Cybersecurity in the Smart Grid: Practitioners' Perspective
- URL: http://arxiv.org/abs/2210.13119v1
- Date: Mon, 24 Oct 2022 11:09:14 GMT
- Title: Cybersecurity in the Smart Grid: Practitioners' Perspective
- Authors: Jacqueline Meyer, Giovanni Apruzzese
- Abstract summary: We interviewed 18 entities, operating in diverse countries in Europe.
Some threats appear to be much less dangerous than what is claimed in related papers.
Some technological paradigms have dubious utility for practitioners, but are actively promoted by literature.
- Score: 1.9798034349981157
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: The Smart Grid (SG) is a cornerstone of modern society, providing the energy
required to sustain billions of lives and thousands of industries.
Unfortunately, as one of the most critical infrastructures of our World, the SG
is an attractive target for attackers. The problem is aggravated by the
increasing adoption of digitalisation, which further increases the SG's
exposure to cyberthreats. Successful exploitation of such exposure leads to
entire countries being paralysed, which is an unacceptable -- but ultimately
inescapable -- risk.
This paper aims to mitigate this risk by elucidating the perspective of real
practitioners on the cybersecurity of the SG. We interviewed 18 entities,
operating in diverse countries in Europe and covering all domains of the SG --
from energy generation, to its delivery. Our analysis highlights a stark
contrast between (a)research and practice, but also between (b) public and
private entities. For instance: some threats appear to be much less dangerous
than what is claimed in related papers; some technological paradigms have
dubious utility for practitioners, but are actively promoted by literature;
finally, practitioners may either under- or over-estimate their own
cybersecurity capabilities. We derive four takeaways that enable future
endeavours to improve the overall cybersecurity in the SG. We conjecture that
most of the problems are due to an improper communication between researchers,
practitioners and regulatory bodies -- which, despite sharing a common goal,
tend to neglect the viewpoint of the other `spheres'.
Related papers
- Generative AI in Cybersecurity [0.0]
Generative Artificial Intelligence (GAI) has been pivotal in reshaping the field of data analysis, pattern recognition, and decision-making processes.
As GAI rapidly progresses, it outstrips the current pace of cybersecurity protocols and regulatory frameworks.
The study highlights the critical need for organizations to proactively identify and develop more complex defensive strategies to counter the sophisticated employment of GAI in malware creation.
arXiv Detail & Related papers (2024-05-02T19:03:11Z) - A Safe Harbor for AI Evaluation and Red Teaming [124.89885800509505]
Some researchers fear that conducting such research or releasing their findings will result in account suspensions or legal reprisal.
We propose that major AI developers commit to providing a legal and technical safe harbor.
We believe these commitments are a necessary step towards more inclusive and unimpeded community efforts to tackle the risks of generative AI.
arXiv Detail & Related papers (2024-03-07T20:55:08Z) - Generative AI for Secure Physical Layer Communications: A Survey [80.0638227807621]
Generative Artificial Intelligence (GAI) stands at the forefront of AI innovation, demonstrating rapid advancement and unparalleled proficiency in generating diverse content.
In this paper, we offer an extensive survey on the various applications of GAI in enhancing security within the physical layer of communication networks.
We delve into the roles of GAI in addressing challenges of physical layer security, focusing on communication confidentiality, authentication, availability, resilience, and integrity.
arXiv Detail & Related papers (2024-02-21T06:22:41Z) - Prioritizing Safeguarding Over Autonomy: Risks of LLM Agents for Science [65.77763092833348]
Intelligent agents powered by large language models (LLMs) have demonstrated substantial promise in autonomously conducting experiments and facilitating scientific discoveries across various disciplines.
While their capabilities are promising, these agents also introduce novel vulnerabilities that demand careful consideration for safety.
This paper conducts a thorough examination of vulnerabilities in LLM-based agents within scientific domains, shedding light on potential risks associated with their misuse and emphasizing the need for safety measures.
arXiv Detail & Related papers (2024-02-06T18:54:07Z) - Towards more Practical Threat Models in Artificial Intelligence Security [66.67624011455423]
Recent works have identified a gap between research and practice in artificial intelligence security.
We revisit the threat models of the six most studied attacks in AI security research and match them to AI usage in practice.
arXiv Detail & Related papers (2023-11-16T16:09:44Z) - The New Frontier of Cybersecurity: Emerging Threats and Innovations [0.0]
The research delves into the consequences of these threats on individuals, organizations, and society at large.
The sophistication and diversity of these emerging threats necessitate a multi-layered approach to cybersecurity.
This study emphasizes the importance of implementing effective measures to mitigate these threats.
arXiv Detail & Related papers (2023-11-05T12:08:20Z) - Critical Analysis and Countermeasures Tactics, Techniques and Procedures (TTPs) that targeting civilians: A case study On Pegasus [0.0]
This paper investigates the targeting of journalists and activists by the malware Pegasus.
Examines the far-reaching consequences of these attacks for cybersecurity policy.
Describes some of the most important tactics that businesses may use to reduce the danger of cyberattacks.
arXiv Detail & Related papers (2023-10-01T19:28:03Z) - On the Security Risks of Knowledge Graph Reasoning [71.64027889145261]
We systematize the security threats to KGR according to the adversary's objectives, knowledge, and attack vectors.
We present ROAR, a new class of attacks that instantiate a variety of such threats.
We explore potential countermeasures against ROAR, including filtering of potentially poisoning knowledge and training with adversarially augmented queries.
arXiv Detail & Related papers (2023-05-03T18:47:42Z) - Proceedings of the Artificial Intelligence for Cyber Security (AICS)
Workshop at AAAI 2022 [55.573187938617636]
The workshop will focus on the application of AI to problems in cyber security.
Cyber systems generate large volumes of data, utilizing this effectively is beyond human capabilities.
arXiv Detail & Related papers (2022-02-28T18:27:41Z) - Cyber Crossroads: A Global Research Collaborative on Cyber Risk
Governance [2.704346519025199]
Cyber Crossroads was born out of alarming trends and a realization that the world cannot go on funneling finite resources into an intractable problem.
Cyber Crossroads brings together expertise from across the world, spanning aspects of the cyber problem.
A Cyber Standard of Care should be applicable across industries and regardless of the organization size.
arXiv Detail & Related papers (2021-07-08T11:58:27Z) - Proceedings - AI/ML for Cybersecurity: Challenges, Solutions, and Novel
Ideas at SIAM Data Mining 2021 [6.647584840410018]
Malicious cyber activity is ubiquitous and its harmful effects have dramatic and often irreversible impacts on society.
The challenges in this space are quite different from those associated with applying AI in other domains such as computer vision.
In spite of these challenges, machine learning has been applied to this domain and has achieved some success in the realm of detection.
A growing part of the commercial sector is providing ML-enhanced capabilities as a service.
arXiv Detail & Related papers (2021-04-27T17:35:31Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.