Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Dennis Gammel is active.

Publication


Featured researches published by Dennis Gammel.


acm workshop on smart energy grid security | 2013

Toward a cyber-physical topology language: applications to NERC CIP audit

Gabriel A. Weaver; Carmen Cheh; Edmond Rogers; William H. Sanders; Dennis Gammel

Our Cyber-Physical Topology Language (CPTL) provides a language that utilities can use to programmatically analyze current and future cyber-physical architectures. The motivation for our research emerged from the importance and limitations of several audit scenarios: account management, vulnerability assessment, and configuration management. Those scenarios occur in the context of the North American Electric Reliability Corporations Critical Infrastructure Protection (NERC CIP) audits. The NERC CIP standards define security controls by which utilities must be audited. Although the standards were designed to make power control networks less vulnerable to cyber attack and to decrease the chance of outages, the audit process is manual and costly. In order to save utilities and auditors time and money, we used the limitations of those audit scenarios in formally specifying and implementing CPTL, which consists of both a representation of cyber-physical assets and operations upon that representation. First, CPTL uses graph theory to represent a network of cyber-physical assets; we currently implement this representation in GraphML. Second, CPTL defines operations upon that representation. In this paper, we introduce operators to process attributes by expanding and contracting components of a network, and implement these operations using the Boost Graph Library (BGL). In order to demonstrate the potential for CPTL to save auditors and utilities time and money, we provide a detailed example of how CPTL could help with vulnerability assessment and discuss additional applications beyond the audit scenarios mentioned above. We describe current approaches to those scenarios and argue that CPTL improves upon both the state-of-the-art and current practice. In fact, we intend CPTL to enable a broad range of new research on realistic cyber-physical architectures by giving utilities, auditors, managers, and researchers a common language with which to communicate and analyze those architectures.


conference for protective relay engineers | 2017

Ukraine cyber-induced power outage: Analysis and practical mitigation strategies

David E. Whitehead; Kevin Owens; Dennis Gammel; Jess Smith

On December 23, 2015, a “temporary malfunction of the power supply” in three provinces in Ukraine resulted in power outages that lasted up to six hours and affected 225,000 customers. Following the event, an investigation identified evidence that several regional Ukraine power control systems had been compromised by cyber attacks. This was the first publicly documented successful cyber attack on an electric utilitys control system. Both asset owners and government officials around the world now are asking, “What happened and could a similar cyber attack happen in our control systems?” This paper provides an analysis of the Ukraine cyber attack, including how the malicious actors gained access to the control system, what methods the malicious actors used to explore and map the control system, a detailed description of the December 23, 2015 attacks, and methods used by the malicious actors to erase their activities and make remediation more difficult. We then present a detailed description of securing utility power system control systems based on best practices, including control system network design, whitelisting techniques, monitoring and logging, and personnel education. The paper concludes with a discussion of mitigation methods and recommendations that would have protected the Ukraine control system and alerted personnel in advance of the cyber attack.


2016 Resilience Week (RWS) | 2016

Cybersecurity best practices for creating resilient control systems

Jess Smith; Joshua Pereyda; Dennis Gammel

Control systems manage the automated systems that run our world. The security of these systems is critical, but most modern best practice guidelines focus on enterprise security, similar to that of traditional information technology and security. This paper provides eight basic guidelines to increase cybersecurity in control systems.


Archive | 2013

Visualization of Communication Between Devices in an Electric Power System

David Dolezilek; Jason A. Dearien; Benjamin S. Day; Dennis Gammel; Ryan Bradetich; Jerry J. Bennett; Christopher Ewing


Archive | 2013

Exchange of messages between devices in an electrical power system

David Dolezilek; Benjamin S. Day; Dennis Gammel; Ryan Bradetich; Jerry J. Bennett; Christopher Ewing


Archive | 2013

Thermal management of a communication transceiver in an electrical communication device

Dennis Gammel; Mark A. Thomas; Shankar V. Achanta


Archive | 2013

Systems and methods for communicating data state change information between devices in an electrical power system

David Dolezilek; Benjamin S. Day; Dennis Gammel; Ryan Bradetich; Jerry J. Bennett; Christopher Ewing


Archive | 2013

Proxy Communication Between Devices in an Electrical Power System

David Dolezilek; Benjamin S. Day; Dennis Gammel; Ryan Bradetich; Jerry J. Bennett; Christopher Ewing; Shankar V. Achanta


Archive | 2013

Mixed-Mode Communication Between Devices in an Electrical Power System

David Dolezilek; Benjamin S. Day; Dennis Gammel; Ryan Bradetich; Jerry J. Bennett; Christopher Ewing; Shankar V. Achanta


Archive | 2017

dispositivo de comunicação

Dennis Gammel; Mark A. Thomas; Shankar V. Achanta

Collaboration


Dive into the Dennis Gammel's collaboration.

Top Co-Authors

Avatar

Benjamin S. Day

Schweitzer Engineering Laboratories

View shared research outputs
Top Co-Authors

Avatar

Christopher Ewing

Schweitzer Engineering Laboratories

View shared research outputs
Top Co-Authors

Avatar

David Dolezilek

Schweitzer Engineering Laboratories

View shared research outputs
Top Co-Authors

Avatar

Jerry J. Bennett

Schweitzer Engineering Laboratories

View shared research outputs
Top Co-Authors

Avatar

Ryan Bradetich

Schweitzer Engineering Laboratories

View shared research outputs
Top Co-Authors

Avatar

Shankar V. Achanta

Schweitzer Engineering Laboratories

View shared research outputs
Top Co-Authors

Avatar

Mark A. Thomas

Schweitzer Engineering Laboratories

View shared research outputs
Top Co-Authors

Avatar

Jess Smith

Schweitzer Engineering Laboratories

View shared research outputs
Top Co-Authors

Avatar

David E. Whitehead

Schweitzer Engineering Laboratories

View shared research outputs
Top Co-Authors

Avatar

George W. Masters

Schweitzer Engineering Laboratories

View shared research outputs
Researchain Logo
Decentralizing Knowledge