Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Anas AlMajali is active.

Publication


Featured researches published by Anas AlMajali.


Procedia Computer Science | 2014

Mitigating the Risk of Cyber Attack on Smart Grid Systems

Eric B. Rice; Anas AlMajali

Abstract Smart Grid technologies are being developed to upgrade the power grid with networked metrology and controls that can improve efficiency and provide new methods to manage the system. While these technologies offer great benefits, they also introduce new classes of risk, most notably creating new attack vectors that can be exploited by cyber attack. To assess and address risks in cyber-physical systems like these, the system designers toolset needs to include concepts drawn from cyber security, reliability, and fault tolerance design, integrated into a common methodology. In this paper, we discuss the fragmented landscape of studies into the risk of cyber attack on smart metering systems, and then draw on concepts from systems engineering and fault tolerance design to organize and unify the pieces.


international conference on smart grid communications | 2013

A systems approach to analysing cyber-physical threats in the Smart Grid

Anas AlMajali; Eric B. Rice; Arun Viswanathan; Kymie Tan; Clifford Neuman

This paper presents a systems analysis approach to characterizing the risk of a Smart Grid to a load-drop attack. A characterization of the risk is necessary for the design of detection and remediation strategies to address the consequences of such attacks. Using concepts from systems health management and system engineering, this work (a) first identifies metrics that can be used to generate constraints for security features, and (b) lays out an end-to-end integrated methodology using separate network and power simulations to assess system risk. We demonstrate our approach by performing a systems-style analysis of a load-drop attack implemented over the AMI subsystem and targeted at destabilizing the underlying power grid.


2015 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES) | 2015

Modeling security policies for mitigating the risk of load altering attacks on smart grid systems

Tatyana Ryutov; Anas AlMajali; Clifford Neuman

While demand response programs achieve energy efficiency and quality objectives, they bring potential security threats into the Smart Grid. An ability to influence load in the system provides the capability for an attacker to cause system failures and impacts the quality and integrity of the power delivered to customers. This paper presents a security mechanism that monitors and controls load according to security policies during normal system operation. The mechanism monitors, detects, and responds to load altering attacks. The authors examined security requirements of Smart Grid stakeholders and constructed a set of load control policies enforced by the mechanism. A proof of concept prototype was implemented and tested using the simulation environment. By enforcing the proposed policies in this prototype, the system is maintained in a safe state in the presence of load drop attacks.


Sensors | 2018

Analyzing Cyber-Physical Threats on Robotic Platforms

Khalil Mustafa Ahmad Yousef; Anas AlMajali; Salah Abu Ghalyon; Waleed Dweik; Bassam Jamil Mohd

Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBotTM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications.


ICS-CSR 2018 | 2018

PSP: A Framework to Allocate Resources to Power Storage Systems under Cyber-Physical Attacks

Yatin Wadhawan; Clifford Neuman; Anas AlMajali

This risk assessment of the smart grid focuses on energy storage, which is essential but largely unaddressed by the current literature. This work concentrates on actions (such as decreasing or increasing power reserve and power dispatch, performing load curtailment or load shedding, or repair of nodes) the defender should take to meet power demand at minimum operating cost in the presence of cyber-physical attacks on the power and information infrastructure of the smart grid. In this paper, we formulate a Power Storage Protection (PSP) framework against a fixed opponent (adversary). We fix the strategy for the adversary and model the problem as a Partially Observable Markov Decision Process (POMDP) from the perspective of the defender (power utility) and solve it using POMDP solver. We provide a theoretical framework for formulating the above problem and provide experimental results to support our claim using a simplified PSP scenario in which optimal POMDP policy is computed efficiently.


2017 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES) | 2017

Analyzing cyber-physical attacks on smart grid systems

Yatin Wadhawan; Clifford Neuman; Anas AlMajali

We present a roadmap to evaluate the resilience of Smart Grid systems in the presence of cyber-physical attacks on its various functions and components such as Distributed Energy Resources, demand response, and gas distribution pipeline for peaker plants. We discuss attack scenarios corresponding to each functionality and the effect on the resilience of the given smart grid system. Through contingency simulations in the PowerWorld simulator, we analyze cyber attacks that propagate from cyber to power system and discuss how such attacks destabilize the underlying power grid. The analysis of such simulations helps system engineers to develop a robust and more resilient system and improves the response of the system to ongoing attacks.


international conference on electronic devices systems and applications | 2016

Modeling worm propagation in the advanced metering infrastructure

Anas AlMajali; Waleed Dweik

A computer worm is malicious software that can spread rapidly between interconnected devices and perform malicious actions. In an Advanced Metering Infrastructure (AMI), smart meters may communicate in an ad-hoc fashion to perform many functionalities like remote metering and demand response. However, the AMI is susceptible to cyber-physical threats caused by malware like worms. The speed at which worms propagate in the AMI affects the physical consequences of cyber attacks. In this paper, worm propagation in the AMI is simulated and a probabilistic model is derived. This model can be used to estimate the time required to infect N meters in the AMI and accordingly predict possible physical consequences.


CSET'12 Proceedings of the 5th USENIX conference on Cyber Security Experimentation and Test | 2012

Analyzing resiliency of the smart grid communication architectures under cyber attack

Anas AlMajali; Arun Viswanathan; Clifford Neuman


Electronics | 2016

Resilience Evaluation of Demand Response as Spinning Reserve under Cyber-Physical Threats

Anas AlMajali; Arun Viswanathan; Clifford Neuman


Electronics | 2018

A Comprehensive Analysis of Smart Grid Systems against Cyber-Physical Attacks

Yatin Wadhawan; Anas AlMajali; Clifford Neuman

Collaboration


Dive into the Anas AlMajali's collaboration.

Top Co-Authors

Avatar

Clifford Neuman

University of Southern California

View shared research outputs
Top Co-Authors

Avatar

Arun Viswanathan

Information Sciences Institute

View shared research outputs
Top Co-Authors

Avatar

Yatin Wadhawan

University of Southern California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Eric B. Rice

California Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kymie Tan

California Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Tatyana Ryutov

Information Sciences Institute

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge