Ludger Peters
Wiesbaden, Hessen, Deutschland
509 Follower:innen
500+ Kontakte
Info
Mein duales Studium habe ich bei der Framatome GmbH (ehemals AREVA) in Erlangen…
Aktivitäten
-
In meinem Freundeskreis bin ich der einzige, der sich mit dem Thema #Sicherheit beschäftigt. Man findet das spannend, hört mir auch zu, zum Teil…
In meinem Freundeskreis bin ich der einzige, der sich mit dem Thema #Sicherheit beschäftigt. Man findet das spannend, hört mir auch zu, zum Teil…
Beliebt bei Ludger Peters
-
COP29 - where to start? The people! The people and teams I worked with in Baku really helped piece everything together. Compared with going about…
COP29 - where to start? The people! The people and teams I worked with in Baku really helped piece everything together. Compared with going about…
Beliebt bei Ludger Peters
-
Liebes Ehrenamt, lieber VDI, nach vier Jahren als Vorsitzende der VDI Young Engineers habe ich am Sonntag das "Amt" an meinen Nachfolger übergeben…
Liebes Ehrenamt, lieber VDI, nach vier Jahren als Vorsitzende der VDI Young Engineers habe ich am Sonntag das "Amt" an meinen Nachfolger übergeben…
Beliebt bei Ludger Peters
Berufserfahrung
Ausbildung
Bescheinigungen und Zertifikate
Ehrenamt
-
Leitung Referat Kultur und Sport
Stura HSZG
– 2 Jahre 4 Monate
Mitglied in der Studentischen Verwaltung der Hochschule Zittau Görlitz
Dabei ab 2015 in der Leitung des Referates für Kultur und Sport tätig. -
Veranstaltungstechniker und Fotograf
Kronenkino Zittau
– 3 Jahre 2 Monate
Arts and Culture
Unterstützung des Kronenkino mit Fotos der Veranstaltungen und bei Bedarf auch als Technik bei Konzerten.
Veröffentlichungen
-
The Cyber Safe Position: An STPA for Safety, Security, and Resilience Co-Engineering Approach
Proceedings of the 19th International Conference on Availability, Reliability and Security / ACM
Model Based Security Engineering (MBSE) is a growing field of research, which is gaining popularity in the domain of Safety, Security, and Resilience Co-Engineering. The System Theoretic Process Analysis (STPA) is a method for systematically analyzing the behavior of complex systems to investigate their failure modes and the Unsafe Control Actions (UCA) that can lead to those failure modes. This paper expands the methodological scope of STPA, by including an iterative Root-Cause Analysis…
Model Based Security Engineering (MBSE) is a growing field of research, which is gaining popularity in the domain of Safety, Security, and Resilience Co-Engineering. The System Theoretic Process Analysis (STPA) is a method for systematically analyzing the behavior of complex systems to investigate their failure modes and the Unsafe Control Actions (UCA) that can lead to those failure modes. This paper expands the methodological scope of STPA, by including an iterative Root-Cause Analysis element, which examines the possible emergence of UCAs due to either malfunction, or malicious action. Output of the method are the attributes and constraints of Resilience Modes of system configuration and operation, named ”Cyber Safe Position“ (CSP). The proposed method is applied in the case study of a Photovoltaic Plant connected to a Virtual Power Plant (VPP).
Andere Autor:innenVeröffentlichung anzeigen -
Machine Learning based predictive control to ensure integrity of industrial automation and control systems
IAEA International Conference on Computer Security in the Nuclear World: security for Safety
Historically separated Supervisory Control and Data Acquisition (SCADA) systems are now
interconnected due to the requirements of Industry 4.0. The resulting connections lead to new attack
vectors threatening critical infrastructure like power plants and electrical distribution networks.
The focus of this paper will be the early detection of failures and alterations within control systems. These
modifications of the control routines can result into physical damage of the…Historically separated Supervisory Control and Data Acquisition (SCADA) systems are now
interconnected due to the requirements of Industry 4.0. The resulting connections lead to new attack
vectors threatening critical infrastructure like power plants and electrical distribution networks.
The focus of this paper will be the early detection of failures and alterations within control systems. These
modifications of the control routines can result into physical damage of the controlled primary assets
(e.g., the Stuxnet attack). Cybersecurity experts shall be enabled to detect or confirm ongoing attacks in a
reasonable time frame. Utilizing information, generated by detection algorithms running in parallel to the
existing control systems.
The assumption for this paper is, that the goal of an attacker is to destroy or damage subsystems. This will
be detrimental to the functionality of the complete system with a potential of mid to long-term impact to
the whole site.
The paper is based on a PhD thesis [1] in the context of IAEA CRP J02008 with a focus on cybersecurity
for Electrical Power Systems (EPS) and a follow-up master thesis [2] demonstrating the possibilities of
anomaly detection using the Asherah Nuclear Simulator. This paper will address future improvement
possibilities, beyond the EPS cybersecurity scope.Andere Autor:innenVeröffentlichung anzeigen -
Model-based Integrity Monitoring of Industrial Automation And Control Systems
Gesellschaft für Informatik, Bonn
This paper aims to enhance cyber security within Electrical Power Systems (EPS) of power plants by extending and using an updated plant simulator. In this paper, we assume a sophisticated attacker, as part of an Advanced Persistent Threat (APT), who gradually damages or manipulates primary assets (in the sense of ISO/IEC 27005:2018, e. g. main cooling water pumps, feedwater pumps, safety valves, and circuit breakers). Accordingly, we assume that the attack agent performs gradual manipulations…
This paper aims to enhance cyber security within Electrical Power Systems (EPS) of power plants by extending and using an updated plant simulator. In this paper, we assume a sophisticated attacker, as part of an Advanced Persistent Threat (APT), who gradually damages or manipulates primary assets (in the sense of ISO/IEC 27005:2018, e. g. main cooling water pumps, feedwater pumps, safety valves, and circuit breakers). Accordingly, we assume that the attack agent performs gradual manipulations at the application level. Detecting and predicting a potential anomaly is designed and implemented based on machine learning of expected behavior. The paper will include examples of attacks executed over an extended time period by gradually manipulating combinations of analog and binary signal values or set-points. Challenges related to the training of the detection algorithms, avoidance of false positives, and concise reporting to non-security domain experts will also be addressed.
Andere Autor:innenVeröffentlichung anzeigen
Prüfungsergebnisse
-
Masterarbeit
Prüfungsergebnis: 1,7
The Industrial Automation and Control System (IACS) are the backbone of controlling
the operation of the process industry (e.g. refineries), factories and plants, including
Nuclear Power Plant (NPP). Within this thesis, it is assumed that the attacker
already super-seeded a plant’s protection systems and gained direct access to some of
the lower tier Industrial Control System (ICS).
This thesis aims to enhance the cyber security of power plant components by extending
and using…The Industrial Automation and Control System (IACS) are the backbone of controlling
the operation of the process industry (e.g. refineries), factories and plants, including
Nuclear Power Plant (NPP). Within this thesis, it is assumed that the attacker
already super-seeded a plant’s protection systems and gained direct access to some of
the lower tier Industrial Control System (ICS).
This thesis aims to enhance the cyber security of power plant components by extending
and using an updated plant simulator. A related Ph.D. thesis [1] from the end of
2021 indicates that a considerable impact on primary assets (in the sense of ISO/IEC
27005:2018) is possible. However, the assumed attack scenarios would have an
immediate impact, e.g. an attacker has direct access to an industrial communication
network or supporting assets (e.g. embedded devices) that control at least one critical
primary asset. It is assumed, that a sophisticated attacker, as part of an Advanced
Persistant Threat (APT), breach the cyber protection of the facility and aims to
damage primary assets (e.g. main cooling water pumps, feedwater pumps, safety
valves, circuit breakers). Accordingly, we assume that the attack agent performs
gradual manipulations at the application level. Detecting and predicting a potential
anomaly is designed and implemented based on machine learning of expected behavior.
The thesis will include examples of attacks executed over an extended time period by
manipulating combinations of analog and binary signal values or set-points. Challenges
related to the training of the detection algorithms, avoidance of false positives and
concise reporting to non-security domain experts will also be addressed. -
Diplomarbeit
Prüfungsergebnis: 1,0
Within this part of my dual degree program i wrote my diploma thesis: "Prototype’s implementation of a virtualized Instrumentation and Control System for Nuclear Power Plants"
-
Mechatroniker (IHK 2016)
Prüfungsergebnis: 78 Punkte
Abschluss der innerhalb der ersten 2,5 Studienjahre absolvierten Ausbildung
Sprachen
-
Deutsch
Muttersprache oder zweisprachig
-
Englisch
Verhandlungssicher
-
Französisch
Grundkenntnisse
Organisationen
-
Gesellschaft für Informatik e.V.
-
–Heute -
VDI Verein Deutscher Ingenieure e.V.
-
–Heute
Weitere Aktivitäten von Ludger Peters
-
CEO sein ist wichtig, Papa sein wichtiger. 👨👧👦 Ja, mein Job erfüllt mich und ist mir wichtig. Was aber immer an erster Stelle bei mir stehen…
CEO sein ist wichtig, Papa sein wichtiger. 👨👧👦 Ja, mein Job erfüllt mich und ist mir wichtig. Was aber immer an erster Stelle bei mir stehen…
Beliebt bei Ludger Peters
-
Ich habe Tränen gelacht und konnte dann selbst kaum aufhören zu schreiben. Auf TikTok und Instagram trendet gerade #womeninmalefields. Juliane…
Ich habe Tränen gelacht und konnte dann selbst kaum aufhören zu schreiben. Auf TikTok und Instagram trendet gerade #womeninmalefields. Juliane…
Beliebt bei Ludger Peters
Weitere ähnliche Profile
Weitere Mitglieder namens Ludger Peters in Deutschland
-
Ludger Peters
Fachbereichsleiter TGA bei Goldbeck GmbH
-
Ludger Peters
Geschäftsführer
-
Ludger Peters
Tendering Manager bei Steelco Group
-
Ludger Peters
GF bei PAS GmbH
Es gibt auf LinkedIn 11 weitere Personen namens Ludger Peters, die sich in Deutschland befinden.
Weitere Mitglieder anzeigen, die Ludger Peters heißen