Li, 2019 - Google Patents
Detection of false data injection attacks in smart grid cyber-physical systemsLi, 2019
View PDF- Document ID
- 17862105550965989089
- Author
- Li B
- Publication year
- Publication venue
- Ph. D. Thesis
External Links
Snippet
Building an automated, green, and efficient smart grid cyber-physical system (CPS) while ensuring high reliability and security is an extraordinarily challenging task, particularly in the ever-evolving cyber threat landscape. This challenge is also compounded by the increasing …
- 238000001514 detection method 0 title abstract description 79
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hasan et al. | Blockchain technology on smart grid, energy trading, and big data: security issues, challenges, and recommendations | |
Nafees et al. | Smart grid cyber-physical situational awareness of complex operational technology attacks: A review | |
Gunduz et al. | Cyber-security on smart grid: Threats and potential solutions | |
Hasan et al. | Review on cyber-physical and cyber-security system in smart grid: Standards, protocols, constraints, and recommendations | |
Zhang et al. | Smart grid cyber-physical attack and defense: A review | |
Sun et al. | Cyber security of a power grid: State-of-the-art | |
Delgado-Gomes et al. | Smart grid security issues | |
Goel et al. | Security challenges in smart grid implementation | |
Yang et al. | Impact of cyber-security issues on smart grid | |
Liu et al. | Enhancing cyber-resiliency of DER-based smart grid: A survey | |
Goel et al. | Smart grid security | |
Xie et al. | Physical and cybersecurity in a smart grid environment | |
Ganguly et al. | Challenges of the existing security measures deployed in the smart grid framework | |
Reda et al. | A taxonomy of cyber defence strategies against false data attacks in smart grids | |
Tatipatri et al. | A Comprehensive Review on Cyber-attacks in Power Systems: Impact Analysis, Detection and Cyber security | |
Gaspar et al. | Smart substation communications and cybersecurity: A comprehensive survey | |
Zheng et al. | Smart grid: Cyber attacks, critical defense approaches, and digital twin | |
Elbez et al. | A new classification of attacks against the cyber-physical security of smart grids | |
Li et al. | Towards insider threats detection in smart grid communication systems | |
Leszczyna | Cybersecurity in the electricity sector | |
Rekeraho et al. | Cybersecurity challenges in IoT-based smart renewable energy | |
Duman et al. | Factor of security (FoS): quantifying the security effectiveness of redundant smart grid subsystems | |
Liu et al. | Cyber–physical system security of distribution systems | |
Achaal et al. | Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges | |
Li | Detection of false data injection attacks in smart grid cyber-physical systems |