Khosroshahi et al., 2016 - Google Patents
Security technology by using firewall for smart gridKhosroshahi et al., 2016
View PDF- Document ID
- 8512443752908919962
- Author
- Khosroshahi A
- Shahinzadeh H
- Publication year
- Publication venue
- Bulletin of Electrical Engineering and Informatics
External Links
Snippet
Due to the increasing development of computer systems and information networks, power grids should change extensively too. Nowadays, substantial movement has begun to implement the Smart Grid industry around the world. Since with the creation of smart …
- 238000005516 engineering process 0 title description 7
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP2005517349A (en) | Network security system and method based on multi-method gateway | |
Mahan et al. | Secure data transfer guidance for industrial control and SCADA systems | |
Marksteiner et al. | Cyber security requirements engineering for low-voltage distribution smart grid architectures using threat modeling | |
Khosroshahi et al. | Security technology by using firewall for smart grid | |
Jingyao et al. | Securing a network: how effective using firewalls and VPNs are? | |
Oniga et al. | A secure LoRaWAN sensor network architecture | |
Abbas et al. | Security assessment and evaluation of VPNs: a comprehensive survey | |
O’Raw et al. | Securing the industrial Internet of Things for critical infrastructure (IIoT-CI) | |
Peng | Research on the Technology of Computer Network Security Protection | |
Tippenhauer et al. | Vbump: Securing ethernet-based industrial control system networks with vlan-based traffic aggregation | |
Kumar et al. | Cyber security threats in synchrophasor system in WAMS | |
O'Raw et al. | IEC 61850 substation configuration language as a basis for automated security and SDN configuration | |
Wang | Research on firewall technology and its application in computer network security strategy | |
HASHIYANA et al. | Design and Implementation of an IPSec Virtual Private Network: A Case Study at the University of Namibia | |
Pedapudi et al. | A Comprehensive Network Security Management in Virtual Private Network Environment | |
Jadhav et al. | Detection and mitigation of arp spoofing attack | |
Singh et al. | SCADA security issues and FPGA implementation of AES—A review | |
Kadry et al. | DESIGN AND IMPLEMENTATION OF SYSTEM AND NETWORK SECURITY FOR AN ENTERPRISE WITH WORLDWIDE BRANCHES. | |
Tsunoda et al. | Security by simple network traffic monitoring | |
Weerathunga et al. | Securing IEDs against cyber threats in critical substation automation and industrial control systems | |
Yang et al. | Security on ipv6 | |
Taib et al. | Security mechanisms for the IPv4 to IPv6 transition | |
Ahmed et al. | Architecture based on tor network for securing the communication of northbound interface in sdn | |
Kaplesh et al. | Firewalls: A study on Techniques, Security and Threats | |
Kim et al. | Structure design and test of enterprise security management system with advanced internal security |