[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Zheng et al., 2022 - Google Patents

Smart grid: Cyber attacks, critical defense approaches, and digital twin

Zheng et al., 2022

View PDF
Document ID
6853028809130528315
Author
Zheng T
Liu M
Puthal D
Yi P
Wu Y
He X
Publication year
Publication venue
arXiv preprint arXiv:2205.11783

External Links

Snippet

As a national critical infrastructure, the smart grid has attracted widespread attention for its cybersecurity issues. The development towards an intelligent, digital, and Internetconnected smart grid has attracted external adversaries for malicious activities. It is necessary to …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis

Similar Documents

Publication Publication Date Title
Nafees et al. Smart grid cyber-physical situational awareness of complex operational technology attacks: A review
US11075932B2 (en) Appliance extension for remote communication with a cyber security appliance
US20210273957A1 (en) Cyber security for software-as-a-service factoring risk
Radoglou-Grammatikis et al. Securing the smart grid: A comprehensive compilation of intrusion detection and prevention systems
Zolanvari et al. Machine learning-based network vulnerability analysis of industrial Internet of Things
Asghar et al. Cybersecurity in industrial control systems: Issues, technologies, and challenges
US20210360027A1 (en) Cyber Security for Instant Messaging Across Platforms
Giraldo et al. Security and privacy in cyber-physical systems: A survey of surveys
Cruz et al. A cybersecurity detection framework for supervisory control and data acquisition systems
Zheng et al. Smart grid: Cyber attacks, critical defense approaches, and digital twin
Li et al. A critical review of cyber-physical security for building automation systems
Saxena et al. Impact evaluation of malicious control commands in cyber-physical smart grids
Sheikh et al. Intelligent and secure framework for critical infrastructure (CPS): Current trends, challenges, and future scope
Gaspar et al. Smart substation communications and cybersecurity: A comprehensive survey
Skopik et al. synERGY: Cross-correlation of operational and contextual data to timely detect and mitigate attacks to cyber-physical systems
Flå et al. Tool-assisted threat modeling for smart grid cyber security
Mashima et al. Cybersecurity for Modern Smart Grid Against Emerging Threats
Vähäkainu et al. Cyberattacks Against Critical Infrastructure Facilities and Corresponding Countermeasures
Bîrleanu et al. Cyber security objectives and requirements for smart grid
Wu et al. Design and Implementation of the Zero Trust Model in the Power Internet of Things
Mavale et al. Review of cyber-attacks on smart grid system
Hahn Cyber security of the smart grid: Attack exposure analysis, detection algorithms, and testbed evaluation
Kamal et al. Identifying and scoring vulnerability in scada environments
Li Detection of false data injection attacks in smart grid cyber-physical systems
Borhani et al. A critical analysis of the industrial device scanners’ potentials, risks, and preventives