Academia.eduAcademia.edu

The ICCP protocol is used for communications between control centers, which enables sharing of SCADA information, while DNP 3.0 is used between control centers and substations for measurement and control. All these communications are conducted via SCADA and _ substation user interfaces. Dispatcher Training Simulator (DTS) is used for training of operators and simulation of system operation, control and restoration scenarios.  consequence of a cyber intrusion scenario on the power grid. Impact analysis can be achieved by computer simulations in a way similar to the present contingency evaluations for online security assessment. Impact analysis is the task to analyze intrusion behaviors and evaluate the consequences of a cyber attack on the power system. The mitigation module serves to illustrate the preventive, remedial or restorative actions to mitigate potential damages caused by cyber intrusion scenarios. Analytical techniques can be evaluated on a software based cyber-power system testbed with the control center and substation models.

Figure 2 The ICCP protocol is used for communications between control centers, which enables sharing of SCADA information, while DNP 3.0 is used between control centers and substations for measurement and control. All these communications are conducted via SCADA and _ substation user interfaces. Dispatcher Training Simulator (DTS) is used for training of operators and simulation of system operation, control and restoration scenarios. consequence of a cyber intrusion scenario on the power grid. Impact analysis can be achieved by computer simulations in a way similar to the present contingency evaluations for online security assessment. Impact analysis is the task to analyze intrusion behaviors and evaluate the consequences of a cyber attack on the power system. The mitigation module serves to illustrate the preventive, remedial or restorative actions to mitigate potential damages caused by cyber intrusion scenarios. Analytical techniques can be evaluated on a software based cyber-power system testbed with the control center and substation models.