and Infrastructure Demonstration and Validation 2009 DOE Hydrogen Program and Vehicle Technologies Program...

  10. State Experience in Hydrogen Infrastructure in California

    Broader source: Energy.gov (indexed) [DOE]

    Experience in Hydrogen Infrastructure in California Gerhard H Achtelik Jr. February 17, 2011 Hydrogen Infrastructure Market Readiness Workshop California Environmental Protection...

  11. EV Everywhere Grand Challenge - Charging Infrastructure Enabling...

    Office of Environmental Management (EM)

    Charging Infrastructure Enabling Flexible EV Design EV Everywhere Grand Challenge - Charging Infrastructure Enabling Flexible EV Design Presentation given at the EV Everywhere...

  12. Building Smart Communities with Cyber-Physical Systems

    E-Print Network [OSTI]

    Xia, Feng

    2012-01-01T23:59:59.000Z

    There is a growing trend towards the convergence of cyber-physical systems (CPS) and social computing, which will lead to the emergence of smart communities composed of various objects (including both human individuals and physical things) that interact and cooperate with each other. These smart communities promise to enable a number of innovative applications and services that will improve the quality of life. This position paper addresses some opportunities and challenges of building smart communities characterized by cyber-physical and social intelligence.

  13. Cyber Security Evaluation of II&C Technologies

    SciTech Connect (OSTI)

    Ken Thomas

    2014-11-01T23:59:59.000Z

    The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a cyber security team with expertise in nuclear utility cyber security programs and experience in conducting these evaluations. The evaluation has determined that, for the most part, cyber security will not be a limiting factor in the application of these technologies to nuclear power plant applications.

  14. Recommended Practice: Creating Cyber Forensics Plans for Control Systems

    SciTech Connect (OSTI)

    Eric Cornelius; Mark Fabro

    2008-08-01T23:59:59.000Z

    Cyber forensics has been in the popular mainstream for some time, and has matured into an information-technology capability that is very common among modern information security programs. The goal of cyber forensics is to support the elements of troubleshooting, monitoring, recovery, and the protection of sensitive data. Moreover, in the event of a crime being committed, cyber forensics is also the approach to collecting, analyzing, and archiving data as evidence in a court of law. Although scalable to many information technology domains, especially modern corporate architectures, cyber forensics can be challenging when being applied to non-traditional environments, which are not comprised of current information technologies or are designed with technologies that do not provide adequate data storage or audit capabilities. In addition, further complexity is introduced if the environments are designed using proprietary solutions and protocols, thus limiting the ease of which modern forensic methods can be utilized. The legacy nature and somewhat diverse or disparate component aspects of control systems environments can often prohibit the smooth translation of modern forensics analysis into the control systems domain. Compounded by a wide variety of proprietary technologies and protocols, as well as critical system technologies with no capability to store significant amounts of event information, the task of creating a ubiquitous and unified strategy for technical cyber forensics on a control systems device or computing resource is far from trivial. To date, no direction regarding cyber forensics as it relates to control systems has been produced other than what might be privately available from commercial vendors. Current materials have been designed to support event recreation (event-based), and although important, these requirements do not always satisfy the needs associated with incident response or forensics that are driven by cyber incidents. To address these issues and to accommodate for the diversity in both system and architecture types, a framework based in recommended practices to address forensics in the control systems domain is required. This framework must be fully flexible to allow for deployment into any control systems environment regardless of technologies used. Moreover, the framework and practices must provide for direction on the integration of modern network security technologies with traditionally closed systems, the result being a true defense-in-depth strategy for control systems architectures. This document takes the traditional concepts of cyber forensics and forensics engineering and provides direction regarding augmentation for control systems operational environments. The goal is to provide guidance to the reader with specifics relating to the complexity of cyber forensics for control systems, guidance to allow organizations to create a self-sustaining cyber forensics program, and guidance to support the maintenance and evolution of such programs. As the current control systems cyber security community of interest is without any specific direction on how to proceed with forensics in control systems environments, this information product is intended to be a first step.

  15. Hydrogen Delivery Infrastructure Options Analysis

    Fuel Cell Technologies Publication and Product Library (EERE)

    This report, by the Nexant team, documents an in-depth analysis of seven hydrogen delivery options to identify the most cost-effective hydrogen infrastructure for the transition and long term. The pro

  16. Degree design of coupled infrastructures

    E-Print Network [OSTI]

    Hover, Franz S.

    2011-01-01T23:59:59.000Z

    A recent asymptotic model of cascading failure in two-domain, coupled infrastructures is used to pose and solve a specific degree-distribution design problem. Low-order non-linear analysis exposes the mechanisms by which ...

  17. Modeling hydrogen fuel distribution infrastructure

    E-Print Network [OSTI]

    Pulido, Jon R. (Jon Ramon), 1974-

    2004-01-01T23:59:59.000Z

    This thesis' fundamental research question is to evaluate the structure of the hydrogen production, distribution, and dispensing infrastructure under various scenarios and to discover if any trends become apparent after ...

  18. Strategic plan for infrastructure optimization

    SciTech Connect (OSTI)

    Donley, C.D.

    1998-05-27T23:59:59.000Z

    This document represents Fluor Daniel Hanford`s and DynCorp`s Tri-Cities Strategic Plan for Fiscal Years 1998--2002, the road map that will guide them into the next century and their sixth year of providing safe and cost effective infrastructure services and support to the Department of Energy (DOE) and the Hanford Site. The Plan responds directly to the issues raised in the FDH/DOE Critical Self Assessment specifically: (1) a strategy in place to give DOE the management (systems) and physical infrastructure for the future; (2) dealing with the barriers that exist to making change; and (3) a plan to right-size the infrastructure and services, and reduce the cost of providing services. The Plan incorporates initiatives from several studies conducted in Fiscal Year 1997 to include: the Systems Functional Analysis, 200 Area Water Commercial Practices Plan, $ million Originated Cost Budget Achievement Plan, the 1OO Area Vacate Plan, the Railroad Shutdown Plan, as well as recommendations from the recently completed Review of Hanford Electrical Utility. These and other initiatives identified over the next five years will result in significant improvements in efficiency, allowing a greater portion of the infrastructure budget to be applied to Site cleanup. The Plan outlines a planning and management process that defines infrastructure services and structure by linking site technical base line data and customer requirements to work scope and resources. The Plan also provides a vision of where Site infrastructure is going and specific initiatives to get there.

  19. Cyber-Physical Systems Security for Smart Grid

    E-Print Network [OSTI]

    Cyber-Physical Systems Security for Smart Grid Future Grid Initiative White Paper Power Systems-Physical Systems Security for Smart Grid Prepared for the Project "The Future Grid to Enable Sustainable Energy as one of nine white papers in the project "The Future Grid to Enable Sustainable Energy Systems

  20. Cyber-Physical Systems Security for Smart Grid

    E-Print Network [OSTI]

    Cyber-Physical Systems Security for Smart Grid Future Grid Initiative White Paper Power Systems-Physical Systems Security for Smart Grid Prepared for the Project "The Future Grid to Enable Sustainable Energy Acknowledgements This white paper was developed as one of nine white papers in the project "The Future Grid

  1. Cyber Security via Minority Games with Epistatic Signaling (Extended Abstract)

    E-Print Network [OSTI]

    Mishra, Bud

    Cyber Security via Minority Games with Epistatic Signaling (Extended Abstract) W. Casey, L. Metcalf occurs when deceptions are employed in order to breach the security of the system, thus making the entire profiles (e.g., the distribution of players employing various kinds of vulnerability and threat predictions

  2. Cyber Physical Systems: Design Challenges Edward A. Lee

    E-Print Network [OSTI]

    , such as distributed micro power generation coupled into the power grid, where tim- ing precision and security issuesCyber Physical Systems: Design Challenges Edward A. Lee Electrical Engineering and Computer is granted without fee provided that copies are not made or distributed for profit or commercial advantage

  3. Cyber-Security of Networked Control Systems Karl Henrik Johansson

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    to cyber-threats with many poten@al points of aRacks · How systems · ARack on power network state es@mator · Stealthy minimum-effort a) but no disclosure resources ·If the zero is unstable, then the plant state can be moved

  4. Cyber-Physical Energy Systems: Focus on Smart Buildings

    E-Print Network [OSTI]

    Gupta, Rajesh

    of a deeply coupled system of energy usage, comfort and work derived. At a macroscale, buildings use approxi computers and laptops in offices and homes will exceed over 3x the energy use by all data centers combinedCyber-Physical Energy Systems: Focus on Smart Buildings Jan Kleissl Dept. of Mechanical

  5. A Deception Framework for Survivability Against Next Generation Cyber Attacks

    E-Print Network [OSTI]

    Upadhyaya, Shambhu

    to the electronic business domain. According to the asymmetric warfare theory, attack- ers have the advantage- rity, survivability 1. Introduction This is the era of cyber-warfare and it is no longer limited to military domain. Knapp and Boulton [12] have reviewed information warfare literature from 1990 to mid-2005

  6. 2012 Annual Report Research Reactor Infrastructure Program

    SciTech Connect (OSTI)

    Douglas Morrell

    2012-11-01T23:59:59.000Z

    The content of this report is the 2012 Annual Report for the Research Reactor Infrastructure Program.

  7. Controlled Hydrogen Fleet and Infrastructure Analysis (Presentation)

    SciTech Connect (OSTI)

    Wipke, K.; Sprik, S.; Kurtz, J.; Ramsden, T.

    2010-06-10T23:59:59.000Z

    This presentation summarizes controlled hydrogen fleet & infrastructure analysis undertaken for the DOE Fuel Cell Technologies Program.

  8. Cyber Security and Trust Research & DevelopmentCyber Security and Trust Research & Development http://www.ISTS.dartmouth.eduhttp://www.ISTS.dartmouth.edu

    E-Print Network [OSTI]

    Pellacini, Fabio

    Cyber Security and Trust Research & DevelopmentCyber Security and Trust Research & Development http of a discrete distribution: www.ISTS.dartmouth.edu Entropy reminder INSTITUTE FOR SECURITY TECHNOLOGY STUDIES to packets & provide a visual summary? www.ISTS.dartmouth.edu Motivation INSTITUTE FOR SECURITY

  9. Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches

    SciTech Connect (OSTI)

    Meyers, C A; Powers, S S; Faissol, D M

    2009-10-08T23:59:59.000Z

    In this paper we construct taxonomies of cyber adversaries and methods of attack, drawing from a survey of the literature in the area of cyber crime. We begin by addressing the scope of cyber crime, noting its prevalence and effects on the US economy. We then survey the literature on cyber adversaries, presenting a taxonomy of the different types of adversaries and their corresponding methods, motivations, maliciousness, and skill levels. Subsequently we survey the literature on cyber attacks, giving a taxonomy of the different classes of attacks, subtypes, and threat descriptions. The goal of this paper is to inform future studies of cyber security on the shape and characteristics of the risk space and its associated adversaries.

  10. CS2SAT: THE CONTROL SYSTEMS CYBER SECURITY SELF-ASSESSMENT TOOL

    SciTech Connect (OSTI)

    Kathleen A. Lee

    2008-01-01T23:59:59.000Z

    The Department of Homeland Security National Cyber Security Division has developed the Control System Cyber Security Self-Assessment Tool (CS2SAT) that provides users with a systematic and repeatable approach for assessing the cyber-security posture of their industrial control system networks. The CS2SAT was developed by cyber security experts from Department of Energy National Laboratories and with assistance from the National Institute of Standards and Technology. The CS2SAT is a desktop software tool that guides users through a step-by-step process to collect facility-specific control system information and then makes appropriate recommendations for improving the system’s cyber-security posture. The CS2SAT provides recommendations from a database of industry available cyber-security practices, which have been adapted specifically for application to industry control system networks and components. Each recommendation is linked to a set of actions that can be applied to remediate-specific security vulnerabilities.

  11. A cognitive and economic decision theory for examining cyber defense strategies.

    SciTech Connect (OSTI)

    Bier, Asmeret Brooke

    2014-01-01T23:59:59.000Z

    Cyber attacks pose a major threat to modern organizations. Little is known about the social aspects of decision making among organizations that face cyber threats, nor do we have empirically-grounded models of the dynamics of cooperative behavior among vulnerable organizations. The effectiveness of cyber defense can likely be enhanced if information and resources are shared among organizations that face similar threats. Three models were created to begin to understand the cognitive and social aspects of cyber cooperation. The first simulated a cooperative cyber security program between two organizations. The second focused on a cyber security training program in which participants interact (and potentially cooperate) to solve problems. The third built upon the first two models and simulates cooperation between organizations in an information-sharing program.

  12. Hydrogen, Fuel Cells & Infrastructure Technologies ProgramHydrogen, Fuel Cells & Infrastructure Technologies Program Program Overview

    E-Print Network [OSTI]

    Hydrogen, Fuel Cells & Infrastructure Technologies ProgramHydrogen, Fuel Cells & Infrastructure.5Hydrogen, Fuel Cells & Infrastructure Technologies Program (EERE) President's Office of Science Berkeley, California #12;President Bush Launches the Hydrogen Fuel Initiative "Tonight I am proposing $1

  13. Towards Truly Ubiquitous and Opportunistic Trust Infrastructures: Position for Next Generation Cybersecurity Infrastructure Workshop

    E-Print Network [OSTI]

    Tennessee, University of

    : Position for Next Generation Cybersecurity Infrastructure Workshop Stephen Nightingale Generation Cybersecurity Infrastructure workshop, we note that Federated Identities [1 ubiquitous and opportunistic, single rooted trust infrastructure is emerging. Its

  14. Breaking into a computer : attack techniques and tools used by cyber-criminals

    ScienceCinema (OSTI)

    None

    2011-10-06T23:59:59.000Z

    Oral presentation in English, slides in English. We will show you how and why cyber-criminals attack your computers: their motives, methods and tools.

  15. Breaking into a computer : attack techniques and tools used by cyber-criminals

    SciTech Connect (OSTI)

    None

    2010-06-24T23:59:59.000Z

    Oral presentation in English, slides in English. We will show you how and why cyber-criminals attack your computers: their motives, methods and tools.

  16. Network QoS Management in Cyber-Physical Systems

    E-Print Network [OSTI]

    Xia, Feng; Dong, Jinxiang; Sun, Youxian

    2008-01-01T23:59:59.000Z

    Technical advances in ubiquitous sensing, embedded computing, and wireless communication are leading to a new generation of engineered systems called cyber-physical systems (CPS). CPS promises to transform the way we interact with the physical world just as the Internet transformed how we interact with one another. Before this vision becomes a reality, however, a large number of challenges have to be addressed. Network quality of service (QoS) management in this new realm is among those issues that deserve extensive research efforts. It is envisioned that wireless sensor/actuator networks (WSANs) will play an essential role in CPS. This paper examines the main characteristics of WSANs and the requirements of QoS provisioning in the context of cyber-physical computing. Several research topics and challenges are identified. As a sample solution, a feedback scheduling framework is proposed to tackle some of the identified challenges. A simple example is also presented that illustrates the effectiveness of the pr...

  17. Automatic Labeling for Entity Extraction in Cyber Security

    SciTech Connect (OSTI)

    Bridges, Robert A [ORNL] [ORNL; Jones, Corinne L [ORNL] [ORNL; Iannacone, Michael D [ORNL] [ORNL; Testa, Kelly M [ORNL] [ORNL; Goodall, John R [ORNL] [ORNL

    2014-01-01T23:59:59.000Z

    Timely analysis of cyber-security information necessitates automated information extraction from unstructured text. While state-of-the-art extraction methods produce extremely accurate results, they require ample training data, which is generally unavailable for specialized applications, such as detecting security related entities; moreover, manual annotation of corpora is very costly and often not a viable solution. In response, we develop a very precise method to automatically label text from several data sources by leveraging related, domain-specific, structured data and provide public access to a corpus annotated with cyber-security entities. Next, we implement a Maximum Entropy Model trained with the average perceptron on a portion of our corpus (~750,000 words) and achieve near perfect precision, recall, and accuracy, with training times under 17 seconds.

  18. Networks, deregulation, and risk : the politics of critical infrastructure protection

    E-Print Network [OSTI]

    Ellis, Ryan Nelson

    2011-01-01T23:59:59.000Z

    Post, electric power, and rail, like most infrastructures,Post, electric power, and rail, like most infrastructuresElectric Power .. 349 Conclusion: The Politics of Critical Infrastructure

  19. Optimal Dynamic Strategy of Building a Hydrogen Infrastructure in Beijing

    E-Print Network [OSTI]

    Lin, Zhenhong; Ogden, Joan M; Fan, Yueyue; Sperling, Dan

    2005-01-01T23:59:59.000Z

    of Building a Hydrogen Infrastructure in Beijing Zhenhongthe on-going Hydrogen Infrastructure Transition (HIT)build up a regional hydrogen infrastructure while minimizing

  20. Participatory infrastructure monitoring : design factors and limitations of accountability technologies

    E-Print Network [OSTI]

    Offenhuber, Dietmar

    2014-01-01T23:59:59.000Z

    This dissertation investigates practices of participatory infrastructure monitoring and their implications for the governance of urban infrastructure services. By introducing the concept of infrastructure legibility, the ...

  1. BUILDING INSPECTION Building, Infrastructure, Transportation

    E-Print Network [OSTI]

    BUILDING INSPECTION Building, Infrastructure, Transportation City of Redwood City 1017 Middlefield Sacramento, Ca 95814-5514 Re: Green Building Ordinance and the Building Energy Efficiency Standards Per of Redwood City enforce the current Title 24 Building Energy Efficiency Standards as part

  2. A Comparison of Cross-Sector Cyber Security Standards

    SciTech Connect (OSTI)

    Robert P. Evans

    2005-09-01T23:59:59.000Z

    This report presents a review and comparison (commonality and differences) of three cross-sector cyber security standards and an internationally recognized information technology standard. The comparison identifies the security areas covered by each standard and reveals where the standards differ in emphasis. By identifying differences in the standards, the user can evaluate which standard best meets their needs. For this report, only cross-sector standards were reviewed.

  3. Sandia Energy » Cyber Engineering Research Laboratory (CERL)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's PossibleRadiationImplementingnpitche Home About npitche This author has notExpansionSandiaCyber

  4. GridStat – Cyber Security and Regional Deployment Project Report

    SciTech Connect (OSTI)

    Clements, Samuel L.

    2009-02-18T23:59:59.000Z

    GridStat is a developing communication technology to provide real-time data delivery services to the electric power grid. It is being developed in a collaborative effort between the Electrical Power Engineering and Distributed Computing Science Departments at Washington State University. Improving the cyber security of GridStat was the principle focus of this project. A regional network was established to test GridStat’s cyber security mechanisms in a realistic environment. The network consists of nodes at Pacific Northwest National Laboratory, Idaho National Laboratory, and Washington State University. Idaho National Laboratory (INL) was tasked with performing the security assessment, the results of which detailed a number or easily resolvable and previously unknown issues, as well as a number of difficult and previously known issues. Going forward we recommend additional development prior to commercialization of GridStat. The development plan is structured into three domains: Core Development, Cyber Security and Pilot Projects. Each domain contains a number of phased subtasks that build upon each other to increase the robustness and maturity of GridStat.

  5. "Mapping" Nonprofit Infrastructure Organizations in Texas

    E-Print Network [OSTI]

    Aho, Andrea; Harris, Amanda; Kessel, Kendall; Park, Jongsoo; Park, Jong Taek; Rios, Lisa; Swendig, Brett

    2010-01-01T23:59:59.000Z

    The stability of the nonprofit sector and its ability to meet our nation‘s needs in an era of unprecedented challenges requires a solid nonprofit infrastructure (Brown, et al., 2008). These organizations that comprise this infrastructure system work...

  6. National Environmental Information Infrastructure Reference Architecture

    E-Print Network [OSTI]

    Greenslade, Diana

    National Environmental Information Infrastructure Reference Architecture Consultation Draft Environmental Information Infrastructure Reference Architecture: Consultation Draft Environmental Information Architecture: Consultation Draft, Bureau of Meteorology, Canberra, Australia, pp. 52. With the exception

  7. The Hydrogen Infrastructure Transition Model (HIT) & Its Application in Optimizing a 50-year Hydrogen Infrastructure for Urban Beijing

    E-Print Network [OSTI]

    Lin, Zhenhong; Ogden, J; Fan, Yueyue; Sperling, Dan

    2006-01-01T23:59:59.000Z

    Zoia (2005). "Hydrogen infrastructure strategic planningITS—RR—06—05 The Hydrogen Infrastructure Transition Model (a 50-year Hydrogen Infrastructure for Urban Beijing Zhenhong

  8. The Hydrogen Infrastructure Transition (HIT) Model and Its Application in Optimizing a 50-year Hydrogen Infrastructure for Urban Beijing

    E-Print Network [OSTI]

    Lin, Zhenhong; Ogden, Joan M; Fan, Yueyue; Sperling, Dan

    2006-01-01T23:59:59.000Z

    Zoia (2005). "Hydrogen infrastructure strategic planningITS—RR—06—05 The Hydrogen Infrastructure Transition Model (a 50-year Hydrogen Infrastructure for Urban Beijing Zhenhong

  9. Microsoft Word - 2014 Infrastructure - Intro.docx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Department of Energy - National Energy Technology Laboratory The Infrastructure (Regional Carbon Sequestration Partnerships) Technology Area highlights DOE's awareness of the...

  10. Office of National Infrastructure & Sustainability | National...

    National Nuclear Security Administration (NNSA)

    National Infrastructure & Sustainability | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  11. Sandia National Laboratories: Smart power infrastructure

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Infrastructure Security, Materials Science, Partnership, Research & Capabilities, SMART Grid, Systems Engineering, Transmission Grid Integration Increasing consumer power...

  12. Controlled Hydrogen Fleet and Infrastructure Demonstration and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    More Documents & Publications Fuel Cell Technologies Program Overview: 2012 DOE Hydrogen Compression, Storage, and Dispensing Workshop Refueling Infrastructure for...

  13. National Infrastructure Simulation and Analysis Center Overview

    SciTech Connect (OSTI)

    Berscheid, Alan P. [Los Alamos National Laboratory

    2012-07-30T23:59:59.000Z

    National Infrastructure Simulation and Analysis Center (NISAC) mission is to: (1) Improve the understanding, preparation, and mitigation of the consequences of infrastructure disruption; (2) Provide a common, comprehensive view of U.S. infrastructure and its response to disruptions - Scale & resolution appropriate to the issues and All threats; and (3) Built an operations-tested DHS capability to respond quickly to urgent infrastructure protection issues.

  14. Africa's Transport Infrastructure Mainstreaming Maintenance and...

    Open Energy Info (EERE)

    Mainstreaming Maintenance and Management Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Africa's Transport Infrastructure Mainstreaming Maintenance and Management...

  15. Energy Theft in the Advanced Metering Infrastructure

    E-Print Network [OSTI]

    McDaniel, Patrick Drew

    , with this infrastructure comes new risk. In this paper, we consider ad- versary means of defrauding the electrical gridEnergy Theft in the Advanced Metering Infrastructure Stephen McLaughlin, Dmitry Podkuiko, and Patrick McDaniel Systems and Internet Infrastructure Security Laboratory (SIIS) Pennsylvania State

  16. PROTECTING INFRASTRUCTURE ASSETS FROM REAL-TIME

    E-Print Network [OSTI]

    Burmester, Mike

    to critical infrastructure assets. The paper defines a threat model, an- alyzes vulnerabilities, proposes in an electricity grid. Also, it discusses the impact of run-time attacks on TC-compliant critical infrastructure. The crucial nature of the services provided by critical infrastructure systems and the vulnerabilities found

  17. Scanning the Technology Energy Infrastructure Defense Systems

    E-Print Network [OSTI]

    Amin, S. Massoud

    , and algorithmic develop- ments. Keywords--Critical infrastructure protection, electric power grid, emergency, the United Kingdom, and Italy in 2003 underscored electricity infrastructure's vulnerabilities [1 infrastructures and increased demand for high-quality and reliable electricity for our digital economy is becoming

  18. The X.509 Privilege Management Infrastructure

    E-Print Network [OSTI]

    Kent, University of

    Management Infrastructure (PMI) introduced in the 2000 edition of X.509. It describes the entities Management Infrastructure (PMI), and it enables privileges to be allocated, delegated, revoked and withdrawn in an electronic way. A PMI is to authorisation what a Public Key Infrastructure (PKI) is to authentication

  19. Control Systems Security Center Comparison Study of Industrial Control System Standards against the Control Systems Protection Framework Cyber-Security Requirements

    SciTech Connect (OSTI)

    Robert P. Evans

    2005-09-01T23:59:59.000Z

    Cyber security standards, guidelines, and best practices for control systems are critical requirements that have been delineated and formally recognized by industry and government entities. Cyber security standards provide a common language within the industrial control system community, both national and international, to facilitate understanding of security awareness issues but, ultimately, they are intended to strengthen cyber security for control systems. This study and the preliminary findings outlined in this report are an initial attempt by the Control Systems Security Center (CSSC) Standard Awareness Team to better understand how existing and emerging industry standards, guidelines, and best practices address cyber security for industrial control systems. The Standard Awareness Team comprised subject matter experts in control systems and cyber security technologies and standards from several Department of Energy (DOE) National Laboratories, including Argonne National Laboratory, Idaho National Laboratory, Pacific Northwest National Laboratory, and Sandia National Laboratories. This study was conducted in two parts: a standard identification effort and a comparison analysis effort. During the standard identification effort, the Standard Awareness Team conducted a comprehensive open-source survey of existing control systems security standards, regulations, and guidelines in several of the critical infrastructure (CI) sectors, including the telecommunication, water, chemical, energy (electric power, petroleum and oil, natural gas), and transportation--rail sectors and sub-sectors. During the comparison analysis effort, the team compared the requirements contained in selected, identified, industry standards with the cyber security requirements in ''Cyber Security Protection Framework'', Version 0.9 (hereafter referred to as the ''Framework''). For each of the seven sector/sub-sectors listed above, one standard was selected from the list of standards identified in the identification effort. The requirements in these seven standards were then compared against the requirements given in the Framework. This comparison identified gaps (requirements not covered) in both the individual industry standards and in the Framework. In addition to the sector-specific standards reviewed, the team compared the requirements in the cross-sector Instrumentation, Systems, and Automation Society (ISA) Technical Reports (TR) 99 -1 and -2 to the Framework requirements. The Framework defines a set of security classes separated into families as functional requirements for control system security. Each standard reviewed was compared to this template of requirements to determine if the standard requirements closely or partially matched these Framework requirements. An analysis of each class of requirements pertaining to each standard reviewed can be found in the comparison results section of this report. Refer to Appendix A, ''Synopsis of Comparison Results'', for a complete graphical representation of the study's findings at a glance. Some of the requirements listed in the Framework are covered by many of the standards, while other requirements are addressed by only a few of the standards. In some cases, the scope of the requirements listed in the standard for a particular industry greatly exceeds the requirements given in the Framework. These additional families of requirements, identified by the various standards bodies, could potentially be added to the Framework. These findings are, in part, due to the maturity both of the security standards themselves and of the different industries current focus on security. In addition, there are differences in how communication and control is used in different industries and the consequences of disruptions via security breaches to each particular industry that could affect how security requirements are prioritized. The differences in the requirements listed in the Framework and in the various industry standards are due, in part, to differences in the level and purpose of the standards. While the requir

  20. hen the legacy power infrastructure is aug-mented by a communication infrastructure, it

    E-Print Network [OSTI]

    Zhang, Yan

    hen the legacy power infrastructure is aug- mented by a communication infrastructure, it becomes information among different components of the power infrastructure. As a result, the power grid can operate into the power infrastructure will introduce many security challenges. For example, it is estimated that the data

  1. EL Program: Smart Grid Program Manager: David Wollman, Smart Grid and Cyber-Physical Systems

    E-Print Network [OSTI]

    EL Program: Smart Grid Program Manager: David Wollman, Smart Grid and Cyber-Physical Systems Program Office, Associate Program Manager: Dean Prochaska, Smart Grid and Cyber- Physical Systems Program [updated August 23, 2013] Summary: This program develops and demonstrates smart grid measurement science

  2. NSF Workshop On Cyber-Physical Systems Research Motivation, Techniques and Roadmap

    E-Print Network [OSTI]

    Rajkumar, Ragunathan "Raj"

    NSF Workshop On Cyber-Physical Systems Research Motivation, Techniques and Roadmap October 16 - 17 from industry, research laboratories, academia, and government to develop an attractive roadmap challenges, and a roadmap for Cyber-Physical Systems. The organizers will deliver a report to the National

  3. Co-Regulation of Cyber Physical Systems Justin M. Bradley and Ella M. Atkins

    E-Print Network [OSTI]

    Rajkumar, Ragunathan "Raj"

    Co-Regulation of Cyber Physical Systems Justin M. Bradley and Ella M. Atkins 1 Introduction Cyber, and safety levels through regulation of its physical effectors (e.g. propulsive, steering, switches) and through regulation of its computational resources (e.g. processing and communication). To-date, primarily

  4. The Role of Signal Processing in meeting Cyber-Security and Privacy Challenges

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 The Role of Signal Processing in meeting Cyber-Security and Privacy Challenges Lalitha Sankar Spaces Image Classification/ Location Privacy Modify Control Messages Security Privacy Fig. 1. Illustration of several classes of cyber-security and privacy threats in networks and distributed data systems

  5. National Center for Digital Government Reflections on The Fog of (Cyber)War

    E-Print Network [OSTI]

    Schweik, Charles M.

    National Center for Digital Government Reflections on The Fog of (Cyber)War Diego. These assertions are: (a) Cyberspace is a new operational domain for waging war; (b) Cyber warfare can be as severe, it aims at reconnecting the idea of "fog of war" to its Clausewitzian roots, highlighting the importance

  6. Challenges for Cyber-Physical Systems: Security, Timing Analysis and Soft Error Protection

    E-Print Network [OSTI]

    Mueller, Frank

    from cyber attacks. While this assumption may not be sound, substations themselves are a more likely link at a substation) could allow attackers to affect power devices. Some protection could be provided to invest in research on the protection of the power grid, both from the perspective of cyber attacks

  7. Survey Paper Cyber security in the Smart Grid: Survey and challenges q

    E-Print Network [OSTI]

    Wang, Wenye

    importantly, with the integration of advanced computing and communication technologies, the Smart GridSurvey Paper Cyber security in the Smart Grid: Survey and challenges q Wenye Wang , Zhuo Lu Accepted 29 December 2012 Available online 17 January 2013 Keywords: Smart Grid Cyber security Attacks

  8. On the Exact Solution to a Smart Grid Cyber-Security Analysis Problem

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    terminal units (RTUs), SCADA systems measure data such as trans- mission line power flows, bus power1 On the Exact Solution to a Smart Grid Cyber-Security Analysis Problem Kin Cheong Sou, Henrik Sandberg and Karl Henrik Johansson Abstract--This paper considers a smart grid cyber-security problem

  9. Lori Garver, NASA Deputy Administrator NASA Cyber Security Awareness Month Symposium

    E-Print Network [OSTI]

    us of the importance of constant vigilance to ensure on-line safety and security both at work the CIO community does everything they can to protect our cyber security ­ the power actually does restLori Garver, NASA Deputy Administrator NASA Cyber Security Awareness Month Symposium NASA

  10. A co-simulation framework for design of time-triggered automotive cyber physical systems

    E-Print Network [OSTI]

    Koutsoukos, Xenofon D.

    A co-simulation framework for design of time-triggered automotive cyber physical systems Zhenkai Automotive control system SystemC a b s t r a c t Designing cyber-physical systems (CPS) is challenging due to the tight interactions between software, network/platform, and physical components. Automotive control sys

  11. Taming Uncertainties in Wireless Messaging for Automotive Cyber-Physical-Systems

    E-Print Network [OSTI]

    Rajkumar, Ragunathan "Raj"

    Taming Uncertainties in Wireless Messaging for Automotive Cyber-Physical-Systems Hongwei Zhang Wireless networking for automotive CPS Today's vehicles are much more than a mechanical device, and complex to the scalability of vehicular communication system, which is a basic element of automotive cyber-physical systems

  12. The CyberWalk Platform: Human-Machine Interaction Enabling Unconstrained Walking through VR

    E-Print Network [OSTI]

    The CyberWalk Platform: Human-Machine Interaction Enabling Unconstrained Walking through VR P, locomotion is either restricted to a 1D motion on a linear treadmill, like in the Treadport platform [3: the "omni-directional" CyberWalk platform (Figs. 1­2). The platform consists of an array of synchronous

  13. Infrastructure Ecology for Sustainable and Resilient Urban Infrastructure Design

    SciTech Connect (OSTI)

    Jeong, Hyunju [Georgia Institute of Technology; Pandit, Arka [Georgia Institute of Technology; Crittenden, John [Georgia Institute of Technology; Xu, Ming [University of Michigan; Perrings, Charles [Arizona State University; Wang, Dali [ORNL; Li, Ke [University of Georgia; French, Steve [Georgia Institute of Technology

    2010-10-01T23:59:59.000Z

    The population growth coupled with increasing urbanization is predicted to exert a huge demand on the growth and retrofit of urban infrastructure, particularly in water and energy systems. The U.S. population is estimated to grow by 23% (UN, 2009) between 2005 and 2030. The corresponding increases in energy and water demand were predicted as 14% (EIA, 2009) and 20% (Elcock, 2008), respectively. The water-energy nexus needs to be better understood to satisfy the increased demand in a sustainable manner without conflicting with environmental and economic constraints. Overall, 4% of U.S. power generation is used for water distribution (80%) and treatment (20%). 3% of U.S. water consumption (100 billion gallons per day, or 100 BGD) and 40% of U.S. water withdrawal (340 BGD) are for thermoelectric power generation (Goldstein and Smith, 2002). The water demand for energy production is predicted to increase most significantly among the water consumption sectors by 2030. On the other hand, due to the dearth of conventional water sources, energy intensive technologies are increasingly in use to treat seawater and brackish groundwater for water supply. Thus comprehending the interrelation and interdependency between water and energy system is imperative to evaluate sustainable water and energy supply alternatives for cities. In addition to the water-energy nexus, decentralized or distributed concept is also beneficial for designing sustainable water and energy infrastructure as these alternatives require lesser distribution lines and space in a compact urban area. Especially, the distributed energy infrastructure is more suited to interconnect various large and small scale renewable energy producers which can be expected to mitigate greenhouse gas (GHG) emissions. In the case of decentralized water infrastructure, on-site wastewater treatment facility can provide multiple benefits. Firstly, it reduces the potable water demand by reusing the treated water for non-potable uses and secondly, it also reduces the wastewater load to central facility. In addition, lesser dependency on the distribution network contributes to increased reliability and resiliency of the infrastructure. The goal of this research is to develop a framework which seeks an optimal combination of decentralized water and energy alternatives and centralized infrastructures based on physical and socio-economic environments of a region. Centralized and decentralized options related to water, wastewater and stormwater and distributed energy alternatives including photovoltaic (PV) generators, fuel cells and microturbines are investigated. In the context of the water-energy nexus, water recovery from energy alternatives and energy recovery from water alternatives are reflected. Alternatives recapturing nutrients from wastewater are also considered to conserve depleting resources. The alternatives are evaluated in terms of their life-cycle environmental impact and economic performance using a hybrid life cycle assessment (LCA) tool and cost benefit analysis, respectively. Meeting the increasing demand of a test bed, an optimal combination of the alternatives is designed to minimize environmental and economic impacts including CO2 emissions, human health risk, natural resource use, and construction and operation cost. The framework determines the optimal combination depending on urban density, transmission or conveyance distance or network, geology, climate, etc. Therefore, it will be also able to evaluate infrastructure resiliency against physical and socio-economic challenges such as population growth, severe weather, energy and water shortage, economic crisis, and so on.

  14. Cyber Science and Security - An R&D Partnership at LLNL

    SciTech Connect (OSTI)

    Brase, J; Henson, V

    2011-03-11T23:59:59.000Z

    Lawrence Livermore National Laboratory has established a mechanism for partnership that integrates the high-performance computing capabilities of the National Labs, the network and cyber technology expertise of leading information technology companies, and the long-term research vision of leading academic cyber programs. The Cyber Science and Security Center is designed to be a working partnership among Laboratory, Industrial, and Academic institutions, and provides all three with a shared R&D environment, technical information sharing, sophisticated high-performance computing facilities, and data resources for the partner institutions and sponsors. The CSSC model is an institution where partner organizations can work singly or in groups on the most pressing problems of cyber security, where shared vision and mutual leveraging of expertise and facilities can produce results and tools at the cutting edge of cyber science.

  15. SESSION: CYBER-PHYSICAL SYSTEM SECURITY IN A SMART GRID ENVIROMENT 1 Cyber-Security of SCADA Systems

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    . I. INTRODUCTION THE electric power transmission system is probably the most vital infrastructure] proposed a framework in order to clarify the interaction between the power system and the IT infrastructure are with the Power Systems Laboratory, Department of Electrical Engineering, Swiss Federal Institute of Technology

  16. Evaluation Report on "The Department's Unclassified Cyber Security Program"

    SciTech Connect (OSTI)

    None

    2009-10-01T23:59:59.000Z

    Industry experts report that security challenges and threats are continually evolving as malicious activity has become more web-based and attackers are able to rapidly adapt their attack methods. In addition, the number of data breaches continues to rise. In an effort to mitigate and address threats and protect valuable information, the Department of Energy anticipated spending about $275 million in Fiscal Year (FY) 2009 to implement cyber security measures necessary to protect its information technology resources. These systems and data are designed to support the Department's mission and business lines of energy security, nuclear security, scientific discovery and innovation, and environmental responsibility. The Federal Information Security Management Act of 2002 (FISMA) provides direction to agencies on the management and oversight of information security risks, including design and implementation of controls to protect Federal information and systems. As required by FISMA, the Office of Inspector General conducts an annual independent evaluation to determine whether the Department's unclassified cyber security program adequately protects its information systems and data. This memorandum and the attached report present the results of our evaluation for FY 2009. The Department continued to make incremental improvements in its unclassified cyber security program. Our evaluation disclosed that most sites had taken action to address weaknesses previously identified in our FY 2008 evaluation report. They improved certification and accreditation of systems; strengthened configuration management of networks and systems; performed independent assessments; and, developed and/or refined certain policies and procedures. In addition, the Department instituted a centralized incident response organization designed to eliminate duplicative efforts throughout the Department. As we have noted in previous reports, the Department continued to maintain strong network perimeter defenses against malicious intruders and other externals threats. These are positive accomplishments. However, in our judgment, additional action is required to further enhance the Department's unclassified cyber security program and help reduce risks to its systems and data. For example, our current review identified opportunities for improvements in areas such as security planning and testing, systems inventory, access controls, and configuration management. In particular, we issued a number of findings at sites managed by the National Nuclear Security Administration (NNSA). We also identified weaknesses across various Department program elements. Issues that warrant further attention include: (1) Weaknesses such as outdated security plans and not completing annual security control self-assessments were identified at several sites; (2) The Department had not yet resolved systems inventory issues and had yet to deploy a complex-wide automated asset management tool to help track information technology resources and identify interfaces between systems or networks; (3) Although certain improvements had been made to enhance access controls, we noted deficiencies such as a lack of periodic account reviews and inadequate password management at a number of sites; and (4) Previously identified weaknesses in configuration management had been corrected, however, we found problems related to weak administrator account settings and failure to install software patches, as well as incomplete implementation of the Federal Desktop Core Configuration. These internal control weaknesses existed, at least in part, because certain cyber security roles and responsibilities were not clearly delineated. Program officials also had not effectively performed monitoring and review activities essential for evaluating the adequacy of cyber security performance. In some cases, officials had not ensured that weaknesses discovered during audits and other evaluations were recorded and tracked to resolution in the organizations' Plans of Action and Milestones. Our testing disclosed that about 39 p

  17. Infrastructure

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) EnvironmentalGyroSolé(tm)HydrogenRFPTri-Party AgreementInfrared Mapping

  18. infrastructure

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved:AdministrationAnalysisDarby Dietrich5 |0/%2A0/%2Agtri

  19. Infrastructure

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn Other News link toInfluenceInfrared Mapping HelpsMicro-grid

  20. Infrastructure

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn Other News link toInfluenceInfrared Mapping

  1. Probabilistic Characterization of Adversary Behavior in Cyber Security

    SciTech Connect (OSTI)

    Meyers, C A; Powers, S S; Faissol, D M

    2009-10-08T23:59:59.000Z

    The objective of this SMS effort is to provide a probabilistic characterization of adversary behavior in cyber security. This includes both quantitative (data analysis) and qualitative (literature review) components. A set of real LLNL email data was obtained for this study, consisting of several years worth of unfiltered traffic sent to a selection of addresses at ciac.org. The email data was subjected to three interrelated analyses: a textual study of the header data and subject matter, an examination of threats present in message attachments, and a characterization of the maliciousness of embedded URLs.

  2. Fact Sheet: Cyber Security Audit and Attack Detection Toolkit

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011AT&T,OfficeEnd ofEvaluations in Covered Facilities | DepartmentFactLead-acidofCyber

  3. Control Systems Cyber Security: Defense in Depth Strategies | Department of

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613PortsmouthBartlesvilleAbout » Contact Us Contact UsEnergyOak7.2Energy Cyber

  4. Sandia Energy - Cyber Research Facility Opens at Sandia's California

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's PossibleRadiation Protection245C Unlimited ReleaseWelcomeLong LifetimeConcentratingSite Cyber

  5. Office of Cyber and Security Assessments | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613 122Commercial602 1,39732onMake YourDepartment ofC T O B EOff-GridCyber

  6. OCIO Technology Summit: Cyber Innovation | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOilNEWResponse to Time-Based Rates fromNuclear5.html[2/3/2012Cyber

  7. Comparison of two methods to quantify cyber and physical security effectiveness.

    SciTech Connect (OSTI)

    Wyss, Gregory Dane; Gordon, Kristl A.

    2005-11-01T23:59:59.000Z

    With the increasing reliance on cyber technology to operate and control physical security system components, there is a need for methods to assess and model the interactions between the cyber system and the physical security system to understand the effects of cyber technology on overall security system effectiveness. This paper evaluates two methodologies for their applicability to the combined cyber and physical security problem. The comparison metrics include probabilities of detection (P{sub D}), interruption (P{sub I}), and neutralization (P{sub N}), which contribute to calculating the probability of system effectiveness (P{sub E}), the probability that the system can thwart an adversary attack. P{sub E} is well understood in practical applications of physical security but when the cyber security component is added, system behavior becomes more complex and difficult to model. This paper examines two approaches (Bounding Analysis Approach (BAA) and Expected Value Approach (EVA)) to determine their applicability to the combined physical and cyber security issue. These methods were assessed for a variety of security system characteristics to determine whether reasonable security decisions could be made based on their results. The assessments provided insight on an adversary's behavior depending on what part of the physical security system is cyber-controlled. Analysis showed that the BAA is more suited to facility analyses than the EVA because it has the ability to identify and model an adversary's most desirable attack path.

  8. Sandia Energy - Water Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol Home DistributionTransportation Safety Home StationaryUpperWakeInfrastructure

  9. Cyber-Physical Systems Week HSCC ICCPS IPSN LCTES RTAS

    E-Print Network [OSTI]

    Liberzon, Daniel

    will have an enormous societal impact and economic benefit in areas such as critical infrastructures, energy Francisco USA, and CPSWeek 2010 in Stockholm Sweden; however, most of its conferences began advancing, integration and sustainment of advanced techn

  10. Secure control systems with application to cyber-physical systems

    SciTech Connect (OSTI)

    Dong, Jin [ORNL] [ORNL; Djouadi, Seddik M [ORNL] [ORNL; Nutaro, James J [ORNL] [ORNL; Kuruganti, Phani Teja [ORNL] [ORNL

    2014-01-01T23:59:59.000Z

    Control systems are computer-based systems with networked units consisting of sensors, actuators, control processing units, and communication devices. The role of control system is to interact, monitor, and control physical processes. Reactive power control is a fundamental issue in ensuring the security of the power network. It is claimed that Synchronous Condensers (SC) have been used at both distribution and transmission voltage levels to improve stability and to maintain voltages within desired limits under changing load conditions and contingency situations. Performance of PI controller corresponding to various tripping faults are analyzed for SC systems. Most of the eort in protecting these systems has been in protection against random failures or reliability. However, besides failures these systems are subject to various signal attacks for which new analysis are discussed here. When a breach does occur, it is necessary to react in a time commensurate with the physical dynamics of the system as it responds to the attack. Failure to act swiftly enough may result in undesirable, and possibly irreversible, physical eects. Therefore, it is meaningful to evaluate the security of a cyber-physical system, especially to protect it from cyber-attack. Illustrative numerical examples are provided together with an application to the SC systems.

  11. 2nd International Hydrogen Infrastructure Challenges Webinar

    Broader source: Energy.gov [DOE]

    Text version and video recording of the webinar titled "2nd International Hydrogen Infrastructure Challenges Webinar," originally presented on March 10, 2015.

  12. Hydrogen Delivery Infrastructure Analysis, Options and Trade...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Analysis, Options and Trade-offs, Transition and Long-term Hydrogen Delivery Infrastructure Analysis, Options and Trade-offs, Transition and Long-term Presentation on Hydrogen...

  13. Africa Infrastructure Country Diagnostic Documents: Interactive...

    Open Energy Info (EERE)

    Interactive MAP in PDF, all Countries Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Africa Infrastructure Country Diagnostic Documents: Interactive MAP in PDF, all...

  14. Hydrogen Infrastructure Market Readiness: Opportunities and Potential...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Opportunities and Potential for Near-term Cost Reductions. Proceedings of the Hydrogen Infrastructure Market Readiness Workshop and Summary of Feedback Provided through the...

  15. Sandia National Laboratories: Hydrogen Fueling Infrastructure...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Station Technology Linde, Sandia Partnership Looks to Expand Hydrogen Fueling Network On February 26, 2015, in Center for Infrastructure Research and Innovation (CIRI), Energy,...

  16. Department of Energy Cites Parsons Infrastructure & Technology...

    Broader source: Energy.gov (indexed) [DOE]

    Parsons Infrastructure & Technology Group, Inc. for violations of DOE's worker safety and health regulations with a proposed civil penalty of 70,000. The violations are associated...

  17. Natural Gas and Hydrogen Infrastructure Opportunities Workshop...

    Broader source: Energy.gov (indexed) [DOE]

    * Convene industry and other stakeholders to share current statusstate-of-the art for natural gas and hydrogen infrastructure. * Identify key challenges (both technical and...

  18. Alternative Ways of Financing Infrastructure Investment: Potential...

    Open Energy Info (EERE)

    'Novel' Financing Models Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Alternative Ways of Financing Infrastructure Investment: Potential for 'Novel' Financing Models...

  19. Sandia National Laboratories: "smart water" infrastructure

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    "smart water" infrastructure Sandians Published in American Chemical Society's Environmental Science & Technology On December 11, 2014, in Analysis, Climate, Energy, Global Climate...

  20. Geographically Based Hydrogen Demand and Infrastructure Rollout...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Rollout Scenario Analysis Geographically Based Hydrogen Demand and Infrastructure Rollout Scenario Analysis Presentation by Margo Melendez at the 2010-2025 Scenario Analysis for...

  1. Geographically Based Hydrogen Demand and Infrastructure Analysis...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Analysis Geographically Based Hydrogen Demand and Infrastructure Analysis Presentation by NREL's Margo Melendez at the 2010 - 2025 Scenario Analysis for Hydrogen Fuel Cell Vehicles...

  2. Sandia National Laboratories: accelerate hydrogen infrastructure...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    accelerate hydrogen infrastructure technologies Energy Department Awards 7M to Advance Hydrogen Storage Systems On June 12, 2014, in CRF, Energy, Energy Storage, Energy Storage...

  3. Electric Vehicle Charging Infrastructure Deployment Guidelines...

    Open Energy Info (EERE)

    to: navigation, search Tool Summary LAUNCH TOOL Name: Electric Vehicle Charging Infrastructure Deployment Guidelines: British Columbia AgencyCompany Organization: Natural...

  4. Refueling Infrastructure for Alternative Fuel Vehicles: Lessons...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Presented at Refueling Infrastructure for Alternative Fuel Vehicles: Lessons Learned for Hydrogen Conference, April 2-3, 2008, Sacramento, California fry.pdf More Documents &...

  5. Refueling Infrastructure for Alternative Fuel Vehicles: Lessons...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Proceedings from the DOE sponsored Refueling Infrastructure for Alternative Fuel Vehicles: Lessons Learned for Hydrogen workshop to understand how lessons from past experiences can...

  6. IPHE Infrastructure Workshop - Workshop Proceedings, February...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vehicles and Hydrogen Fuel Stations Moving toward a commercial market for hydrogen fuel cell vehicles Fuel Cell Electric Vehicles and Hydrogen Infrastructure: Deployment and Issues...

  7. Sandia National Laboratories: fueling infrastructure development

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    fueling infrastructure development New Report Describes Joint Opportunities for Natural Gas and Hydrogen Fuel-Cell Vehicle Markets On March 6, 2015, in Capabilities, Center for...

  8. Hydrogen Infrastructure Market Readiness: Opportunities and Potential...

    Broader source: Energy.gov (indexed) [DOE]

    methane reformer SOTA State-of-the-Art v Executive Summary Recent progress with fuel cell electric vehicles (FCEVs) has focused attention on hydrogen infrastructure as a...

  9. Voluntary Protection Program Onsite Review, Infrastructure Support...

    Office of Environmental Management (EM)

    2012 Voluntary Protection Program Onsite Review, Infrastructure Support Contract Paducah Gaseous Diffusion Plant - March 2012 March 2012 Evaluation to determine whether the...

  10. Natural Gas and Hydrogen Infrastructure Opportunities: Markets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Opportunities: Markets and Barriers to Growth Natural Gas and Hydrogen Infrastructure Opportunities: Markets and Barriers to Growth Presentation by Matt Most, Encana Natural Gas,...

  11. Geographically-Based Infrastructure Analysis | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Infrastructure Analysis given by Keith Parks of the National Renewable Energy Laboratory during the DOE Hydrogen Transition Analysis Workshop on January 26,...

  12. International Hydrogen Infrastructure Challenges Workshop Summary...

    Broader source: Energy.gov (indexed) [DOE]

    presentation slides from the DOE Fuel Cell Technologies Office webinar "International Hydrogen Infrastructure Challenges Workshop Summary - NOW, NEDO, and DOE" held on December 16,...

  13. Controlled Hydrogen Fleet and Infrastructure Analysis (Presentation)

    SciTech Connect (OSTI)

    Wipke, K.

    2007-05-17T23:59:59.000Z

    This presentation by Keith Wipke at the 2007 DOE Hydrogen Program Annual Merit Review Meeting provides information about NREL's Controlled Hydrogen Fleet and Infrastructure Analysis Project.

  14. Environmental Risks to Infrastructure 2014 Environmental Risks to Infrastructure Innovation funding call June 2014

    E-Print Network [OSTI]

    Reece, Sarah

    to Infrastructure 2014 NE/M008401/1 Dr Christian Wagner Towards managing risk from climate change throughRUM - Flood risk: Building Infrastructure Resilience through better Understanding and Management choices 8 2 To Infrastructure (CAVERTI) 7 8 NE/M008169/1 Dr Ana Mijic Improved techno-economic evaluation of Blue Green

  15. SelfSelf--healing Powerhealing Power Delivery InfrastructureDelivery Infrastructure

    E-Print Network [OSTI]

    Amin, S. Massoud

    Network/Systems Initiative Complex interactive networks: · Energy infrastructure: Electric power gridsSelfSelf--healing Powerhealing Power Delivery InfrastructureDelivery Infrastructure Massoud Amin, D developed while the author was at the Electric Power Research Institute (EPRI) in Palo Alto, CA. EPRI

  16. Hydrogen Strategies: an Integrated Resource Planning Analysis for the Development of Hydrogen Energy Infrastructures

    E-Print Network [OSTI]

    Pigneri, Attilio

    2005-01-01T23:59:59.000Z

    analysis of hydrogen infrastructure development strategiesalso presented. Keywords: Hydrogen Infrastructure, Renewableof a Tasmanian hydrogen infrastructure is performed

  17. ModelPlex: Verified Runtime Validation of Verified Cyber-Physical System Models

    E-Print Network [OSTI]

    Platzer, André

    dynamics. In CPS, models are essential; but any model we could possibly build necessarily deviates from. In CPS, models are essential; but a cyber- physical systems (CPS) safe. Formal methods make strong guarantees about the system behavior

  18. Integrating Neuromuscular and Cyber Systems for Neural Control of Artificial Legs

    E-Print Network [OSTI]

    Yang, Qing "Ken"

    and computer system is essential. This integration leads to a cyber- physical system (CPS), in which a complex (CPS) for neurally controlled artificial legs. The key to the new CPS system is the neural

  19. Synthesis of Distributed Execution Platforms for Cyber-Physical Systems with Applications to

    E-Print Network [OSTI]

    Carloni, Luca

    of the behavior, such as time, that are essential to CPSs. For this reason, CPS designers are forced to extensive are just a few examples of Cyber-Physical Systems (CPS) [1], [2], [3], [4], [5], [6]. The characterizing

  20. Researchers develop new search tool to help fight child porn, catch cyber

    E-Print Network [OSTI]

    Fung, Benjamin C. M.

    Researchers develop new search tool to help fight child porn, catch cyber thieves Canada Standard a comment... Post to Facebook 0 0 New #12;Researchers develop new search tool to help fight child porn

  1. Towards an Experimental Testbed Facility for Cyber-Physical Security Research

    SciTech Connect (OSTI)

    Edgar, Thomas W.; Manz, David O.; Carroll, Thomas E.

    2012-01-07T23:59:59.000Z

    Cyber-Physical Systems (CPSs) are under great scrutiny due to large Smart Grid investments and recent high profile security vulnerabilities and attacks. Research into improved security technologies, communication models, and emergent behavior is necessary to protect these systems from sophisticated adversaries and new risks posed by the convergence of CPSs with IT equipment. However, cyber-physical security research is limited by the lack of access to universal cyber-physical testbed facilities that permit flexible, high-fidelity experiments. This paper presents a remotely-configurable and community-accessible testbed design that integrates elements from the virtual, simulated, and physical environments. Fusing data between the three environments enables the creation of realistic and scalable environments where new functionality and ideas can be exercised. This novel design will enable the research community to analyze and evaluate the security of current environments and design future, secure, cyber-physical technologies.

  2. A quantitative man-machine model for cyber security efficiency analysis

    E-Print Network [OSTI]

    Jung, Sung-Oh

    2007-04-25T23:59:59.000Z

    The analysis of security defense processes is of utmost importance in the management of various cyber-security attacks, which are increasing in scope and rapidity. Organizations need to optimize their resources based on a sound understanding...

  3. Strategic philanthropy for cyber security : an extended cost-benefit analysis framework to study cybersecurity

    E-Print Network [OSTI]

    Cho, Yiseul

    2012-01-01T23:59:59.000Z

    The international climate of cyber security is dramatically changing and thus unpredictable. As such, agile yet sustainable solutions are needed, along with an effective and a pragmatic evaluation framework to assess and ...

  4. On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and

    E-Print Network [OSTI]

    Yang, Junfeng

    On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons by the Computer Emergency Response Team (CERT), and which surveyed 523 security executives and law enforcement

  5. Jack N. Summe Director, Navy Insider Threat to Cyber Security (ITCS)

    E-Print Network [OSTI]

    Jack N. Summe Director, Navy Insider Threat to Cyber Security (ITCS) Mr. Jack Summe currently Psychological Operations Group (Airborne) from 2003-2005. A native of Warsaw, Indiana, he holds a bachelor

  6. PEV Infrastructure Needs UC Davis Policy Institute

    E-Print Network [OSTI]

    California at Davis, University of

    ,000 sales in 2012, ramp up to 20,000/yr in 2013 2012 Honda Fit EV 2012 Tesla Model S Infrastructure needs1 PEV Infrastructure Needs UC Davis Policy Institute Policy Forum Series: ZEVs June 13, 2012 www into an increasingly clean, efficient, reliable, and safe electricity grid · PEVs advance energy security, air quality

  7. CLOUD COMPUTING INFRASTRUCTURE AND OPERATIONS PROGRAM

    E-Print Network [OSTI]

    Schaefer, Marcus

    theory and best practices, Cloud operations analytics, globally-responsive architecture, functional of Cloud infrastructures Best practices for building Infrastructure as a Service (IaaS), with an emphasis-distributed, responsive web application capable of massive scale with operational performance metrics. DePaul University

  8. A Product Software Knowledge Infrastructure for

    E-Print Network [OSTI]

    Utrecht, Universiteit

    1 A Product Software Knowledge Infrastructure for Situational Capability Maturation: Vision and Case Studies in Product Management Inge van de Weerd, Johan Versendaal and Sjaak Brinkkemper Department-3275 #12;2 A Product Software Knowledge Infrastructure for Situational Capability Maturation: Vision

  9. Site Support Program Plan Infrastructure Program

    SciTech Connect (OSTI)

    NONE

    1995-09-26T23:59:59.000Z

    The Fiscal Year 1996 Infrastructure Program Site Support Program Plan addresses the mission objectives, workscope, work breakdown structures (WBS), management approach, and resource requirements for the Infrastructure Program. Attached to the plan are appendices that provide more detailed information associated with scope definition. The Hanford Site`s infrastructure has served the Site for nearly 50 years during defense materials production. Now with the challenges of the new environmental cleanup mission, Hanford`s infrastructure must meet current and future mission needs in a constrained budget environment, while complying with more stringent environmental, safety, and health regulations. The infrastructure requires upgrading, streamlining, and enhancement in order to successfully support the site mission of cleaning up the Site, research and development, and economic transition.

  10. S E R I E S SEISMIC ENGINEERING RESEARCH INFRASTRUCTURES

    E-Print Network [OSTI]

    S E R I E S SEISMIC ENGINEERING RESEARCH INFRASTRUCTURES FOR EUROPEAN SYNERGIES COMMISSION platform for distributed hybrid testing #12;SEISMIC ENGINEERING RESEARCH INFRASTRUCTURES FOR EUROPEAN? Celestina Overview Implementation Validation Next steps #12;SEISMIC ENGINEERING RESEARCH INFRASTRUCTURES

  11. SEISMIC ENGINEERING RESEARCH INFRASTRUCTURES FOR EUROPEAN SYNERGIES ENISTAT: Experimental and

    E-Print Network [OSTI]

    SEISMIC ENGINEERING RESEARCH INFRASTRUCTURES FOR EUROPEAN SYNERGIES ENISTAT: Experimental-TA Project #12;SEISMIC ENGINEERING RESEARCH INFRASTRUCTURES FOR EUROPEAN SYNERGIES Partners (Users) · METU Ragueneau · SCHOECK (Germany): Steffen Scheer, Seref Diler #12;SEISMIC ENGINEERING RESEARCH INFRASTRUCTURES

  12. S E R I E S SEISMIC ENGINEERING RESEARCH INFRASTRUCTURES

    E-Print Network [OSTI]

    S E R I E S SEISMIC ENGINEERING RESEARCH INFRASTRUCTURES FOR EUROPEAN SYNERGIES COMMISSION Database: Architecture and implementation #12;SEISMIC ENGINEERING RESEARCH INFRASTRUCTURES FOR EUROPEAN Conclusions #12;SEISMIC ENGINEERING RESEARCH INFRASTRUCTURES FOR EUROPEAN SYNERGIES 3 SERIES Concluding

  13. Cyber-Security Considerations for the Smart Grid

    SciTech Connect (OSTI)

    Clements, Samuel L.; Kirkham, Harold

    2010-07-26T23:59:59.000Z

    The electrical power grid is evolving into the “smart grid”. The goal of the smart grid is to improve efficiency and availability of power by adding more monitoring and control capabilities. These new technologies and mechanisms are certain to introduce vulnerabilities into the power grid. In this paper we provide an overview of the cyber security state of the electrical power grid. We highlight some of the vulnerabilities that already exist in the power grid including limited capacity systems, implicit trust and the lack of authentication. We also address challenges of complexity, scale, added capabilities and the move to multipurpose hardware and software as the power grid is upgraded. These changes create vulnerabilities that did not exist before and bring increased risks. We conclude the paper by showing that there are a number mitigation strategies that can help keep the risk at an acceptable level.

  14. Growth of the NGV Market: Lessons Learned Roadmap for Infrastructure...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Growth of the NGV Market: Lessons Learned Roadmap for Infrastructure Development Growth of the NGV Market: Lessons Learned Roadmap for Infrastructure Development Presented at...

  15. April 7 Webinar on OE's Resilient Electricity Delivery Infrastructure...

    Energy Savers [EERE]

    April 7 Webinar on OE's Resilient Electricity Delivery Infrastructure Initiative FOA April 7 Webinar on OE's Resilient Electricity Delivery Infrastructure Initiative FOA March 23,...

  16. H2A Hydrogen Delivery Infrastructure Analysis Models and Conventional...

    Energy Savers [EERE]

    H2A Hydrogen Delivery Infrastructure Analysis Models and Conventional Pathway Options Analysis Results - Interim Report H2A Hydrogen Delivery Infrastructure Analysis Models and...

  17. Challenge # 2 Logistics and Compatibility with Existing Infrastructure...

    Office of Environmental Management (EM)

    2 Logistics and Compatibility with Existing Infrastructure Throughout Supply Chain Challenge 2 Logistics and Compatibility with Existing Infrastructure Throughout Supply Chain...

  18. Publication of "Year in Review 2010: Energy Infrastructure Events...

    Energy Savers [EERE]

    Publication of "Year in Review 2010: Energy Infrastructure Events and Expansions" Publication of "Year in Review 2010: Energy Infrastructure Events and Expansions" August 31, 2011...

  19. Energy Infrastructure Events and Expansions Year-in-Review 2011...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Infrastructure Events and Expansions Year-in-Review 2011 Available (April 2012) Energy Infrastructure Events and Expansions Year-in-Review 2011 Available (April 2012) May 1, 2012 -...

  20. Year-in-Review: 2014 Energy Infrastructure Events and Expansions...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Year-in-Review: 2014 Energy Infrastructure Events and Expansions Report Now Available (May 2015) Year-in-Review: 2014 Energy Infrastructure Events and Expansions Report Now...

  1. Year-in-Review: 2013 Energy Infrastructure Events and Expansions...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3 Energy Infrastructure Events and Expansions Now Available (May 2014) Year-in-Review: 2013 Energy Infrastructure Events and Expansions Now Available (May 2014) May 12, 2014 -...

  2. Year-in-Review: 2012 Energy Infrastructure Events and Expansions...

    Energy Savers [EERE]

    2 Energy Infrastructure Events and Expansions Now Available (July 2013) Year-in-Review: 2012 Energy Infrastructure Events and Expansions Now Available (July 2013) July 26, 2013 -...

  3. Implementing a Hydrogen Energy Infrastructure: Storage Options and System Design

    E-Print Network [OSTI]

    Ogden, Joan M; Yang, Christopher

    2005-01-01T23:59:59.000Z

    to International Journal of Hydrogen Energy (November 2005).05—28 Implementing a Hydrogen Energy Infrastructure: StorageImplementing a Hydrogen Energy Infrastructure: Storage

  4. Green Infrastructure and Flood Resiliency-Land Use Management...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Infrastructure and Flood Resiliency-Land Use Management as an Adaptation Strategy in the Built Environment Green Infrastructure and Flood Resiliency-Land Use Management as an...

  5. taking charge : optimizing urban charging infrastructure for shared electric vehicles

    E-Print Network [OSTI]

    Subramani, Praveen

    2012-01-01T23:59:59.000Z

    This thesis analyses the opportunities and constraints of deploying charging infrastructure for shared electric vehicles in urban environments. Existing electric vehicle charging infrastructure for privately owned vehicles ...

  6. Webinar November 18: An Overview of the Hydrogen Fueling Infrastructur...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    18: An Overview of the Hydrogen Fueling Infrastructure Research and Station Technology (H2FIRST) Project Webinar November 18: An Overview of the Hydrogen Fueling Infrastructure...

  7. FY 2003 Progress Report for Hydrogen, Fuel Cells and Infrastructure...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    FY 2003 Progress Report for Hydrogen, Fuel Cells and Infrastructure Technologies Program FY 2003 Progress Report for Hydrogen, Fuel Cells and Infrastructure Technologies Program...

  8. Analysis of a Cluster Strategy for Near Term Hydrogen Infrastructure...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    a Cluster Strategy for Near Term Hydrogen Infrastructure Rollout in Southern California Analysis of a Cluster Strategy for Near Term Hydrogen Infrastructure Rollout in Southern...

  9. Short Paper: PEPSI: Privacy-Enhanced Participatory Sensing Infrastructure

    E-Print Network [OSTI]

    Politécnica de Madrid, Universidad

    Short Paper: PEPSI: Privacy-Enhanced Participatory Sensing Infrastructure Emiliano De Cristofaro-secure guarantees. In this paper, we introduce PEPSI: Privacy- Enhanced Participatory Sensing Infrastructure. We

  10. Fuel Cell Electric Vehicles and Hydrogen Infrastructure: Deployment...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Fuel Cell Electric Vehicles and Hydrogen Infrastructure: Deployment and Issues Fuel Cell Electric Vehicles and Hydrogen Infrastructure: Deployment and Issues This presentation by...

  11. EPA Webcast - Creating a Green Infrastructure Plan to Transform...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    EPA Webcast - Creating a Green Infrastructure Plan to Transform Your Community EPA Webcast - Creating a Green Infrastructure Plan to Transform Your Community November 18, 2014...

  12. Webinar: Creating a Green Infrastructure Plan to Transform Your...

    Broader source: Energy.gov (indexed) [DOE]

    Webinar: Creating a Green Infrastructure Plan to Transform Your Community Webinar: Creating a Green Infrastructure Plan to Transform Your Community November 18, 2014 3:00PM to...

  13. Evalutation of Natural Gas Pipeline Materials and Infrastructure...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Evalutation of Natural Gas Pipeline Materials and Infrastructure for HydrogenMixed Gas Service Evalutation of Natural Gas Pipeline Materials and Infrastructure for HydrogenMixed...

  14. Natural Gas Infrastructure R&D and Methane Emissions Mitigation...

    Energy Savers [EERE]

    Natural Gas Infrastructure R&D and Methane Emissions Mitigation Workshop Natural Gas Infrastructure R&D and Methane Emissions Mitigation Workshop The Advanced Manufacturing Office...

  15. Midstream Infrastructure Improvements Key to Realizing Full Potential...

    Office of Environmental Management (EM)

    Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic Natural Gas Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic...

  16. DOE Announces Webinars on Compressed Natural Gas Infrastructure...

    Energy Savers [EERE]

    Compressed Natural Gas Infrastructure, an Advanced Rooftop Unit Campaign, and More DOE Announces Webinars on Compressed Natural Gas Infrastructure, an Advanced Rooftop Unit...

  17. HyDIVE (Hydrogen Dynamic Infrastructure and Vehicle Evolution...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    HyDIVE (Hydrogen Dynamic Infrastructure and Vehicle Evolution) Model Analysis HyDIVE (Hydrogen Dynamic Infrastructure and Vehicle Evolution) Model Analysis Presentation by NREL's...

  18. Hydrogen Vehicle and Infrastructure Codes and Standards Citations...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vehicle and Infrastructure Codes and Standards Citations Hydrogen Vehicle and Infrastructure Codes and Standards Citations This document lists codes and standards typically used...

  19. Improving Risk Assessment to Support State Energy Infrastructure...

    Energy Savers [EERE]

    Improving Risk Assessment to Support State Energy Infrastructure Decision Making Improving Risk Assessment to Support State Energy Infrastructure Decision Making May 22, 2015 -...

  20. Transportation Perspectives on Automotive Cyber Physical System: Integrating Hardware-in-the-Loop, Software-in-the-Loop and Human-in-the-Loop Simulations

    E-Print Network [OSTI]

    Rajkumar, Ragunathan "Raj"

    1 Transportation Perspectives on Automotive Cyber Physical System: Integrating Hardware and development environment to evaluate automotive cyber physical system (CPS) as well as its components foundation of the automotive CPS for developing and testing vehicular networking and sensing technologies

  1. Transforming the U.S. Energy Infrastructure

    SciTech Connect (OSTI)

    Larry Demick

    2010-07-01T23:59:59.000Z

    The U.S. energy infrastructure is among the most reliable, accessible and economic in the world. On the other hand, the U.S. energy infrastructure is excessively reliant on foreign sources of energy, experiences high volatility in energy prices, does not practice good stewardship of finite indigenous energy resources and emits significant quantities of greenhouse gases (GHG). This report presents a Technology Based Strategy to achieve a full transformation of the U.S. energy infrastructure that corrects these negative factors while retaining the positives.

  2. Infrastructure for distributed enterprise simulation

    SciTech Connect (OSTI)

    Johnson, M.M.; Yoshimura, A.S.; Goldsby, M.E. [and others

    1998-01-01T23:59:59.000Z

    Traditional discrete-event simulations employ an inherently sequential algorithm and are run on a single computer. However, the demands of many real-world problems exceed the capabilities of sequential simulation systems. Often the capacity of a computer`s primary memory limits the size of the models that can be handled, and in some cases parallel execution on multiple processors could significantly reduce the simulation time. This paper describes the development of an Infrastructure for Distributed Enterprise Simulation (IDES) - a large-scale portable parallel simulation framework developed to support Sandia National Laboratories` mission in stockpile stewardship. IDES is based on the Breathing-Time-Buckets synchronization protocol, and maps a message-based model of distributed computing onto an object-oriented programming model. IDES is portable across heterogeneous computing architectures, including single-processor systems, networks of workstations and multi-processor computers with shared or distributed memory. The system provides a simple and sufficient application programming interface that can be used by scientists to quickly model large-scale, complex enterprise systems. In the background and without involving the user, IDES is capable of making dynamic use of idle processing power available throughout the enterprise network. 16 refs., 14 figs.

  3. 2nd International Hydrogen Infrastructure Challenges Webinar

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    issues facing hydrogen infrastructure fuel cell electric vehicles in the U.S. Europe, Germany, Scandinavia, and Japan. o H2 Fueling o H2 Quality o H2 metering o H2 Station...

  4. Public private partnership in infrastructure financing

    E-Print Network [OSTI]

    Ahmed, Anas

    2014-01-01T23:59:59.000Z

    The global financial crisis, which was unique in its magnitude and after effects, has generated significant interest in Public Private Partnership (PPP). Lack of investments and deteriorated infrastructure challenges ...

  5. Natural Gas and Hydrogen Infrastructure Opportunities: Markets...

    Broader source: Energy.gov (indexed) [DOE]

    h presentation slides: Natural Gas and hydrogen Infrastructure opportunities: markets and Barriers to Growth Matt Most, Encana Natural Gas 1 OctOber 2011 | ArgOnne nAtiOnAl...

  6. Modeling Risks in Infrastructure Asset Management

    E-Print Network [OSTI]

    Seyedolshohadaie, Seyed Reza

    2012-10-19T23:59:59.000Z

    in privatizing and operational risks in maintenance and rehabilitation of infrastructure facilities. To this end, a valuation procedure for valuing large-scale risky projects is proposed. This valuation approach is based on mean-risk portfolio optimization...

  7. Wireless Sensor Network Infrastructure : Construction and Evaluation

    E-Print Network [OSTI]

    Boyer, Edmond

    Wireless Sensor Network Infrastructure : Construction and Evaluation Kamal Beydoun, Violeta Felea main features for efficient energy management in wireless sensor networks. This paper aims to present a distributed and low-cost topology construction algorithm for wireless sensor networks, addressing

  8. Delaware Transportation Infrastructure Forum Problem Identification Statements

    E-Print Network [OSTI]

    Firestone, Jeremy

    2013 Delaware Transportation Infrastructure Forum Problem Identification Statements Sponsored by The Delaware Center for Transportation and the Delaware Department of Transportation Delaware Center for Transportation Your main resource for transportation education and research Identifying Important Issues Related

  9. Costs Associated With Propane Vehicle Fueling Infrastructure

    SciTech Connect (OSTI)

    Smith, M.; Gonzales, J.

    2014-08-01T23:59:59.000Z

    This document is designed to help fleets understand the cost factors associated with propane vehicle fueling infrastructure. It provides an overview of the equipment and processes necessary to develop a propane fueling station and offers estimated cost ranges.

  10. Obtaining Disaster Assistance for Public Infrastructure

    E-Print Network [OSTI]

    Taylor, Greg

    2005-10-10T23:59:59.000Z

    County and municipal governments, as well as certain private non-profit organizations, may qualify for assistance in rebuilding public infrastructure after a natural disaster. This leaflet details the assistance programs available from the Federal...

  11. Strategic Plan for the Computational Infrastructure

    E-Print Network [OSTI]

    Sugar, Robert

    Strategic Plan for the Computational Infrastructure for Lattice Gauge Theory Lattice QCD Executive is a defining problem for hadron physics just as the hydrogen atom is for atomic physics. Indeed, the DOE

  12. Dispersion of agglomeration through transport infrastructure

    E-Print Network [OSTI]

    Fang, Wanli, Ph. D. Massachusetts Institute of Technology

    2013-01-01T23:59:59.000Z

    My dissertation aims to assess transport infrastructure's influence on the productivity, scale and distribution of urban economic activities through changing intercity accessibility. Standard project-level cost-benefit ...

  13. Social network support for data delivery infrastructures

    E-Print Network [OSTI]

    Sastry, Nishanth Ramakrishna

    2011-10-11T23:59:59.000Z

    in social networks can be used to tailor content staging decisions to the user base and thereby build better data delivery infrastructures. This claim is supported by two case studies, which apply social information in challenging situations where...

  14. Hydrogen Infrastructure Market Readiness Workshop Agenda

    Broader source: Energy.gov (indexed) [DOE]

    NRELDOE Hydrogen Infrastructure Market Readiness Workshop Agenda Page 1 of 2 NRELDOE Workshop at the Gaylord National, Washington D.C., February 16-17, 2011 Transitioning to an...

  15. Hydrogen Fueling Infrastructure Research and Station Technology

    Broader source: Energy.gov [DOE]

    Presentation slides from the DOE Fuel Cell Technologies Office webinar "An Overview of the Hydrogen Fueling Infrastructure Research and Station Technology (H2FIRST) Project" held on November 18, 2014.

  16. Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 3rd A Frame Problem Approach for Adaptive Cyber Security Design

    E-Print Network [OSTI]

    Tappert, Charles

    Problem Approach for Adaptive Cyber Security Design R. Shaikh, T. Bryla, and S. Ahmed Pace University entails the motivation and efforts to integrate the Frame Problem approach to the distributed cyber in the context of network security counteraction against cyber-attacks. A simple simulator is designed

  17. The scientific case for eInfrastructure in Norway

    E-Print Network [OSTI]

    Helgaker, Trygve

    The scientific case for eInfrastructure in Norway The eInfrastructure Scientific Opportunities Panel #12;2 3 The scientific case for eInfrastructure in Norway The eInfrastructure Scientific Opportunities Panel Appointed by the Research Council of Norway Galen Gisler (chair) Physics of Geological

  18. INNOVATIONS IN NUCLEAR INFRASTRUCTURE AND EDUCATION (INIE) CONSORTIA - CURRENT STATUS

    SciTech Connect (OSTI)

    Fjeld, R.A.; Gutteridge, J.; Williamson, C.

    2004-10-06T23:59:59.000Z

    This presentation discusses the current status of innovations in the Nuclear Infrastructure and Education (INIE) Consortia.

  19. SERIES workshopSERIES workshop Role of research infrastructures in seismic rehabilitationRole of research infrastructures in seismic rehabilitationRole of research infrastructures in seismic rehabilitationRole of research infrastructures in seismic rehabi

    E-Print Network [OSTI]

    SERIES workshopSERIES workshop Role of research infrastructures in seismic rehabilitationRole of research infrastructures in seismic rehabilitationRole of research infrastructures in seismic rehabilitationRole of research infrastructures in seismic rehabilitation Istanbul, 8Istanbul, 8--9 February 20129

  20. CS3600 Lab Manual CyberCIEGE is an information assurance (IA) training tool that illustrates computer and

    E-Print Network [OSTI]

    CS3600 Lab Manual Lab SSL CyberCIEGE is an information assurance (IA) training tool. The CyberCIEGE SSL scenario illustrates the use of SSL to authenticate the identity of web servers. This scenario explores the following concepts: · SSL is a means of authenticating a server (e.g., a web server

  1. A Case Study on the Model-Based Design and Integration of Automotive Cyber-Physical Systems

    E-Print Network [OSTI]

    Koutsoukos, Xenofon D.

    A Case Study on the Model-Based Design and Integration of Automotive Cyber-Physical Systems Di--Cyber-physical systems (CPS), such as automotive systems, are very difficult to design due to the tight interactions of an integrated automotive control system. The system is composed of two independently designed controllers

  2. Automotive Cyber Physical Systems in the Context of Human Mobility Daniel Work, Alexandre Bayen, and Quinn Jacobson

    E-Print Network [OSTI]

    Automotive Cyber Physical Systems in the Context of Human Mobility Daniel Work, Alexandre Bayen with other technologies. In the larger context of human mobility, the automotive CPS must become more open in the surrounding physical environment. II. FUNDAMENTAL LIMITATIONS OF THE EXISTING AUTOMOTIVE CYBER PHYSICAL SYSTEM

  3. The Impact of Secure OSs on Internet Security: What Cyber-Insurers Need to Know

    E-Print Network [OSTI]

    Pal, Ranjan

    2012-01-01T23:59:59.000Z

    In recent years, researchers have proposed \\emph{cyber-insurance} as a suitable risk-management technique for enhancing security in Internet-like distributed systems. However, amongst other factors, information asymmetry between the insurer and the insured, and the inter-dependent and correlated nature of cyber risks have contributed in a big way to the failure of cyber-insurance markets. Security experts have argued in favor of operating system (OS) platform switching (ex., from Windows to Unix-based OSs) or secure OS adoption as being one of the techniques that can potentially mitigate the problems posing a challenge to successful cyber-insurance markets. In this regard we model OS platform switching dynamics using a \\emph{social gossip} mechanism and study three important questions related to the nature of the dynamics, for Internet-like distributed systems: (i) which type of networks should cyber-insurers target for insuring?, (ii) what are the bounds on the asymptotic performance level of a network, wher...

  4. A Cyber Security Self-Assessment Method for Nuclear Power Plants

    SciTech Connect (OSTI)

    Glantz, Clifford S.; Coles, Garill A.; Bass, Robert B.

    2004-11-01T23:59:59.000Z

    A cyber security self-assessment method (the Method) has been developed by Pacific Northwest National Laboratory. The development of the Method was sponsored and directed by the U.S. Nuclear Regulatory Commission. Members of the Nuclear Energy Institute Cyber Security Task Force also played a substantial role in developing the Method. The Method's structured approach guides nuclear power plants in scrutinizing their digital systems, assessing the potential consequences to the plant of a cyber exploitation, identifying vulnerabilities, estimating cyber security risks, and adopting cost-effective protective measures. The focus of the Method is on critical digital assets. A critical digital asset is a digital device or system that plays a role in the operation, maintenance, or proper functioning of a critical system (i.e., a plant system that can impact safety, security, or emergency preparedness). A critical digital asset may have a direct or indirect connection to a critical system. Direct connections include both wired and wireless communication pathways. Indirect connections include sneaker-net pathways by which software or data are manually transferred from one digital device to another. An indirect connection also may involve the use of instructions or data stored on a critical digital asset to make adjustments to a critical system. The cyber security self-assessment begins with the formation of an assessment team, and is followed by a six-stage process.

  5. Protecting Intelligent Distributed Power Grids against Cyber Attacks

    SciTech Connect (OSTI)

    Dong Wei; Yan Lu; Mohsen Jafari; Paul Skare; Kenneth Rohde

    2010-12-31T23:59:59.000Z

    Like other industrial sectors, the electrical power industry is facing challenges involved with the increasing demand for interconnected operations and control. The electrical industry has largely been restructured due to deregulation of the electrical market and the trend of the Smart Grid. This moves new automation systems from being proprietary and closed to the current state of Information Technology (IT) being highly interconnected and open. However, while gaining all of the scale and performance benefits of IT, existing IT security challenges are acquired as well. The power grid automation network has inherent security risks due to the fact that the systems and applications for the power grid were not originally designed for the general IT environment. In this paper, we propose a conceptual layered framework for protecting power grid automation systems against cyber attacks. The following factors are taken into account: (1) integration with existing, legacy systems in a non-intrusive fashion; (2) desirable performance in terms of modularity, scalability, extendibility, and manageability; (3) alignment to the 'Roadmap to Secure Control Systems in the Energy Sector' and the future smart grid. The on-site system test of the developed prototype security system is briefly presented as well.

  6. Spatial Data Infrastructure of the Plurinational State of Bolivia Spatial Data Infrastructure of the

    E-Print Network [OSTI]

    Köbben, Barend

    Spatial Data Infrastructure of the Plurinational State of Bolivia Spatial Data Infrastructure of the Plurinational State of Bolivia A free and democratic SDI by Raul Fernando Molina Rodriguez and Sylvain Lesage GeoBolivia (Bolivia). rmolina@geo.gob.bo Abstract The Vice Presidency of the State, with the help

  7. A Secured Health Care Application Architecture for Cyber-Physical Systems

    E-Print Network [OSTI]

    Wang, Jin; Lee, Sungyoung; Shu, Lei; Xia, Feng

    2012-01-01T23:59:59.000Z

    Cyber-physical systems (CPS) can be viewed as a new generation of systems with integrated control, communication and computational capabilities. Like the internet transformed how humans interact with one another, cyber-physical systems will transform how people interact with the physical world. Currently, the study of CPS is still in its infancy and there exist many research issues and challenges ranging from electricity power, health care, transportation and smart building etc. In this paper, an introduction of CPeSC3 (cyber physical enhanced secured wireless sensor networks (WSNs) integrated cloud computing for u-life care) architecture and its application to the health care monitoring and decision support systems is given. The proposed CPeSC3 architecture is composed of three main components, namely 1) communication core, 2) computation core, and 3) resource scheduling and management core. Detailed analysis and explanation are given for relevant models such as cloud computing, real time scheduling and secu...

  8. ReSS: Resource Selection Service for National and Campus Grid Infrastructure

    SciTech Connect (OSTI)

    Mhashilkar, Parag; Garzoglio, Gabriele; Levshina, Tanya; Timm, Steve; /Fermilab

    2009-05-01T23:59:59.000Z

    The Open Science Grid (OSG) offers access to around hundred Compute elements (CE) and storage elements (SE) via standard Grid interfaces. The Resource Selection Service (ReSS) is a push-based workload management system that is integrated with the OSG information systems and resources. ReSS integrates standard Grid tools such as Condor, as a brokering service and the gLite CEMon, for gathering and publishing resource information in GLUE Schema format. ReSS is used in OSG by Virtual Organizations (VO) such as Dark Energy Survey (DES), DZero and Engagement VO. ReSS is also used as a Resource Selection Service for Campus Grids, such as FermiGrid. VOs use ReSS to automate the resource selection in their workload management system to run jobs over the grid. In the past year, the system has been enhanced to enable publication and selection of storage resources and of any special software or software libraries (like MPI libraries) installed at computing resources. In this paper, we discuss the Resource Selection Service, its typical usage on the two scales of a National Cyber Infrastructure Grid, such as OSG, and of a campus Grid, such as FermiGrid.

  9. Final Report on National NGV Infrastructure

    SciTech Connect (OSTI)

    GM Sverdrup; JG DeSteese; ND Malcosky

    1999-01-07T23:59:59.000Z

    This report summarizes work fimded jointly by the U.S. Department of Energy (DOE) and by the Gas Research Institute (GRI) to (1) identi& barriers to establishing sustainable natural gas vehicle (NGV) infrastructure and (2) develop planning information that can help to promote a NGV infrastructure with self-sustaining critical maw. The need for this work is driven by the realization that demand for NGVS has not yet developed to a level that provides sufficient incentives for investment by the commercial sector in all necessary elements of a supportive infrastructure. The two major objectives of this project were: (1) to identifi and prioritize the technical barriers that may be impeding growth of a national NGV infrastructure and (2) to develop input that can assist industry in overcoming these barriers. The approach used in this project incorporated and built upon the accumulated insights of the NGV industry. The project was conducted in three basic phases: (1) review of the current situation, (2) prioritization of technical infrastructure btiiers, and (3) development of plans to overcome key barriers. An extensive and diverse list of barriers was obtained from direct meetings and telephone conferences with sixteen industry NGV leaders and seven Clean Cities/Clean Corridors coordinators. This information is filly documented in the appendix. A distillation of insights gained in the interview process suggests that persistent barriers to developing an NGV market and supporting infrastructure can be grouped into four major categories: 1. Fuel station economics 2. Value of NGVs from the owner/operator perspective 3. Cooperation necessary for critical mass 4. Commitment by investors. A principal conclusion is that an efficient and effective approach for overcoming technical barriers to developing an NGV infrastructure can be provided by building upon and consolidating the relevant efforts of the NGV industry and government. The major recommendation of this project is the establishment of an ad hoc NGV Infrastructure Working Group (NGV-I WG) to address the most critical technical barriers to NGV infrastructure development. This recommendation has been considered and approved by both the DOE and GRI and is the basis of continued collaboration in this area.

  10. Clean Energy Infrastructure Educational Initiative

    SciTech Connect (OSTI)

    Hallinan, Kevin; Menart, James; Gilbert, Robert

    2012-08-31T23:59:59.000Z

    The Clean Energy Infrastructure Educational Initiative represents a collaborative effort by the University of Dayton, Wright State University and Sinclair Community College. This effort above all aimed to establish energy related programs at each of the universities while also providing outreach to the local, state-wide, and national communities. At the University of Dayton, the grant has aimed at: solidfying a newly created Masterâ??s program in Renewable and Clean Energy; helping to establish and staff a regional sustainability organization for SW Ohio. As well, as the prime grantee, the University of Dayton was responsible for insuring curricular sharing between WSU and the University of Dayton. Finally, the grant, through its support of graduate students, and through cooperation with the largest utilities in SW Ohio enabled a region-wide evaluation of over 10,000 commercial building buildings in order to identify the priority buildings in the region for energy reduction. In each, the grant has achieved success. The main focus of Wright State was to continue the development of graduate education in renewable and clean energy. Wright State has done this in a number of ways. First and foremost this was done by continuing the development of the new Renewable and Clean Energy Masterâ??s Degree program at Wright State . Development tasks included: continuing development of courses for the Renewable and Clean Energy Masterâ??s Degree, increasing the student enrollment, and increasing renewable and clean energy research work. The grant has enabled development and/or improvement of 7 courses. Collectively, the University of Dayton and WSU offer perhaps the most comprehensive list of courses in the renewable and clean energy area in the country. Because of this development, enrollment at WSU has increased from 4 students to 23. Secondly, the grant has helped to support student research aimed in the renewable and clean energy program. The grant helped to solidify new research in the renewable and clean energy area. The educational outreach provided as a result of the grant included activities to introduce renewable and clean energy design projects into the Mechanical and Materials Engineering senior design class, the development of a geothermal energy demonstration unit, and the development of renewable energy learning modules for high school students. Finally, this grant supported curriculum development by Sinclair Community College for seven new courses and acquisition of necessary related instrumentation and laboratory equipment. These new courses, EGV 1201 Weatherization Training, EGV 1251 Introduction to Energy Management Principles, EGV 2301 Commercial and Industrial Assessment, EGV 2351 LEED Green Associate Exam Preparation, EGV 2251 Energy Control Strategies, EGV Solar Photovoltaic Design and Installation, and EGV Solar Thermal Systems, enable Sinclair to offer complete Energy Technology Certificate and an Energy Management Degree programs. To date, 151 students have completed or are currently registered in one of the seven courses developed through this grant. With the increasing interest in the Energy Management Degree program, Sinclair has begun the procedure to have the program approved by the Ohio Board of Regents.

  11. Securing Infrastructure from High Explosive Threats

    SciTech Connect (OSTI)

    Glascoe, L; Noble, C; Reynolds, J; Kuhl, A; Morris, J

    2009-03-20T23:59:59.000Z

    Lawrence Livermore National Laboratory (LLNL) is working with the Department of Homeland Security's Science and Technology Directorate, the Transportation Security Administration, and several infrastructure partners to characterize and help mitigate principal structural vulnerabilities to explosive threats. Given the importance of infrastructure to the nation's security and economy, there is a clear need for applied research and analyses (1) to improve understanding of the vulnerabilities of these systems to explosive threats and (2) to provide decision makers with time-critical technical assistance concerning countermeasure and mitigation options. Fully-coupled high performance calculations of structural response to ideal and non-ideal explosives help bound and quantify specific critical vulnerabilities, and help identify possible corrective schemes. Experimental validation of modeling approaches and methodologies builds confidence in the prediction, while advanced stochastic techniques allow for optimal use of scarce computational resources to efficiently provide infrastructure owners and decision makers with timely analyses.

  12. Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy (DOE) Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session. The meeting will be livestreamed at energy.gov/live

  13. Optimized Pathways for Regional H2 Infrastructure Transitions: The Least-Cost Hydrogen for Southern California

    E-Print Network [OSTI]

    Lin, Zhenhong; Chen, Chien-Wei; Fan, Yueyue; Ogden, Joan M.

    2008-01-01T23:59:59.000Z

    P. Rutter, et al. Hydrogen infrastructure strategic planningModelling of Hydrogen infrastructure for vehicle refuellingof building up a hydrogen infrastructure in Southern

  14. Dynamics in Behavioral Response to Fuel-Cell Vehicle Fleet and Hydrogen Infrastructure: An Exploratory Study

    E-Print Network [OSTI]

    Shaheen, Susan; Martin, Elliot; Lipman, Timothy

    2008-01-01T23:59:59.000Z

    response to FCV and hydrogen infrastructure questions amongits supporting hydrogen infrastructure. In 2006, UC Berke-standing of hydrogen FCVs and infrastructure, researchers at

  15. Analyzing Natural Gas Based Hydrogen Infrastructure - Optimizing Transitions from Distributed to Centralized H2 Production

    E-Print Network [OSTI]

    Yang, Christopher; Ogden, Joan M

    2005-01-01T23:59:59.000Z

    for building up hydrogen infrastructure that are guided byModeling Regional Hydrogen Infrastructure Development . inNATURAL GAS BASED HYDROGEN INFRASTRUCTURE – OPTIMIZING

  16. Optimized Pathways for Regional H2 Infrastructure Transitions: A Case Study for Southern California

    E-Print Network [OSTI]

    Lin, Zhenhong; Fan, Yueyue; Ogden, Joan M; Chen, Chien-Wei

    2008-01-01T23:59:59.000Z

    P. Rutter, et al. Hydrogen infrastructure strategic planningModelling of Hydrogen infrastructure for vehicle refuellingof building up a hydrogen infrastructure in Southern

  17. ITL BULLETIN FOR OCTOBER 2010 CYBER SECURITY STRATEGIES FOR THE SMART GRID: PROTECTING THE

    E-Print Network [OSTI]

    DIGITAL INFRASTRUCTURE FOR ELECTRIC POWER Shirley Radack, Editor Computer Security Division Information effort is under way to transform the U.S. electric power infrastructure into an advanced digital and availability of the electric power infrastructure. These technologies must be designed and implemented early

  18. 2nd International Hydrogen Infrastructure Challenges Webinar

    Broader source: Energy.gov [DOE]

    On Tuesday, March 10, at 8 a.m. EDT, the Fuel Cell Technologies Office will present a webinar to summarize the 2nd international information exchange on the hydrogen refueling infrastructure challenges and potential solutions to support the successful global commercialization of hydrogen fuel cell electric vehicles.

  19. Information Systems as Infrastructure for University Research

    E-Print Network [OSTI]

    Information Systems as Infrastructure for University Research Now and in the Future Merrill Series.......................................................................................................1 Senior Fellow, Association of Public and Land Grant Universities Information Systems Research Stakeholders Soft Power to Connect the Dots in Information Haystacks #12;iv David Swanson

  20. AIFdb: Infrastructure for the Argument Web

    E-Print Network [OSTI]

    Reed, Chris

    AIFdb: Infrastructure for the Argument Web John LAWRENCE, Floris BEX, Chris REED and Mark SNAITH, a database solution for the Ar- gument Web. AIFdb offers an array of web service interfaces allowing a wide Interchange Format, argument web 1. Introduction The Argument Web [3] is a vision for a large-scale Web

  1. Office of Hydrogen, Fuel Cells & Infrastructure Technologies

    E-Print Network [OSTI]

    . Hydrogen Storage 2. Hydrogen Production 3. Fuel Cell Cost Reduction #12;Major Fuel Cell Decisions FuelOffice of Hydrogen, Fuel Cells & Infrastructure Technologies (proposed) Steve Chalk May 6, 2002 #12 DAS Associate DASIndustrial Technologies Implementation A Director Solar Energy Technologies Director

  2. A Virtual Infrastructure for Wireless Sensor Networks

    E-Print Network [OSTI]

    Stojmenovic, Ivan

    &CHAPTER 4 A Virtual Infrastructure for Wireless Sensor Networks STEPHAN OLARIU and QINGWEN XU Old, and wireless communications 107 Handbook of Sensor Networks: Algorithms and Architectures, Edited by I and communication infra- structures, called wireless sensor networks, will have a significant impact on a wide array

  3. Controlled Hydrogen Fleet and Infrastructure Analysis (Presentation)

    SciTech Connect (OSTI)

    Wipke, K.; Sprik, S.; Kurtz, J.; Ramsden, T.; Ainscough, C.; Saur, G.

    2012-05-01T23:59:59.000Z

    This is a presentation about the Fuel Cell Electric Vehicle Learning Demo, a 7-year project and the largest single FCEV and infrastructure demonstration in the world to date. Information such as its approach, technical accomplishments and progress; collaborations and future work are discussed.

  4. Adaptive Infrastructures Toward a Secure and

    E-Print Network [OSTI]

    Amin, S. Massoud

    concept important to the Electric Power Grid and Energy Infrastructure? ­ A secure "architected" sensing of computer, communication, sensing and control technology which operates in parallel with an electric power grid for the purpose of enhancing the reliability of electric power delivery, minimizing the cost

  5. London 2012 Infrastructure Design, Sustainability and Innovation,

    E-Print Network [OSTI]

    Painter, Kevin

    February 2013 #12;#12;London 2012 Aspiration of a Sustainable Games #12;#12;Project Management , for both soil and groundwater treatment. As part of this work, we have managed the excavation and reuseLondon 2012 Infrastructure Design, Sustainability and Innovation, Inspiring an Industry

  6. An Infrastructure for Adaptive Dynamic Optimization

    E-Print Network [OSTI]

    Amarasinghe, Saman

    An Infrastructure for Adaptive Dynamic Optimization Derek Bruening, Timothy Garnett, and Saman,timothyg,saman}@lcs.mit.edu Abstract Dynamic optimization is emerging as a promising ap- proach to overcome many of the obstacles static optimizations, there are very few for developing dynamic optimizations. We present a framework

  7. Towards a Ubiquitous Cloud Computing Infrastructure

    E-Print Network [OSTI]

    van der Merwe, Kobus

    Towards a Ubiquitous Cloud Computing Infrastructure Jacobus Van der Merwe, K.K. Ramakrishnan of a number of cloud computing use cases. We specifically consider cloudbursting and follow-the-sun and focus that are also network service providers. I. INTRODUCTION Cloud computing is rapidly gaining acceptance

  8. Hierarchical Infrastructure for Internet Mapping Services

    E-Print Network [OSTI]

    Samet, Hanan

    locally. We investigate this opportunity for further improvement in providing the client with map data access to remote spatial databases adopted by numerous web-based mapping service vendors (e.g., MapChapter 1 Hierarchical Infrastructure for Internet Mapping Services Frantisek Brabec and Hanan

  9. Polish grid infrastructure for science and research

    E-Print Network [OSTI]

    Ryszard Gokieli; Krzysztof Nawrocki; Adam Padee; Dorota Stojda; Karol Wawrzyniak; Wojciech Wislicki

    2007-10-07T23:59:59.000Z

    Structure, functionality, parameters and organization of the computing Grid in Poland is described, mainly from the perspective of high-energy particle physics community, currently its largest consumer and developer. It represents distributed Tier-2 in the worldwide Grid infrastructure. It also provides services and resources for data-intensive applications in other sciences.

  10. An Abrupt Change Detection Heuristic with Applications to Cyber Data Attacks on Power Systems

    E-Print Network [OSTI]

    Sanandaji, Borhan M.

    hardware and software components such as smart meters, Phasor Measurement Units (PMUs), intelligent Borhan dynamics have been traditionally considered as a result of meter aging and malfunctioning, electrical of a designated cyber data attack to the system. In particular, with the emergence of smart grids and its smart

  11. Improving Cyber-Security of Smart Grid Systems via Anomaly Detection and Linguistic Domain Knowledge

    SciTech Connect (OSTI)

    Ondrej Linda; Todd Vollmer; Milos Manic

    2012-08-01T23:59:59.000Z

    The planned large scale deployment of smart grid network devices will generate a large amount of information exchanged over various types of communication networks. The implementation of these critical systems will require appropriate cyber-security measures. A network anomaly detection solution is considered in this work. In common network architectures multiple communications streams are simultaneously present, making it difficult to build an anomaly detection solution for the entire system. In addition, common anomaly detection algorithms require specification of a sensitivity threshold, which inevitably leads to a tradeoff between false positives and false negatives rates. In order to alleviate these issues, this paper proposes a novel anomaly detection architecture. The designed system applies the previously developed network security cyber-sensor method to individual selected communication streams allowing for learning accurate normal network behavior models. Furthermore, the developed system dynamically adjusts the sensitivity threshold of each anomaly detection algorithm based on domain knowledge about the specific network system. It is proposed to model this domain knowledge using Interval Type-2 Fuzzy Logic rules, which linguistically describe the relationship between various features of the network communication and the possibility of a cyber attack. The proposed method was tested on experimental smart grid system demonstrating enhanced cyber-security.

  12. Addressing the Challenges of Anomaly Detection for Cyber Physical Energy Grid Systems

    SciTech Connect (OSTI)

    Ferragut, Erik M [ORNL; Laska, Jason A [ORNL; Melin, Alexander M [ORNL; Czejdo, Bogdan [ORNL

    2013-01-01T23:59:59.000Z

    The consolidation of cyber communications networks and physical control systems within the energy smart grid introduces a number of new risks. Unfortunately, these risks are largely unknown and poorly understood, yet include very high impact losses from attack and component failures. One important aspect of risk management is the detection of anomalies and changes. However, anomaly detection within cyber security remains a difficult, open problem, with special challenges in dealing with false alert rates and heterogeneous data. Furthermore, the integration of cyber and physical dynamics is often intractable. And, because of their broad scope, energy grid cyber-physical systems must be analyzed at multiple scales, from individual components, up to network level dynamics. We describe an improved approach to anomaly detection that combines three important aspects. First, system dynamics are modeled using a reduced order model for greater computational tractability. Second, a probabilistic and principled approach to anomaly detection is adopted that allows for regulation of false alerts and comparison of anomalies across heterogeneous data sources. Third, a hierarchy of aggregations are constructed to support interactive and automated analyses of anomalies at multiple scales.

  13. Engineering Energy Systems of the Future as Cyber-Physical Ecosystems

    E-Print Network [OSTI]

    Ilic, Marija D.

    · Examples of existing and evolving energy industry architectures as particular cases of cyber- physical architectures · The key role of liquid transparent information exchange and processing for arriving at desired solutions (Dynamic Energy Control Protocols ­DECPs) [2-6] · Major R&D questions - The challenge of posing

  14. Minimax Control For Cyber-Physical Systems under Network Packet Scheduling Attacks

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    Minimax Control For Cyber-Physical Systems under Network Packet Scheduling Attacks Yasser Shoukry. Unfortunately, this re- liance on networks also brings new security vulnerabilities for con- trol systems. We and distribute reprints for Governmental purposes notwith- standing any copyright notation thereon. The views

  15. Fidelity-Aware Utilization Control for Cyber-Physical Surveillance Systems Jinzhu Chen1

    E-Print Network [OSTI]

    environments. 1 Introduction Cyber-Physical System (CPS) is a new class of embed- ded systems that tightly fundamental requirement as many compu- tational tasks in a CPS must complete within tight deadlines in order computer for high-fidelity ob- ject detection and recognition. Both fidelity and timeliness are essential

  16. MAR-CPS: Measurable Augmented Reality for Prototyping Cyber-Physical Systems

    E-Print Network [OSTI]

    Reif, Rafael

    MAR-CPS: Measurable Augmented Reality for Prototyping Cyber-Physical Systems Shayegan Omidshafiei in CPSs, hardware-in-the-loop experiments are an essential step for transitioning from simulations to real in the Aerospace Controls Laboratory at the Massachusetts Institute of Technology. This system, referred to as MAR-CPS

  17. Three Tenets for Secure Cyber-Physical System Design and Jeff Hughesa

    E-Print Network [OSTI]

    Cybenko, George

    at designing systems that are "provably" secure according to some idealized formal model of security. In factThree Tenets for Secure Cyber-Physical System Design and Assessment Jeff Hughesa George Cybenkob a design and assessment. Called The Three Tenets, this originally empirical approach has been used

  18. Improved Power Grid Stability and Efficiency with a Building-Energy Cyber-Physical System

    E-Print Network [OSTI]

    or stagnant winds to propel wind turbines). Dur- ing an episode, the power grid operators must contend of an 8-12 hour demand period. The primary power demand is often air conditioning. Efforts to balance1 Improved Power Grid Stability and Efficiency with a Building-Energy Cyber-Physical System Mary

  19. Gaussian Process Learning for Cyber-Attack Early Warning Jian Zhang1

    E-Print Network [OSTI]

    Zhang, Jian

    Gaussian Process Learning for Cyber-Attack Early Warning Jian Zhang1 , Phillip Porras1 , Johannes- gressive attack sources, as such information can help to proactively defend their networks. For this pur of attacks observed by others. However, the total number of reported attackers is huge in these systems. Thus

  20. EVALUATING THREAT ASSESSMENT FOR MULTI-STAGE CYBER ATTACKS Shanchieh Jay Yang

    E-Print Network [OSTI]

    Jay Yang, Shanchieh

    attacks has become a critical issue, yet different from that of traditional physical attacks. Current behavior, hacking methods, and network vulnerabilities. This is different from traditional physical attacks by traditional physical attacks. The question then is how good a cyber threat assessment algorithm one should