Security impact assessment of industrial automation systems using genetic algorithm and simulation

N. Papakonstantinou, S. Sierla, K. Charitoudi, B. O'Halloran, Tommi Karhela, V. Vyatkin, I. Tumer

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

2 Citations (Scopus)

Abstract

Much of the research on security of industrial automation systems has focused on countermeasures such as intrusion detection, certificate management or public key infrastructures. Due to limited resources, countermeasures should be focused to prevent the attacks with highest potential for damage. The impact of an attack can only be determined through a detailed analysis of the interactions of the automation system and the physical system under control. Attacks against single components are similar to ordinary component failures, so our focus is on deliberate damage to several components, since such scenarios are not considered in reliability engineering methods used for industrial automation systems. A simulation based security impact assessment method is proposed, using genetic algorithms to explore the range of possible attacks.
Original languageEnglish
Title of host publicationProceedings of the 2014 IEEE Emerging Technology and Factory Automation, ETFA
PublisherIEEE Institute of Electrical and Electronic Engineers
Number of pages8
ISBN (Electronic)978-1-4799-4845-1
ISBN (Print)978-147994846-8
DOIs
Publication statusPublished - 2014
MoE publication typeA4 Article in a conference publication
Event19th IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2014 - Barcelona, Spain
Duration: 16 Sep 201419 Sep 2014
Conference number: 19

Conference

Conference19th IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2014
Abbreviated titleETFA 2014
CountrySpain
CityBarcelona
Period16/09/1419/09/14

Fingerprint Dive into the research topics of 'Security impact assessment of industrial automation systems using genetic algorithm and simulation'. Together they form a unique fingerprint.

Cite this