Aribisala et al., 2021 - Google Patents
Machine learning algorithms and their applications in classifying cyber-attacks on a smart grid networkAribisala et al., 2021
- Document ID
- 7255789686023732049
- Author
- Aribisala A
- Khan M
- Husari G
- Publication year
- Publication venue
- 2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)
External Links
Snippet
Smart grid architecture and Software-defined Networking (SDN) have evolved into a centrally controlled infrastructure that captures and extracts data in real-time through sensors, smart-meters, and virtual machines. These advances pose a risk and increase the …
- 238000010801 machine learning 0 title abstract description 25
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Siniosoglou et al. | A unified deep learning anomaly detection and classification approach for smart grid environments | |
Sahani et al. | Machine learning-based intrusion detection for smart grid computing: A survey | |
Radoglou-Grammatikis et al. | Securing the smart grid: A comprehensive compilation of intrusion detection and prevention systems | |
Ahmed et al. | Unsupervised machine learning-based detection of covert data integrity assault in smart grid networks utilizing isolation forest | |
Mehrdad et al. | Cyber-physical resilience of electrical power systems against malicious attacks: A review | |
Keshk et al. | Privacy preservation intrusion detection technique for SCADA systems | |
Efstathopoulos et al. | Operational data based intrusion detection system for smart grid | |
Garitano et al. | A review of SCADA anomaly detection systems | |
Faisal et al. | Securing advanced metering infrastructure using intrusion detection system with data stream mining | |
Mohammed et al. | Intrusion detection system based on SVM for WLAN | |
Aribisala et al. | Machine learning algorithms and their applications in classifying cyber-attacks on a smart grid network | |
Dairi et al. | Semi-supervised deep learning-driven anomaly detection schemes for cyber-attack detection in smart grids | |
Abdi et al. | The role of deep learning in advancing proactive cybersecurity measures for smart grid networks: A survey | |
Prabhakar et al. | Cyber security of smart metering infrastructure using median absolute deviation methodology | |
Tong et al. | A survey on intrusion detection system for advanced metering infrastructure | |
Iturbe et al. | Towards Large‐Scale, Heterogeneous Anomaly Detection Systems in Industrial Networks: A Survey of Current Trends | |
Chen et al. | Ensemble learning methods for power system cyber-attack detection | |
Danso et al. | Ensemble-based intrusion detection for internet of things devices | |
Singh et al. | A review on cyber physical system attacks: Issues and challenges | |
Saraswat et al. | AnSMart: A SVM-based anomaly detection scheme via system profiling in Smart Grids | |
Soewu et al. | Analysis of Data Mining-Based Approach for Intrusion Detection System | |
Zhang et al. | Network Traffic Anomaly Detection Based on ML‐ESN for Power Metering System | |
Maheswaran et al. | Effective intrusion detection system using hybrid ensemble method for cloud computing | |
Lai et al. | Review of intrusion detection methods and tools for distributed energy resources | |
Algarni et al. | An edge computing-based and threat behavior-aware smart prioritization framework for cybersecurity intrusion detection and prevention of ieds in smart grids with integration of modified lgbm and one class-SVM models |