Column Control DTX

Cyber Security Solutions for Critical Infrastructure

技术概述

Cyber threats against public utilities and other critical infrastructure are now just as common as attacks on governmental and corporate computing environments. But, instead of simply losing sensitive data, malicious attacks against power generation and distribution systems, water treatment plants, and transportation facilities can disrupt commerce and daily life across a wide area. 

 

There is a pressing need for operators to determine how resilient their communications fabric is to cyber attacks and to develop plans to mitigate the associated risks.

 

Keysight Technologies’ high-fidelity network emulation is used to simulate and predict the behavior of networked environments based on various operational scenarios, including cyber attacks. The emulation runs in real time and models connections, computers, protocols, firewalls, and other defenses.

 

Keysight Technologies has developed a high-fidelity network emulator, EXata Network Modeling, to simulate the underlying communication fabric of electrical grids and to test the cyber resilience of such systems. EXata Network Modeling is integrated with OPAL-RT’s HYPERSIM simulator on the same hardware (or box) to offer a complete real-time cyber-physical solution for the development, testing, and assessment of electrical grids with communication networks.

 

Benefits of EXata Network Modeling 

 

Some benefits of EXata Network Modeling include:

 

• Integration of emulated network with equipment and physical system dynamics simulation

• Packet-level emulation to predict system behavior under attack

• Scalability to represent the entire network while respecting timing constraints

• Run what-if scenarios of control systems under cyber attack without threatening operations

• Assess the effectiveness of tools, techniques, and architectures to ensure system availability

• Measure and improve system resiliency and develop plans to mitigate risks from cyber attacks

• Packaging of EXata Network Modeling and HYPERSIM in the same box enables fast communication at Layer 2, ensuring that the timing constraints of the overall system can be met

 

Communication Protocols Supported by EXata Network Modeling 

 

EXata Network Modeling communicates with HYPERSIM via these protocols:

 

• Generic Object-Oriented Substation Events (GOOSE), a subset of IEC61850

• C37.118 (over TCP/IP) used by synchrophasors

• DNP3 (over TCP/IP)

• Modbus (over TCP/IP)

 

Types of Attacks and Defenses

 

EXata Network Modeling can model several types of attacks. The most important attacks that impact power systems are:

 

• Denial of Service (DoS): These attacks can bring down or make unavailable a critical piece of equipment.

• Packet modification attacks: These attacks make changes to the payload of packets and can result in:

-       Bogus input data, such as modified sensor data. Can lead to erroneous decisions by the controllers.

-       Bogus output data, such as manipulated or misleading data sent to controllers. Can lead to unintended or incorrect actions.

-       Disrupt time synchronization by delaying delivery. Can lead to instability in the physical system.

×

请销售人员联系我。

*Indicates required field

您希望以何种方式进行联系? *必填项
Preferred method of communication? 更改电子邮件地址?
Preferred method of communication?

请通过单击按钮,提供给是德科技您的个人数据。请在Keysight隐私声明 中,参阅有关我们如何使用此数据的信息,謝謝。

感谢您!

A sales representative will contact you soon.

Column Control DTX