Auflistung nach Autor:in "Szemkus, Martin"
1 - 2 von 2
Treffer pro Seite
Sortieroptionen
- TextdokumentSimulation Model for Threat and Impact Analysis on Modern Electrical Power Systems(INFORMATIK 2020, 2021) Gupta, Deeksha; Ding, Yongjian; Govindaraj, Dharini; Lange, Mathias; Szemkus, Martin; Waedt, KarlThe increase in interconnected devices in electrical power systems raises the attack surface of a network and therefore the system connected within the network. Cyber-attacks can lead to power cut of an individual system or multiple systems required in the power generation stage and critical in normal operation of the plant. With the purpose to monitor and understand the impacts of cyber-attacks at the component level, system level and plant level, a testbed simulation environment for the Electrical Power Systems in a virtual power plant was modelled. This paper provides comprehensive information about the developed Simulink model for the electrical power system. The Simulink model was created to leverage freedom of customizing and testing of diverse cyber threat scenarios. The simulation model was set to communicate with physical controller to analyse the system level and plant level impacts of cyber-attacks on the physical devices.
- TextdokumentSupporting Security in Industrial Automation and Control Systems using Domain-Specific Modelling(INFORMATIK 2021, 2021) Altschaffel, Robert; Hempel, Ivo; Keil, Oliver; Schindler, Josef; Szemkus, Martin; Dittmann, Jana; Lange, Matthias; Waedt, Karl; Ding, YongjianThis paper explores how domain specific modelling can be used to support the identification of potential vulnerabilities and risks in Industrial Automation and Control Systems (IACS) to enhance security by enabling a mitigation of these vulnerabilities. This approach can be used to support already deployed IACS or to include Security-by-Design and Security Defence-in-Depth principles in the planning of future facilities. This paper explores the requirements for such a modelling approach including domain and security specific aspects. Three interlinked aspects of IACS which require different modelling approaches are identified leading to three distinct types of models: Infrastructure, cyber-process, and physical process. These three types are relevant for different attack vectors and to judge the potential impact of any attack. This paper shows examples for these three models and how these models can be used to identify vulnerabilities with the aim to close them.