Zheng et al., 2022 - Google Patents
Smart grid: Cyber attacks, critical defense approaches, and digital twinZheng et al., 2022
View PDF- Document ID
- 6853028809130528315
- Author
- Zheng T
- Liu M
- Puthal D
- Yi P
- Wu Y
- He X
- Publication year
- Publication venue
- arXiv preprint arXiv:2205.11783
External Links
Snippet
As a national critical infrastructure, the smart grid has attracted widespread attention for its cybersecurity issues. The development towards an intelligent, digital, and Internetconnected smart grid has attracted external adversaries for malicious activities. It is necessary to …
- 238000001514 detection method 0 abstract description 72
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Nafees et al. | Smart grid cyber-physical situational awareness of complex operational technology attacks: A review | |
US11075932B2 (en) | Appliance extension for remote communication with a cyber security appliance | |
US20210273957A1 (en) | Cyber security for software-as-a-service factoring risk | |
Radoglou-Grammatikis et al. | Securing the smart grid: A comprehensive compilation of intrusion detection and prevention systems | |
Zolanvari et al. | Machine learning-based network vulnerability analysis of industrial Internet of Things | |
Asghar et al. | Cybersecurity in industrial control systems: Issues, technologies, and challenges | |
US20210360027A1 (en) | Cyber Security for Instant Messaging Across Platforms | |
Giraldo et al. | Security and privacy in cyber-physical systems: A survey of surveys | |
Cruz et al. | A cybersecurity detection framework for supervisory control and data acquisition systems | |
Zheng et al. | Smart grid: Cyber attacks, critical defense approaches, and digital twin | |
Li et al. | A critical review of cyber-physical security for building automation systems | |
Saxena et al. | Impact evaluation of malicious control commands in cyber-physical smart grids | |
Sheikh et al. | Intelligent and secure framework for critical infrastructure (CPS): Current trends, challenges, and future scope | |
Gaspar et al. | Smart substation communications and cybersecurity: A comprehensive survey | |
Skopik et al. | synERGY: Cross-correlation of operational and contextual data to timely detect and mitigate attacks to cyber-physical systems | |
Flå et al. | Tool-assisted threat modeling for smart grid cyber security | |
Mashima et al. | Cybersecurity for Modern Smart Grid Against Emerging Threats | |
Vähäkainu et al. | Cyberattacks Against Critical Infrastructure Facilities and Corresponding Countermeasures | |
Bîrleanu et al. | Cyber security objectives and requirements for smart grid | |
Wu et al. | Design and Implementation of the Zero Trust Model in the Power Internet of Things | |
Mavale et al. | Review of cyber-attacks on smart grid system | |
Hahn | Cyber security of the smart grid: Attack exposure analysis, detection algorithms, and testbed evaluation | |
Kamal et al. | Identifying and scoring vulnerability in scada environments | |
Li | Detection of false data injection attacks in smart grid cyber-physical systems | |
Borhani et al. | A critical analysis of the industrial device scanners’ potentials, risks, and preventives |