[go: up one dir, main page]

Kwon et al., 2020 - Google Patents

IEEE 1815.1-based power system security with bidirectional RNN-based network anomalous attack detection for cyber-physical system

Kwon et al., 2020

View PDF
Document ID
12440449644232805947
Author
Kwon S
Yoo H
Shon T
Publication year
Publication venue
IEEE Access

External Links

Snippet

The introduction of the cyber-physical system (CPS) into power systems has created a variety of communication requirements and functions that existing legacy systems do not support. To this end, the IEEE 1815.1 standard defines the mapping between existing …
Continue reading at ieeexplore.ieee.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. local area networks [LAN], wide area networks [WAN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Application independent communication protocol aspects or techniques in packet data networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks

Similar Documents

Publication Publication Date Title
Kwon et al. IEEE 1815.1-based power system security with bidirectional RNN-based network anomalous attack detection for cyber-physical system
Radoglou-Grammatikis et al. Securing the smart grid: A comprehensive compilation of intrusion detection and prevention systems
Mallouhi et al. A testbed for analyzing security of SCADA control systems (TASSCS)
Shang et al. Intrusion detection algorithm based on OCSVM in industrial control system
US20060034305A1 (en) Anomaly-based intrusion detection
EP2737683A1 (en) Method and system for classifying a protocol message in a data communication network
Dairi et al. Semi-supervised deep learning-driven anomaly detection schemes for cyber-attack detection in smart grids
Wang et al. Anomaly detection for insider attacks from untrusted intelligent electronic devices in substation automation systems
Albarakati et al. Security monitoring of IEC 61850 substations using IEC 62351-7 network and system management
Marino et al. Data-driven correlation of cyber and physical anomalies for holistic system health monitoring
Singh et al. Cyber kill chain-based hybrid intrusion detection system for smart grid
Kim et al. Industrial network-based behavioral anomaly detection in AI-enabled smart manufacturing
CN112398862B (en) Charging pile attack clustering detection method based on GRU model
Hu et al. An enhanced multi-stage semantic attack against industrial control systems
El Hariri et al. A targeted attack for enhancing resiliency of intelligent intrusion detection modules in energy cyber physical systems
Kim et al. Unknown payload anomaly detection based on format and field semantics inference in cyber-physical infrastructure systems
Markman et al. Temporal phase shifts in scada networks
Behdadnia et al. Leveraging deep learning to increase the success rate of DOS attacks in PMU-based automatic generation control systems
Aldossary et al. Securing SCADA systems against cyber-attacks using artificial intelligence
Deng et al. Intrusion detection method based on support vector machine access of modbus TCP protocol
Hahn Cyber security of the smart grid: Attack exposure analysis, detection algorithms, and testbed evaluation
Wang et al. Feature selection for precise anomaly detection in substation automation systems
Vähäkainu et al. Cyberattacks against critical infrastructure facilities and corresponding countermeasures
Sen et al. On specification-based cyber-attack detection in smart grids
Leao et al. Machine learning-based false data injection attack detection and localization in power grids