Soltan et al., 2018 - Google Patents
EXPOSE the line failures following a cyber-physical attack on the power gridSoltan et al., 2018
View PDF- Document ID
- 9912184875766672143
- Author
- Soltan S
- Zussman G
- Publication year
- Publication venue
- IEEE Transactions on Control of Network Systems
External Links
Snippet
Recent attacks on power grids demonstrated their vulnerability to cyber and physical attacks. To analyze this vulnerability, we study cyber-physical attacks that affect both the power grid physical infrastructure and its underlying supervisory control and data acquisition system …
- 238000005259 measurement 0 abstract description 16
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
- G06F17/5009—Computer-aided design using simulation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Soltan et al. | EXPOSE the line failures following a cyber-physical attack on the power grid | |
Deng et al. | CCPA: Coordinated cyber-physical attacks and countermeasures in smart grid | |
Beg et al. | Signal temporal logic-based attack detection in DC microgrids | |
Ayad et al. | Detection of false data injection attacks in smart grids using recurrent neural networks | |
Deng et al. | False data injection on state estimation in power systems—Attacks, impacts, and defense: A survey | |
Yang et al. | On optimal PMU placement-based defense against data integrity attacks in smart grid | |
Pal et al. | Classification and detection of PMU data manipulation attacks using transmission line parameters | |
Kang et al. | False data injection attacks on contingency analysis: Attack strategies and impact assessment | |
Yang et al. | On false data-injection attacks against power system state estimation: Modeling and countermeasures | |
Esmalifalak et al. | Stealth false data injection using independent component analysis in smart grid | |
Pei et al. | PMU placement protection against coordinated false data injection attacks in smart grid | |
Lu et al. | Constrained-differential-evolution-based stealthy sparse cyber-attack and countermeasure in an AC smart grid | |
Bi et al. | Using covert topological information for defense against malicious attacks on DC state estimation | |
Tu et al. | A hybrid cyber attack model for cyber-physical power systems | |
Zhou et al. | Real-time detection of cyber-physical false data injection attacks on power systems | |
Du et al. | Targeted false data injection attacks against AC state estimation without network parameters | |
Zhang et al. | Zero-parameter-information data integrity attacks and countermeasures in IoT-based smart grid | |
Soltan et al. | Line failure detection after a cyber-physical attack on the grid using Bayesian regression | |
Li et al. | Intrusion detection of cyber physical energy system based on multivariate ensemble classification | |
Goyel et al. | Data integrity attack detection using ensemble-based learning for cyber–physical power systems | |
Liu et al. | Explicit analysis on effectiveness and hiddenness of moving target defense in AC power systems | |
Xu et al. | Blending data and physics against false data injection attack: An event-triggered moving target defence approach | |
Huang et al. | Preventing outages under coordinated cyber–physical attack with secured PMUs | |
Khanna et al. | Priority-based protection against the malicious data injection attacks on state estimation | |
Zhang et al. | SPMA: Stealthy physics-manipulated attack and countermeasures in cyber-physical smart grid |