[go: up one dir, main page]

Parvania et al., 2014 - Google Patents

Hybrid control network intrusion detection systems for automated power distribution systems

Parvania et al., 2014

View PDF
Document ID
6133432512673547714
Author
Parvania M
Koutsandria G
Muthukumary V
Peisert S
McParland C
Scaglione A
Publication year
Publication venue
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks

External Links

Snippet

In this paper, we describe our novel use of network intrusion detection systems (NIDS) for protecting automated distribution systems (ADS) against certain types of cyber attacks in a new way. The novelty consists of using the hybrid control environment rules and model as …
Continue reading at escholarship.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • H04L41/06Arrangements for maintenance or administration or management of packet switching networks involving management of faults or events or alarms
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing packet switching networks

Similar Documents

Publication Publication Date Title
Parvania et al. Hybrid control network intrusion detection systems for automated power distribution systems
Liu et al. Enhancing cyber-resiliency of der-based smart grid: A survey
Ten et al. Anomaly detection for cybersecurity of the substations
Liu et al. Intruders in the grid
Xiang et al. Coordinated attacks on electric power systems in a cyber-physical environment
Ashok et al. Cyber-physical attack-resilient wide-area monitoring, protection, and control for the power grid
Hong et al. Intelligent electronic devices with collaborative intrusion detection systems
Zhang et al. Power system reliability evaluation with SCADA cybersecurity considerations
Albarakati et al. Security monitoring of IEC 61850 substations using IEC 62351-7 network and system management
Koutsandria et al. A hybrid network IDS for protective digital relays in the power transmission grid
Hong et al. Detection of cyber intrusions using network-based multicast messages for substation automation
EP2721801B1 (en) Security measures for the smart grid
Choi et al. Multi-agent based cyber attack detection and mitigation for distribution automation system
Tan et al. Tabulating cybersecurity solutions for substations: Towards pragmatic design and planning
Sridhar et al. Risk analysis of coordinated cyber attacks on power grid
Elbez et al. A new classification of attacks against the cyber-physical security of smart grids
Hong et al. Cyber-physical security testbed for substations in a power grid
Khodabakhsh et al. Cyber-risk identification for a digital substation
Huang et al. Cyberattack defense with cyber-physical alert and control logic in industrial controllers
Erdődi et al. Attacking power grid substations: An experiment demonstrating how to attack the SCADA protocol IEC 60870-5-104
Mendel Smart grid cyber security challenges: Overview and classification
Zhang et al. Reliability analysis of power grids with cyber vulnerability in SCADA system
Ten et al. Cybersecurity for electric power control and automation systems
Presekal et al. Advanced persistent threat kill chain for cyber-physical power systems
Siu et al. A review of cyber-physical security in the generation system of the grid