Nothing Special   »   [go: up one dir, main page]

Wang et al., 2016 - Google Patents

Cyber inference system for substation anomalies against alter-and-hide attacks

Wang et al., 2016

View PDF
Document ID
1094430795720665007
Author
Wang C
Ten C
Hou Y
Ginter A
Publication year
Publication venue
IEEE Transactions on Power Systems

External Links

Snippet

Alarms reported to energy control centers are an indication of abnormal events caused by either weather interruptions, system errors, or possibly intentional anomalies. Although these initiating events are random, eg, faults on transmission lines struck by lightning, the …
Continue reading at hub.hku.hk (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • H04L41/06Arrangements for maintenance or administration or management of packet switching networks involving management of faults or events or alarms

Similar Documents

Publication Publication Date Title
Nafees et al. Smart grid cyber-physical situational awareness of complex operational technology attacks: A review
Ten et al. Anomaly detection for cybersecurity of the substations
Wang et al. Distributed framework for detecting PMU data manipulation attacks with deep autoencoders
Wang et al. Cyber inference system for substation anomalies against alter-and-hide attacks
Pei et al. PMU placement protection against coordinated false data injection attacks in smart grid
He et al. Cyber‐physical attacks and defences in the smart grid: a survey
Pan et al. Developing a hybrid intrusion detection system using data mining for power systems
Pan et al. A specification-based intrusion detection framework for cyber-physical environment in electric power system.
Tu et al. A hybrid cyber attack model for cyber-physical power systems
Parvania et al. Hybrid control network intrusion detection systems for automated power distribution systems
Sheng et al. A cyber-physical model for SCADA system and its intrusion detection
Albarakati et al. Security monitoring of IEC 61850 substations using IEC 62351-7 network and system management
Cassottana et al. Resilience analysis of cyber‐physical systems: A review of models and methods
Adhikari et al. A cyber-physical power system test bed for intrusion detection systems
CN106850558A (en) Intelligent electric meter abnormal state detection method based on seaconal model time series
Zheng et al. Smart grid: Cyber attacks, critical defense approaches, and digital twin
Khodabakhsh et al. Cyber-risk identification for a digital substation
Havlena et al. Accurate automata-based detection of cyber threats in smart grid communication
Jiwen et al. Cyber security vulnerability assessment for Smart substations
Ling et al. A threat modeling language for generating attack graphs of substation automation systems
He et al. Cascading Failure in Cyber–Physical Systems: A Review on Failure Modeling and Vulnerability Analysis
Ashok et al. A high-fidelity cyber-physical testbed-based benchmarking dataset for testing operational technology specific intrusion detection systems
Siu et al. A review of cyber-physical security in the generation system of the grid
Konstantinou et al. 15. Security Analysis of Smart Grid
Hahn Cyber security of the smart grid: Attack exposure analysis, detection algorithms, and testbed evaluation