[go: up one dir, main page]

Appiah-Kubi et al., 2020 - Google Patents

Decentralized intrusion prevention (DIP) against co-ordinated cyberattacks on distribution automation systems

Appiah-Kubi et al., 2020

View PDF
Document ID
12513861840353436593
Author
Appiah-Kubi J
Liu C
Publication year
Publication venue
IEEE Open Access Journal of Power and Energy

External Links

Snippet

Integration of Information and Communications Technology (ICT) into the distribution system makes today's power grid more remotely monitored and controlled than it has been. The fast increasing connectivity, however, also implies that the distribution grid today, or smart grid, is …
Continue reading at ieeexplore.ieee.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Communication or information technology specific aspects supporting electrical power generation, transmission, distribution or end-user application management
    • Y04S40/20Information technology specific aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Communication or information technology specific aspects supporting electrical power generation, transmission, distribution or end-user application management
    • Y04S40/10Communication technology specific aspects

Similar Documents

Publication Publication Date Title
Liu et al. Enhancing cyber-resiliency of DER-based smart grid: A survey
Appiah-Kubi et al. Decentralized intrusion prevention (DIP) against co-ordinated cyberattacks on distribution automation systems
Li et al. Cybersecurity of smart inverters in the smart grid: A survey
Huseinović et al. A survey of denial-of-service attacks and solutions in the smart grid
Mirzaee et al. Smart grid security and privacy: From conventional to machine learning issues (threats and countermeasures)
Cameron et al. Using self-organizing architectures to mitigate the impacts of denial-of-service attacks on voltage control schemes
Pan et al. Context aware intrusion detection for building automation systems
Roy et al. Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees
Kelli et al. Attacking and defending DNP3 ICS/SCADA systems
Igbe et al. Deterministic dendritic cell algorithm application to smart grid cyber-attack detection
Saxena et al. Impact evaluation of malicious control commands in cyber-physical smart grids
Boakye-Boateng et al. Securing substations with trust, risk posture, and multi-agent systems: A comprehensive approach
Pan et al. Anomaly based intrusion detection for building automation and control networks
Behdadnia et al. Leveraging deep learning to increase the success rate of DoS attacks in PMU-based automatic generation control systems
Srinivasan Detection of Black Hole Attack Using Honeypot Agent-Based Scheme with Deep Learning Technique on MANET.
Liu et al. Game attack–defense graph approach for modeling and analysis of cyberattacks and defenses in local metering system
KR102704348B1 (en) Method and apparatus for trustworthiness evaluation of smart grid data aggregation in smart grids
Liu et al. Cyber–physical system security of distribution systems
CN119922026A (en) Satellite Internet Threat Identification Method, System and Electronic Device
Quincozes et al. Towards feature engineering for intrusion detection in IEC–61850 communication networks
Tan et al. Developments, challenges and future opportunities in cybersecure microgrid control
Presekal et al. Anomaly Detection and Mitigation in Cyber‐Physical Power Systems Based on Hybrid Deep Learning and Attack Graphs
CN119849314A (en) Secure deduction method and device based on trusted computing
Katuri et al. Real-Time Detection and Identification of ARP Spoofing Attacks in Microgrids
Quincozes et al. Feature extraction for intrusion detection in IEC-61850 communication networks