Ludger Peters

Ludger Peters

Wiesbaden, Hessen, Deutschland
509 Follower:innen 500+ Kontakte

Info

Mein duales Studium habe ich bei der Framatome GmbH (ehemals AREVA) in Erlangen…

Aktivitäten

Anmelden, um alle Aktivitäten zu sehen

Berufserfahrung

  • Fraunhofer Institute for Secure Information Technology SIT Grafik
  • -

    Wiesbaden, Hessen, Deutschland

  • -

    Erlangen, Bayern, Deutschland

  • -

    Hamburg und Umgebung, Deutschland

  • -

    Hamburg Harburg

  • -

    Erlangen und Umgebung, Deutschland

  • -

    Erlangen und Umgebung, Deutschland

  • -

    Erlangen und Umgebung, Deutschland

  • -

    Kassel und Umgebung, Deutschland

Ausbildung

Bescheinigungen und Zertifikate

Ehrenamt

  • Leitung Referat Kultur und Sport

    Stura HSZG

    2 Jahre 4 Monate

    Mitglied in der Studentischen Verwaltung der Hochschule Zittau Görlitz
    Dabei ab 2015 in der Leitung des Referates für Kultur und Sport tätig.

  • Kronenkino Zittau Grafik

    Veranstaltungstechniker und Fotograf

    Kronenkino Zittau

    3 Jahre 2 Monate

    Arts and Culture

    Unterstützung des Kronenkino mit Fotos der Veranstaltungen und bei Bedarf auch als Technik bei Konzerten.

Veröffentlichungen

  • The Cyber Safe Position: An STPA for Safety, Security, and Resilience Co-Engineering Approach

    Proceedings of the 19th International Conference on Availability, Reliability and Security / ACM

    Model Based Security Engineering (MBSE) is a growing field of research, which is gaining popularity in the domain of Safety, Security, and Resilience Co-Engineering. The System Theoretic Process Analysis (STPA) is a method for systematically analyzing the behavior of complex systems to investigate their failure modes and the Unsafe Control Actions (UCA) that can lead to those failure modes. This paper expands the methodological scope of STPA, by including an iterative Root-Cause Analysis…

    Model Based Security Engineering (MBSE) is a growing field of research, which is gaining popularity in the domain of Safety, Security, and Resilience Co-Engineering. The System Theoretic Process Analysis (STPA) is a method for systematically analyzing the behavior of complex systems to investigate their failure modes and the Unsafe Control Actions (UCA) that can lead to those failure modes. This paper expands the methodological scope of STPA, by including an iterative Root-Cause Analysis element, which examines the possible emergence of UCAs due to either malfunction, or malicious action. Output of the method are the attributes and constraints of Resilience Modes of system configuration and operation, named ”Cyber Safe Position“ (CSP). The proposed method is applied in the case study of a Photovoltaic Plant connected to a Virtual Power Plant (VPP).

    Andere Autor:innen
    Veröffentlichung anzeigen
  • Machine Learning based predictive control to ensure integrity of industrial automation and control systems

    IAEA International Conference on Computer Security in the Nuclear World: security for Safety

    Historically separated Supervisory Control and Data Acquisition (SCADA) systems are now
    interconnected due to the requirements of Industry 4.0. The resulting connections lead to new attack
    vectors threatening critical infrastructure like power plants and electrical distribution networks.
    The focus of this paper will be the early detection of failures and alterations within control systems. These
    modifications of the control routines can result into physical damage of the…

    Historically separated Supervisory Control and Data Acquisition (SCADA) systems are now
    interconnected due to the requirements of Industry 4.0. The resulting connections lead to new attack
    vectors threatening critical infrastructure like power plants and electrical distribution networks.
    The focus of this paper will be the early detection of failures and alterations within control systems. These
    modifications of the control routines can result into physical damage of the controlled primary assets
    (e.g., the Stuxnet attack). Cybersecurity experts shall be enabled to detect or confirm ongoing attacks in a
    reasonable time frame. Utilizing information, generated by detection algorithms running in parallel to the
    existing control systems.
    The assumption for this paper is, that the goal of an attacker is to destroy or damage subsystems. This will
    be detrimental to the functionality of the complete system with a potential of mid to long-term impact to
    the whole site.
    The paper is based on a PhD thesis [1] in the context of IAEA CRP J02008 with a focus on cybersecurity
    for Electrical Power Systems (EPS) and a follow-up master thesis [2] demonstrating the possibilities of
    anomaly detection using the Asherah Nuclear Simulator. This paper will address future improvement
    possibilities, beyond the EPS cybersecurity scope.

    Andere Autor:innen
    Veröffentlichung anzeigen
  • Model-based Integrity Monitoring of Industrial Automation And Control Systems

    Gesellschaft für Informatik, Bonn

    This paper aims to enhance cyber security within Electrical Power Systems (EPS) of power plants by extending and using an updated plant simulator. In this paper, we assume a sophisticated attacker, as part of an Advanced Persistent Threat (APT), who gradually damages or manipulates primary assets (in the sense of ISO/IEC 27005:2018, e. g. main cooling water pumps, feedwater pumps, safety valves, and circuit breakers). Accordingly, we assume that the attack agent performs gradual manipulations…

    This paper aims to enhance cyber security within Electrical Power Systems (EPS) of power plants by extending and using an updated plant simulator. In this paper, we assume a sophisticated attacker, as part of an Advanced Persistent Threat (APT), who gradually damages or manipulates primary assets (in the sense of ISO/IEC 27005:2018, e. g. main cooling water pumps, feedwater pumps, safety valves, and circuit breakers). Accordingly, we assume that the attack agent performs gradual manipulations at the application level. Detecting and predicting a potential anomaly is designed and implemented based on machine learning of expected behavior. The paper will include examples of attacks executed over an extended time period by gradually manipulating combinations of analog and binary signal values or set-points. Challenges related to the training of the detection algorithms, avoidance of false positives, and concise reporting to non-security domain experts will also be addressed.

    Andere Autor:innen
    Veröffentlichung anzeigen

Prüfungsergebnisse

  • Masterarbeit

    Prüfungsergebnis: 1,7

    The Industrial Automation and Control System (IACS) are the backbone of controlling
    the operation of the process industry (e.g. refineries), factories and plants, including
    Nuclear Power Plant (NPP). Within this thesis, it is assumed that the attacker
    already super-seeded a plant’s protection systems and gained direct access to some of
    the lower tier Industrial Control System (ICS).
    This thesis aims to enhance the cyber security of power plant components by extending
    and using…

    The Industrial Automation and Control System (IACS) are the backbone of controlling
    the operation of the process industry (e.g. refineries), factories and plants, including
    Nuclear Power Plant (NPP). Within this thesis, it is assumed that the attacker
    already super-seeded a plant’s protection systems and gained direct access to some of
    the lower tier Industrial Control System (ICS).
    This thesis aims to enhance the cyber security of power plant components by extending
    and using an updated plant simulator. A related Ph.D. thesis [1] from the end of
    2021 indicates that a considerable impact on primary assets (in the sense of ISO/IEC
    27005:2018) is possible. However, the assumed attack scenarios would have an
    immediate impact, e.g. an attacker has direct access to an industrial communication
    network or supporting assets (e.g. embedded devices) that control at least one critical
    primary asset. It is assumed, that a sophisticated attacker, as part of an Advanced
    Persistant Threat (APT), breach the cyber protection of the facility and aims to
    damage primary assets (e.g. main cooling water pumps, feedwater pumps, safety
    valves, circuit breakers). Accordingly, we assume that the attack agent performs
    gradual manipulations at the application level. Detecting and predicting a potential
    anomaly is designed and implemented based on machine learning of expected behavior.
    The thesis will include examples of attacks executed over an extended time period by
    manipulating combinations of analog and binary signal values or set-points. Challenges
    related to the training of the detection algorithms, avoidance of false positives and
    concise reporting to non-security domain experts will also be addressed.

  • Diplomarbeit

    Prüfungsergebnis: 1,0

    Within this part of my dual degree program i wrote my diploma thesis: "Prototype’s implementation of a virtualized Instrumentation and Control System for Nuclear Power Plants"

  • Mechatroniker (IHK 2016)

    Prüfungsergebnis: 78 Punkte

    Abschluss der innerhalb der ersten 2,5 Studienjahre absolvierten Ausbildung

Sprachen

  • Deutsch

    Muttersprache oder zweisprachig

  • Englisch

    Verhandlungssicher

  • Französisch

    Grundkenntnisse

Organisationen

  • Gesellschaft für Informatik e.V.

    -

    –Heute
  • VDI Verein Deutscher Ingenieure e.V.

    -

    –Heute

Weitere Aktivitäten von Ludger Peters

Ludger Peters’ vollständiges Profil ansehen

  • Herausfinden, welche gemeinsamen Kontakte Sie haben
  • Sich vorstellen lassen
  • Ludger Peters direkt kontaktieren
Mitglied werden. um das vollständige Profil zu sehen

Weitere ähnliche Profile

Weitere Mitglieder namens Ludger Peters in Deutschland

Entwickeln Sie mit diesen Kursen neue Kenntnisse und Fähigkeiten