[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Soltan et al., 2018 - Google Patents

EXPOSE the line failures following a cyber-physical attack on the power grid

Soltan et al., 2018

View PDF
Document ID
9912184875766672143
Author
Soltan S
Zussman G
Publication year
Publication venue
IEEE Transactions on Control of Network Systems

External Links

Snippet

Recent attacks on power grids demonstrated their vulnerability to cyber and physical attacks. To analyze this vulnerability, we study cyber-physical attacks that affect both the power grid physical infrastructure and its underlying supervisory control and data acquisition system …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/50Computer-aided design
    • G06F17/5009Computer-aided design using simulation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Similar Documents

Publication Publication Date Title
Soltan et al. EXPOSE the line failures following a cyber-physical attack on the power grid
Deng et al. CCPA: Coordinated cyber-physical attacks and countermeasures in smart grid
Beg et al. Signal temporal logic-based attack detection in DC microgrids
Ayad et al. Detection of false data injection attacks in smart grids using recurrent neural networks
Deng et al. False data injection on state estimation in power systems—Attacks, impacts, and defense: A survey
Yang et al. On optimal PMU placement-based defense against data integrity attacks in smart grid
Pal et al. Classification and detection of PMU data manipulation attacks using transmission line parameters
Kang et al. False data injection attacks on contingency analysis: Attack strategies and impact assessment
Yang et al. On false data-injection attacks against power system state estimation: Modeling and countermeasures
Esmalifalak et al. Stealth false data injection using independent component analysis in smart grid
Pei et al. PMU placement protection against coordinated false data injection attacks in smart grid
Lu et al. Constrained-differential-evolution-based stealthy sparse cyber-attack and countermeasure in an AC smart grid
Bi et al. Using covert topological information for defense against malicious attacks on DC state estimation
Tu et al. A hybrid cyber attack model for cyber-physical power systems
Zhou et al. Real-time detection of cyber-physical false data injection attacks on power systems
Du et al. Targeted false data injection attacks against AC state estimation without network parameters
Zhang et al. Zero-parameter-information data integrity attacks and countermeasures in IoT-based smart grid
Soltan et al. Line failure detection after a cyber-physical attack on the grid using Bayesian regression
Li et al. Intrusion detection of cyber physical energy system based on multivariate ensemble classification
Goyel et al. Data integrity attack detection using ensemble-based learning for cyber–physical power systems
Liu et al. Explicit analysis on effectiveness and hiddenness of moving target defense in AC power systems
Xu et al. Blending data and physics against false data injection attack: An event-triggered moving target defence approach
Huang et al. Preventing outages under coordinated cyber–physical attack with secured PMUs
Khanna et al. Priority-based protection against the malicious data injection attacks on state estimation
Zhang et al. SPMA: Stealthy physics-manipulated attack and countermeasures in cyber-physical smart grid