Skip to main content

Adaptive Dispatching of Incidences Based on Reputation for SCADA Systems

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5695))

Abstract

SCADA systems represent a challenging scenario where the management of critical alarms is crucial. Their response to these alarms should be efficient and fast in order to mitigate or contain undesired effects. This work presents a mechanism, the Adaptive Assignment Manager (AAM) that will aid to react to incidences in a more efficient way by dynamically assigning alarms to the most suitable human operator. The mechanism uses various inputs for identifying the operators such as their availability, workload and reputation. In fact, we also define a reputation component that stores the reputation of the human operators and uses feedback from past experiences.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jøsang, A., Ismail, R., Boyd, C.: A Survey of Trust and Reputation Systems for Online Service Provision. Decision Support Systems 43(2), 618–644 (2007)

    Article  Google Scholar 

  2. Resnick, P., Zeckhauser, R., Friedman, E., Kuwabara, K.: Reputation Systems. Communications of ACM 43(12), 45–48 (2000)

    Article  Google Scholar 

  3. Cardenas, A., Amin, S., Sastry, S.: Research Challenges for the Security of Control Systems. In: HotSec 2008 (2008)

    Google Scholar 

  4. Peerenboom, J.P., Fisher, R.E.: Analyzing Cross-Sector Interdependencies. In: IEEE Computer Society, HICSS 2007, pp. 112–119. IEEE Computer Society, Los Alamitos (2007)

    Google Scholar 

  5. Byres, E., Lowe, J.: The myths and facts behind cyber security risks for industrial control systems. In: ’VDE Congress, VDE Association For Electrical, Electronic Information Technologies, British Columbia Institute of Technology and PA Consulting Group (2004)

    Google Scholar 

  6. Department of Energy Office of Energy Assurance. In: Steps to Improve Cyber Security of SCADA Networks, white paper (2002)

    Google Scholar 

  7. NISCC, National Infrastructure Security Co-ordination Centre, NISCC Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks, BCIT (2005)

    Google Scholar 

  8. IEC 60870-5-104, International Electrotechnical Commission (2006)

    Google Scholar 

  9. IEC 60870-6, ICCP/TASE2, International Electrotechnical Commission (2008)

    Google Scholar 

  10. ISACA, Control Objectives for Information and related Technology, rev. 4.1 (2007)

    Google Scholar 

  11. ISO/IEC 17799:2005, Code of Practice for Information Security Management (2005)

    Google Scholar 

  12. NIST Special Publication 800-53 revision 2, Recommended Security Controls for Federal Information Systems (2007)

    Google Scholar 

  13. NIST Special Publication 800-82, DRAFT - Guide to Industrial Control Systems (ICS) Security (2007)

    Google Scholar 

  14. BCIT, British Columbia Institute of Technology (2008), http://www.bcit.ca/

  15. CERT, Carnegie Mellon Software Engineering Institute, CERT/CC Statistics (1988-2008), http://www.cert.org/stats/vulnerability_remediation.html

  16. DNP3, DNP Users Group (2008), http://www.dnp.org

  17. Modbus-IDA, The Architecture for Distributed Automation (2005), http://www.modbus.org/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Alcaraz, C., Agudo, I., Fernandez-Gago, C., Roman, R., Fernandez, G., Lopez, J. (2009). Adaptive Dispatching of Incidences Based on Reputation for SCADA Systems. In: Fischer-Hübner, S., Lambrinoudakis, C., Pernul, G. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2009. Lecture Notes in Computer Science, vol 5695. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03748-1_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03748-1_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03747-4

  • Online ISBN: 978-3-642-03748-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics