[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Aribisala et al., 2021 - Google Patents

Machine learning algorithms and their applications in classifying cyber-attacks on a smart grid network

Aribisala et al., 2021

Document ID
7255789686023732049
Author
Aribisala A
Khan M
Husari G
Publication year
Publication venue
2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)

External Links

Snippet

Smart grid architecture and Software-defined Networking (SDN) have evolved into a centrally controlled infrastructure that captures and extracts data in real-time through sensors, smart-meters, and virtual machines. These advances pose a risk and increase the …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Similar Documents

Publication Publication Date Title
Siniosoglou et al. A unified deep learning anomaly detection and classification approach for smart grid environments
Sahani et al. Machine learning-based intrusion detection for smart grid computing: A survey
Radoglou-Grammatikis et al. Securing the smart grid: A comprehensive compilation of intrusion detection and prevention systems
Ahmed et al. Unsupervised machine learning-based detection of covert data integrity assault in smart grid networks utilizing isolation forest
Mehrdad et al. Cyber-physical resilience of electrical power systems against malicious attacks: A review
Keshk et al. Privacy preservation intrusion detection technique for SCADA systems
Efstathopoulos et al. Operational data based intrusion detection system for smart grid
Garitano et al. A review of SCADA anomaly detection systems
Faisal et al. Securing advanced metering infrastructure using intrusion detection system with data stream mining
Mohammed et al. Intrusion detection system based on SVM for WLAN
Aribisala et al. Machine learning algorithms and their applications in classifying cyber-attacks on a smart grid network
Dairi et al. Semi-supervised deep learning-driven anomaly detection schemes for cyber-attack detection in smart grids
Abdi et al. The role of deep learning in advancing proactive cybersecurity measures for smart grid networks: A survey
Prabhakar et al. Cyber security of smart metering infrastructure using median absolute deviation methodology
Tong et al. A survey on intrusion detection system for advanced metering infrastructure
Iturbe et al. Towards Large‐Scale, Heterogeneous Anomaly Detection Systems in Industrial Networks: A Survey of Current Trends
Chen et al. Ensemble learning methods for power system cyber-attack detection
Danso et al. Ensemble-based intrusion detection for internet of things devices
Singh et al. A review on cyber physical system attacks: Issues and challenges
Saraswat et al. AnSMart: A SVM-based anomaly detection scheme via system profiling in Smart Grids
Soewu et al. Analysis of Data Mining-Based Approach for Intrusion Detection System
Zhang et al. Network Traffic Anomaly Detection Based on ML‐ESN for Power Metering System
Maheswaran et al. Effective intrusion detection system using hybrid ensemble method for cloud computing
Lai et al. Review of intrusion detection methods and tools for distributed energy resources
Algarni et al. An edge computing-based and threat behavior-aware smart prioritization framework for cybersecurity intrusion detection and prevention of ieds in smart grids with integration of modified lgbm and one class-SVM models