[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Li, 2019 - Google Patents

Detection of false data injection attacks in smart grid cyber-physical systems

Li, 2019

View PDF
Document ID
17862105550965989089
Author
Li B
Publication year
Publication venue
Ph. D. Thesis

External Links

Snippet

Building an automated, green, and efficient smart grid cyber-physical system (CPS) while ensuring high reliability and security is an extraordinarily challenging task, particularly in the ever-evolving cyber threat landscape. This challenge is also compounded by the increasing …
Continue reading at dr.ntu.edu.sg (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details

Similar Documents

Publication Publication Date Title
Hasan et al. Blockchain technology on smart grid, energy trading, and big data: security issues, challenges, and recommendations
Nafees et al. Smart grid cyber-physical situational awareness of complex operational technology attacks: A review
Gunduz et al. Cyber-security on smart grid: Threats and potential solutions
Hasan et al. Review on cyber-physical and cyber-security system in smart grid: Standards, protocols, constraints, and recommendations
Zhang et al. Smart grid cyber-physical attack and defense: A review
Sun et al. Cyber security of a power grid: State-of-the-art
Delgado-Gomes et al. Smart grid security issues
Goel et al. Security challenges in smart grid implementation
Yang et al. Impact of cyber-security issues on smart grid
Liu et al. Enhancing cyber-resiliency of DER-based smart grid: A survey
Goel et al. Smart grid security
Xie et al. Physical and cybersecurity in a smart grid environment
Ganguly et al. Challenges of the existing security measures deployed in the smart grid framework
Reda et al. A taxonomy of cyber defence strategies against false data attacks in smart grids
Tatipatri et al. A Comprehensive Review on Cyber-attacks in Power Systems: Impact Analysis, Detection and Cyber security
Gaspar et al. Smart substation communications and cybersecurity: A comprehensive survey
Zheng et al. Smart grid: Cyber attacks, critical defense approaches, and digital twin
Elbez et al. A new classification of attacks against the cyber-physical security of smart grids
Li et al. Towards insider threats detection in smart grid communication systems
Leszczyna Cybersecurity in the electricity sector
Rekeraho et al. Cybersecurity challenges in IoT-based smart renewable energy
Duman et al. Factor of security (FoS): quantifying the security effectiveness of redundant smart grid subsystems
Liu et al. Cyber–physical system security of distribution systems
Achaal et al. Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges
Li Detection of false data injection attacks in smart grid cyber-physical systems