{"id":191814,"date":"2024-08-09T12:29:03","date_gmt":"2024-08-09T10:29:03","guid":{"rendered":"https:\/\/www.rse-web.it\/rapporti\/resilience-scenarios-of-cyber-power-systems-detection-of-cyber-anomalies-and-recovery-actions\/"},"modified":"2024-08-31T16:09:09","modified_gmt":"2024-08-31T14:09:09","slug":"resilience-scenarios-of-cyber-power-systems-detection-of-cyber-anomalies-and-recovery-actions","status":"publish","type":"rapporti","link":"https:\/\/www.rse-web.it\/en\/reports\/resilience-scenarios-of-cyber-power-systems-detection-of-cyber-anomalies-and-recovery-actions\/","title":{"rendered":"Resilience scenarios of cyber-power systems: detection of cyber anomalies and recovery actions"},"content":{"rendered":"<p class=\"last-updated-date\">Recently updated on August 31st, 2024 at 04:09 pm<\/p>","protected":false},"excerpt":{"rendered":"<p>The activity carried out in the three-year research period addresses the joint development of cybersecurity analysis tools and technological platforms to promptly respond to attacks aimed at digitized energy infrastructure. A requirements assessment methodology in compliance with cybersecurity standards, a probabilistic analysis tool for attack processes, and a platform for attack detection based on evidence collection have been developed.<\/p>\n","protected":false},"author":93,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"tags":[1350,1349,1344,1346,1351,1348,1623,1579,1341,1340],"targets":[1317],"rapporti_tipologie":[762],"class_list":["post-191814","rapporti","type-rapporti","status-publish","hentry","tag-cyber-anomaly-detection-en","tag-cyber-attack-forecast-en","tag-cybersecurity-en","tag-cybersecurity-assessment-en","tag-cybersecurity-operation-en","tag-cybersecurity-performance-testing-en","tag-energy-cybersecurity-standards-en","tag-ict-en","tag-infrastructure","tag-resilience","targets-research","rapporti_tipologie-report-en"],"acf":{"projects":{"ID":191051,"post_author":"464","post_date":"2024-07-10 16:51:29","post_date_gmt":"2024-07-10 14:51:29","post_content":"","post_title":"Application of Information Technology, Internet of Things, Peer-to-peer, to the electrical system in order to improve security and resilience","post_excerpt":"The project develops methods, tools, demonstrators and experiments to evaluate the application potential of the latest information and communication technologies for the benefit of the electro-energy system.","post_status":"publish","comment_status":"open","ping_status":"closed","post_password":"","post_name":"application-of-information-technology-internet-of-things-peer-to-peer-to-the-electrical-system-in-order-to-improve-security-and-resilience","to_ping":"","pinged":"","post_modified":"2024-08-09 15:59:29","post_modified_gmt":"2024-08-09 13:59:29","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.rse-web.it\/progetti\/application-of-information-technology-internet-of-things-peer-to-peer-to-the-electrical-system-in-order-to-improve-security-and-resilience\/","menu_order":0,"post_type":"progetti","post_mime_type":"","comment_count":"0","filter":"raw"},"order_posts":"","dont_show_search":false,"related_posts":false,"dont_show_hompage":false,"show_on_slider":false,"single_post_data":{"titolo_spot":"","post_content":"<p>The European and national cybersecurity regulation impacting the energy sector acknowledges the importance of tools being adopted by operators to assess the security level of digital infrastructure within the legislation\u2019s scope of application. The inherent nature of the cyber threat also requires the continuous monitoring and management of the status of the assets in said scope: due to the relevance of their digital functions for the energy service, they must guarantee that no malicious actions compromise it.<br \/>\nThe activity carried out in the three-year research period addresses both needs by developing innovative tools and technologies to be integrated into organizational processes and evolving energy infrastructure. To support the process of assessing the cybersecurity level of the infrastructure, the activity has resulted in a methodology for assessing requirements in compliance with cybersecurity standards. Such methodology was used to identify the cybersecurity requirements and controls of the ICT infrastructure of the OSMOSE project Italian demonstrator for congestion management in a portion of the national transmission network. Applying the methodology made it possible to consider the impact of infrastructure scale parameters, such as the number of flexible systems and their level of aggregation, on cybersecurity requirements and controls.<br \/>\nTo enhance attack detection capabilities, a probabilistic analysis tool for recognizing malicious actions and a platform for identifying and predicting attack processes has been developed. The analysis capabilities of the developed tool were compared with those of the commercial product securiCAD while applying the two tools to the same control scenario. The assessment outcomes highlighted the potential resulting from a joint use based on the peculiarities of the securiCAD simulation approach and the analytical one developed in the project. Specific scenarios were analyzed with securiCAD, aligned with the developments of the RELIEF electrical simulator in the RdS 2.5 project, in order to calculate resilience indices conditioned by the probability of cyber attacks. The attack analysis tool and the detection platform will be further developed in the short term, in a synergistic and integrated way and in an environment granting high response capabilities to cyber threats to energy systems.<\/p>\n","link_estreno":false,"scarica_file":[{"download_option":"download","file_name":"Download Report","download":{"ID":173995,"id":173995,"title":"21008891","filename":"21008891.pdf","filesize":7467091,"url":"https:\/\/www.rse-web.it\/wp-content\/uploads\/2022\/11\/21008891.pdf","link":"https:\/\/www.rse-web.it\/en\/rapporti\/scenari-di-resilienza-di-sistemi-cyber-power-detection-di-anomalie-cyber-e-azioni-di-recovery\/attachment\/21008891\/","alt":"","author":"93","description":"","caption":"","name":"21008891","status":"inherit","uploaded_to":173994,"date":"2022-11-24 14:26:45","modified":"2022-11-24 14:26:45","menu_order":0,"mime_type":"application\/pdf","type":"application","subtype":"pdf","icon":"https:\/\/www.rse-web.it\/wp-includes\/images\/media\/document.png"}}],"button":{"text":"","link":""},"referente_group":false,"data_emissione":"2021-12-31","autori":"G. Dondossola, R. Terruggia (RSE S.p.A.)","rapporto":"","rif_rse":"21008891"},"satellite_post_url":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Resilience scenarios of cyber-power systems: detection of cyber anomalies and recovery actions - RSE<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rse-web.it\/en\/reports\/resilience-scenarios-of-cyber-power-systems-detection-of-cyber-anomalies-and-recovery-actions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Resilience scenarios of cyber-power systems: detection of cyber anomalies and recovery actions - RSE\" \/>\n<meta property=\"og:description\" content=\"The activity carried out in the three-year research period addresses the joint development of cybersecurity analysis tools and technological platforms to promptly respond to attacks aimed at digitized energy infrastructure. A requirements assessment methodology in compliance with cybersecurity standards, a probabilistic analysis tool for attack processes, and a platform for attack detection based on evidence collection have been developed.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rse-web.it\/en\/reports\/resilience-scenarios-of-cyber-power-systems-detection-of-cyber-anomalies-and-recovery-actions\/\" \/>\n<meta property=\"og:site_name\" content=\"RSE\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-31T14:09:09+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.rse-web.it\/en\/reports\/resilience-scenarios-of-cyber-power-systems-detection-of-cyber-anomalies-and-recovery-actions\/\",\"url\":\"https:\/\/www.rse-web.it\/en\/reports\/resilience-scenarios-of-cyber-power-systems-detection-of-cyber-anomalies-and-recovery-actions\/\",\"name\":\"Resilience scenarios of cyber-power systems: detection of cyber anomalies and recovery actions - RSE\",\"isPartOf\":{\"@id\":\"https:\/\/www.rse-web.it\/#website\"},\"datePublished\":\"2024-08-09T10:29:03+00:00\",\"dateModified\":\"2024-08-31T14:09:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.rse-web.it\/en\/reports\/resilience-scenarios-of-cyber-power-systems-detection-of-cyber-anomalies-and-recovery-actions\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.rse-web.it\/en\/reports\/resilience-scenarios-of-cyber-power-systems-detection-of-cyber-anomalies-and-recovery-actions\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.rse-web.it\/en\/reports\/resilience-scenarios-of-cyber-power-systems-detection-of-cyber-anomalies-and-recovery-actions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.rse-web.it\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resilience scenarios of cyber-power systems: detection of cyber anomalies and recovery actions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.rse-web.it\/#website\",\"url\":\"https:\/\/www.rse-web.it\/\",\"name\":\"RSE\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.rse-web.it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.rse-web.it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.rse-web.it\/#organization\",\"name\":\"RSE\",\"url\":\"https:\/\/www.rse-web.it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.rse-web.it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.rse-web.it\/wp-content\/uploads\/2024\/01\/cropped-logo_rse_2022.png\",\"contentUrl\":\"https:\/\/www.rse-web.it\/wp-content\/uploads\/2024\/01\/cropped-logo_rse_2022.png\",\"width\":734,\"height\":164,\"caption\":\"RSE\"},\"image\":{\"@id\":\"https:\/\/www.rse-web.it\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Resilience scenarios of cyber-power systems: detection of cyber anomalies and recovery actions - RSE","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rse-web.it\/en\/reports\/resilience-scenarios-of-cyber-power-systems-detection-of-cyber-anomalies-and-recovery-actions\/","og_locale":"en_US","og_type":"article","og_title":"Resilience scenarios of cyber-power systems: detection of cyber anomalies and recovery actions - RSE","og_description":"The activity carried out in the three-year research period addresses the joint development of cybersecurity analysis tools and technological platforms to promptly respond to attacks aimed at digitized energy infrastructure. A requirements assessment methodology in compliance with cybersecurity standards, a probabilistic analysis tool for attack processes, and a platform for attack detection based on evidence collection have been developed.","og_url":"https:\/\/www.rse-web.it\/en\/reports\/resilience-scenarios-of-cyber-power-systems-detection-of-cyber-anomalies-and-recovery-actions\/","og_site_name":"RSE","article_modified_time":"2024-08-31T14:09:09+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.rse-web.it\/en\/reports\/resilience-scenarios-of-cyber-power-systems-detection-of-cyber-anomalies-and-recovery-actions\/","url":"https:\/\/www.rse-web.it\/en\/reports\/resilience-scenarios-of-cyber-power-systems-detection-of-cyber-anomalies-and-recovery-actions\/","name":"Resilience scenarios of cyber-power systems: detection of cyber anomalies and recovery actions - RSE","isPartOf":{"@id":"https:\/\/www.rse-web.it\/#website"},"datePublished":"2024-08-09T10:29:03+00:00","dateModified":"2024-08-31T14:09:09+00:00","breadcrumb":{"@id":"https:\/\/www.rse-web.it\/en\/reports\/resilience-scenarios-of-cyber-power-systems-detection-of-cyber-anomalies-and-recovery-actions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rse-web.it\/en\/reports\/resilience-scenarios-of-cyber-power-systems-detection-of-cyber-anomalies-and-recovery-actions\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.rse-web.it\/en\/reports\/resilience-scenarios-of-cyber-power-systems-detection-of-cyber-anomalies-and-recovery-actions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rse-web.it\/en\/"},{"@type":"ListItem","position":2,"name":"Resilience scenarios of cyber-power systems: detection of cyber anomalies and recovery actions"}]},{"@type":"WebSite","@id":"https:\/\/www.rse-web.it\/#website","url":"https:\/\/www.rse-web.it\/","name":"RSE","description":"","publisher":{"@id":"https:\/\/www.rse-web.it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rse-web.it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.rse-web.it\/#organization","name":"RSE","url":"https:\/\/www.rse-web.it\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.rse-web.it\/#\/schema\/logo\/image\/","url":"https:\/\/www.rse-web.it\/wp-content\/uploads\/2024\/01\/cropped-logo_rse_2022.png","contentUrl":"https:\/\/www.rse-web.it\/wp-content\/uploads\/2024\/01\/cropped-logo_rse_2022.png","width":734,"height":164,"caption":"RSE"},"image":{"@id":"https:\/\/www.rse-web.it\/#\/schema\/logo\/image\/"}}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/rapporti\/191814","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/rapporti"}],"about":[{"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/types\/rapporti"}],"author":[{"embeddable":true,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/users\/93"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/comments?post=191814"}],"version-history":[{"count":1,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/rapporti\/191814\/revisions"}],"predecessor-version":[{"id":193392,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/rapporti\/191814\/revisions\/193392"}],"wp:attachment":[{"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/media?parent=191814"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/tags?post=191814"},{"taxonomy":"targets","embeddable":true,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/targets?post=191814"},{"taxonomy":"rapporti_tipologie","embeddable":true,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/rapporti_tipologie?post=191814"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}