Wang et al., 2016 - Google Patents
Cyber inference system for substation anomalies against alter-and-hide attacksWang et al., 2016
View PDF- Document ID
- 1094430795720665007
- Author
- Wang C
- Ten C
- Hou Y
- Ginter A
- Publication year
- Publication venue
- IEEE Transactions on Power Systems
External Links
Snippet
Alarms reported to energy control centers are an indication of abnormal events caused by either weather interruptions, system errors, or possibly intentional anomalies. Although these initiating events are random, eg, faults on transmission lines struck by lightning, the …
- 238000005259 measurement 0 abstract description 10
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/06—Arrangements for maintenance or administration or management of packet switching networks involving management of faults or events or alarms
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Nafees et al. | Smart grid cyber-physical situational awareness of complex operational technology attacks: A review | |
Ten et al. | Anomaly detection for cybersecurity of the substations | |
Wang et al. | Distributed framework for detecting PMU data manipulation attacks with deep autoencoders | |
Wang et al. | Cyber inference system for substation anomalies against alter-and-hide attacks | |
Pei et al. | PMU placement protection against coordinated false data injection attacks in smart grid | |
He et al. | Cyber‐physical attacks and defences in the smart grid: a survey | |
Pan et al. | Developing a hybrid intrusion detection system using data mining for power systems | |
Pan et al. | A specification-based intrusion detection framework for cyber-physical environment in electric power system. | |
Tu et al. | A hybrid cyber attack model for cyber-physical power systems | |
Parvania et al. | Hybrid control network intrusion detection systems for automated power distribution systems | |
Sheng et al. | A cyber-physical model for SCADA system and its intrusion detection | |
Albarakati et al. | Security monitoring of IEC 61850 substations using IEC 62351-7 network and system management | |
Cassottana et al. | Resilience analysis of cyber‐physical systems: A review of models and methods | |
Adhikari et al. | A cyber-physical power system test bed for intrusion detection systems | |
CN106850558A (en) | Intelligent electric meter abnormal state detection method based on seaconal model time series | |
Zheng et al. | Smart grid: Cyber attacks, critical defense approaches, and digital twin | |
Khodabakhsh et al. | Cyber-risk identification for a digital substation | |
Havlena et al. | Accurate automata-based detection of cyber threats in smart grid communication | |
Jiwen et al. | Cyber security vulnerability assessment for Smart substations | |
Ling et al. | A threat modeling language for generating attack graphs of substation automation systems | |
He et al. | Cascading Failure in Cyber–Physical Systems: A Review on Failure Modeling and Vulnerability Analysis | |
Ashok et al. | A high-fidelity cyber-physical testbed-based benchmarking dataset for testing operational technology specific intrusion detection systems | |
Siu et al. | A review of cyber-physical security in the generation system of the grid | |
Konstantinou et al. | 15. Security Analysis of Smart Grid | |
Hahn | Cyber security of the smart grid: Attack exposure analysis, detection algorithms, and testbed evaluation |