Quantifying availability in SCADA environments using the cyber security metric MFC

Anis Ben Aissa, Latifa Ben Arfa Rabai, Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

Supervisory Control and Data Acquisition (SCADA) systems are distributed networks dispersed over large geographic areas that aim to monitor and control industrial processes from remote areas and/or a centralized location. They are used in the management of critical infrastructures such as electric power generation, transmission and distribution, water and sewage, manufacturing/industrial manufacturing as well as oil and gas production. The availability of SCADA systems is tantamount to assuring safety, security and profitability. SCADA systems are the backbone of the national cyber-physical critical infrastructure. Herein, we explore the definition and quantification of an econometric measure of availability, as it applies to SCADA systems; our metric is a specialization of the generic measure of mean failure cost. Copyright is held by the owner/author(s).

Original languageEnglish (US)
Title of host publicationProceedings of 2014 9th Annual Cyber and Information Security Research Conference, CISRC 2014
PublisherAssociation for Computing Machinery
Pages81-84
Number of pages4
ISBN (Print)9781450328128
DOIs
StatePublished - 2014
Event9th Annual Cyber and Information Security Research Conference, CISRC 2014 - Oak Ridge, TN, United States
Duration: Apr 8 2014Apr 10 2014

Publication series

NameACM International Conference Proceeding Series

Other

Other9th Annual Cyber and Information Security Research Conference, CISRC 2014
CountryUnited States
CityOak Ridge, TN
Period4/8/144/10/14

All Science Journal Classification (ASJC) codes

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

Keywords

  • Availability
  • Dependability
  • Security measures
  • Security requirements
  • Threats

Fingerprint Dive into the research topics of 'Quantifying availability in SCADA environments using the cyber security metric MFC'. Together they form a unique fingerprint.

Cite this