Kwon et al., 2020 - Google Patents
IEEE 1815.1-based power system security with bidirectional RNN-based network anomalous attack detection for cyber-physical systemKwon et al., 2020
View PDF- Document ID
- 12440449644232805947
- Author
- Kwon S
- Yoo H
- Shon T
- Publication year
- Publication venue
- IEEE Access
External Links
Snippet
The introduction of the cyber-physical system (CPS) into power systems has created a variety of communication requirements and functions that existing legacy systems do not support. To this end, the IEEE 1815.1 standard defines the mapping between existing …
- 238000001514 detection method 0 title abstract description 101
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. local area networks [LAN], wide area networks [WAN]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Application independent communication protocol aspects or techniques in packet data networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kwon et al. | IEEE 1815.1-based power system security with bidirectional RNN-based network anomalous attack detection for cyber-physical system | |
Radoglou-Grammatikis et al. | Securing the smart grid: A comprehensive compilation of intrusion detection and prevention systems | |
Mallouhi et al. | A testbed for analyzing security of SCADA control systems (TASSCS) | |
Shang et al. | Intrusion detection algorithm based on OCSVM in industrial control system | |
US20060034305A1 (en) | Anomaly-based intrusion detection | |
EP2737683A1 (en) | Method and system for classifying a protocol message in a data communication network | |
Dairi et al. | Semi-supervised deep learning-driven anomaly detection schemes for cyber-attack detection in smart grids | |
Wang et al. | Anomaly detection for insider attacks from untrusted intelligent electronic devices in substation automation systems | |
Albarakati et al. | Security monitoring of IEC 61850 substations using IEC 62351-7 network and system management | |
Marino et al. | Data-driven correlation of cyber and physical anomalies for holistic system health monitoring | |
Singh et al. | Cyber kill chain-based hybrid intrusion detection system for smart grid | |
Kim et al. | Industrial network-based behavioral anomaly detection in AI-enabled smart manufacturing | |
CN112398862B (en) | Charging pile attack clustering detection method based on GRU model | |
Hu et al. | An enhanced multi-stage semantic attack against industrial control systems | |
El Hariri et al. | A targeted attack for enhancing resiliency of intelligent intrusion detection modules in energy cyber physical systems | |
Kim et al. | Unknown payload anomaly detection based on format and field semantics inference in cyber-physical infrastructure systems | |
Markman et al. | Temporal phase shifts in scada networks | |
Behdadnia et al. | Leveraging deep learning to increase the success rate of DOS attacks in PMU-based automatic generation control systems | |
Aldossary et al. | Securing SCADA systems against cyber-attacks using artificial intelligence | |
Deng et al. | Intrusion detection method based on support vector machine access of modbus TCP protocol | |
Hahn | Cyber security of the smart grid: Attack exposure analysis, detection algorithms, and testbed evaluation | |
Wang et al. | Feature selection for precise anomaly detection in substation automation systems | |
Vähäkainu et al. | Cyberattacks against critical infrastructure facilities and corresponding countermeasures | |
Sen et al. | On specification-based cyber-attack detection in smart grids | |
Leao et al. | Machine learning-based false data injection attack detection and localization in power grids |