[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Khosroshahi et al., 2016 - Google Patents

Security technology by using firewall for smart grid

Khosroshahi et al., 2016

View PDF
Document ID
8512443752908919962
Author
Khosroshahi A
Shahinzadeh H
Publication year
Publication venue
Bulletin of Electrical Engineering and Informatics

External Links

Snippet

Due to the increasing development of computer systems and information networks, power grids should change extensively too. Nowadays, substantial movement has begun to implement the Smart Grid industry around the world. Since with the creation of smart …
Continue reading at beei.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures

Similar Documents

Publication Publication Date Title
JP2005517349A (en) Network security system and method based on multi-method gateway
Mahan et al. Secure data transfer guidance for industrial control and SCADA systems
Marksteiner et al. Cyber security requirements engineering for low-voltage distribution smart grid architectures using threat modeling
Khosroshahi et al. Security technology by using firewall for smart grid
Jingyao et al. Securing a network: how effective using firewalls and VPNs are?
Oniga et al. A secure LoRaWAN sensor network architecture
Abbas et al. Security assessment and evaluation of VPNs: a comprehensive survey
O’Raw et al. Securing the industrial Internet of Things for critical infrastructure (IIoT-CI)
Peng Research on the Technology of Computer Network Security Protection
Tippenhauer et al. Vbump: Securing ethernet-based industrial control system networks with vlan-based traffic aggregation
Kumar et al. Cyber security threats in synchrophasor system in WAMS
O'Raw et al. IEC 61850 substation configuration language as a basis for automated security and SDN configuration
Wang Research on firewall technology and its application in computer network security strategy
HASHIYANA et al. Design and Implementation of an IPSec Virtual Private Network: A Case Study at the University of Namibia
Pedapudi et al. A Comprehensive Network Security Management in Virtual Private Network Environment
Jadhav et al. Detection and mitigation of arp spoofing attack
Singh et al. SCADA security issues and FPGA implementation of AES—A review
Kadry et al. DESIGN AND IMPLEMENTATION OF SYSTEM AND NETWORK SECURITY FOR AN ENTERPRISE WITH WORLDWIDE BRANCHES.
Tsunoda et al. Security by simple network traffic monitoring
Weerathunga et al. Securing IEDs against cyber threats in critical substation automation and industrial control systems
Yang et al. Security on ipv6
Taib et al. Security mechanisms for the IPv4 to IPv6 transition
Ahmed et al. Architecture based on tor network for securing the communication of northbound interface in sdn
Kaplesh et al. Firewalls: A study on Techniques, Security and Threats
Kim et al. Structure design and test of enterprise security management system with advanced internal security