Parvania et al., 2014 - Google Patents
Hybrid control network intrusion detection systems for automated power distribution systemsParvania et al., 2014
View PDF- Document ID
- 6133432512673547714
- Author
- Parvania M
- Koutsandria G
- Muthukumary V
- Peisert S
- McParland C
- Scaglione A
- Publication year
- Publication venue
- 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks
External Links
Snippet
In this paper, we describe our novel use of network intrusion detection systems (NIDS) for protecting automated distribution systems (ADS) against certain types of cyber attacks in a new way. The novelty consists of using the hybrid control environment rules and model as …
- 238000009826 distribution 0 title abstract description 34
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/06—Arrangements for maintenance or administration or management of packet switching networks involving management of faults or events or alarms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Parvania et al. | Hybrid control network intrusion detection systems for automated power distribution systems | |
| Liu et al. | Enhancing cyber-resiliency of der-based smart grid: A survey | |
| Ten et al. | Anomaly detection for cybersecurity of the substations | |
| Liu et al. | Intruders in the grid | |
| Xiang et al. | Coordinated attacks on electric power systems in a cyber-physical environment | |
| Ashok et al. | Cyber-physical attack-resilient wide-area monitoring, protection, and control for the power grid | |
| Hong et al. | Intelligent electronic devices with collaborative intrusion detection systems | |
| Zhang et al. | Power system reliability evaluation with SCADA cybersecurity considerations | |
| Albarakati et al. | Security monitoring of IEC 61850 substations using IEC 62351-7 network and system management | |
| Koutsandria et al. | A hybrid network IDS for protective digital relays in the power transmission grid | |
| Hong et al. | Detection of cyber intrusions using network-based multicast messages for substation automation | |
| EP2721801B1 (en) | Security measures for the smart grid | |
| Choi et al. | Multi-agent based cyber attack detection and mitigation for distribution automation system | |
| Tan et al. | Tabulating cybersecurity solutions for substations: Towards pragmatic design and planning | |
| Sridhar et al. | Risk analysis of coordinated cyber attacks on power grid | |
| Elbez et al. | A new classification of attacks against the cyber-physical security of smart grids | |
| Hong et al. | Cyber-physical security testbed for substations in a power grid | |
| Khodabakhsh et al. | Cyber-risk identification for a digital substation | |
| Huang et al. | Cyberattack defense with cyber-physical alert and control logic in industrial controllers | |
| Erdődi et al. | Attacking power grid substations: An experiment demonstrating how to attack the SCADA protocol IEC 60870-5-104 | |
| Mendel | Smart grid cyber security challenges: Overview and classification | |
| Zhang et al. | Reliability analysis of power grids with cyber vulnerability in SCADA system | |
| Ten et al. | Cybersecurity for electric power control and automation systems | |
| Presekal et al. | Advanced persistent threat kill chain for cyber-physical power systems | |
| Siu et al. | A review of cyber-physical security in the generation system of the grid |