Appiah-Kubi et al., 2020 - Google Patents
Decentralized intrusion prevention (DIP) against co-ordinated cyberattacks on distribution automation systemsAppiah-Kubi et al., 2020
View PDF- Document ID
- 12513861840353436593
- Author
- Appiah-Kubi J
- Liu C
- Publication year
- Publication venue
- IEEE Open Access Journal of Power and Energy
External Links
Snippet
Integration of Information and Communications Technology (ICT) into the distribution system makes today's power grid more remotely monitored and controlled than it has been. The fast increasing connectivity, however, also implies that the distribution grid today, or smart grid, is …
- 230000002265 prevention 0 title abstract description 9
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Communication or information technology specific aspects supporting electrical power generation, transmission, distribution or end-user application management
- Y04S40/20—Information technology specific aspects
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Communication or information technology specific aspects supporting electrical power generation, transmission, distribution or end-user application management
- Y04S40/10—Communication technology specific aspects
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Liu et al. | Enhancing cyber-resiliency of DER-based smart grid: A survey | |
| Appiah-Kubi et al. | Decentralized intrusion prevention (DIP) against co-ordinated cyberattacks on distribution automation systems | |
| Li et al. | Cybersecurity of smart inverters in the smart grid: A survey | |
| Huseinović et al. | A survey of denial-of-service attacks and solutions in the smart grid | |
| Mirzaee et al. | Smart grid security and privacy: From conventional to machine learning issues (threats and countermeasures) | |
| Cameron et al. | Using self-organizing architectures to mitigate the impacts of denial-of-service attacks on voltage control schemes | |
| Pan et al. | Context aware intrusion detection for building automation systems | |
| Roy et al. | Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees | |
| Kelli et al. | Attacking and defending DNP3 ICS/SCADA systems | |
| Igbe et al. | Deterministic dendritic cell algorithm application to smart grid cyber-attack detection | |
| Saxena et al. | Impact evaluation of malicious control commands in cyber-physical smart grids | |
| Boakye-Boateng et al. | Securing substations with trust, risk posture, and multi-agent systems: A comprehensive approach | |
| Pan et al. | Anomaly based intrusion detection for building automation and control networks | |
| Behdadnia et al. | Leveraging deep learning to increase the success rate of DoS attacks in PMU-based automatic generation control systems | |
| Srinivasan | Detection of Black Hole Attack Using Honeypot Agent-Based Scheme with Deep Learning Technique on MANET. | |
| Liu et al. | Game attack–defense graph approach for modeling and analysis of cyberattacks and defenses in local metering system | |
| KR102704348B1 (en) | Method and apparatus for trustworthiness evaluation of smart grid data aggregation in smart grids | |
| Liu et al. | Cyber–physical system security of distribution systems | |
| CN119922026A (en) | Satellite Internet Threat Identification Method, System and Electronic Device | |
| Quincozes et al. | Towards feature engineering for intrusion detection in IEC–61850 communication networks | |
| Tan et al. | Developments, challenges and future opportunities in cybersecure microgrid control | |
| Presekal et al. | Anomaly Detection and Mitigation in Cyber‐Physical Power Systems Based on Hybrid Deep Learning and Attack Graphs | |
| CN119849314A (en) | Secure deduction method and device based on trusted computing | |
| Katuri et al. | Real-Time Detection and Identification of ARP Spoofing Attacks in Microgrids | |
| Quincozes et al. | Feature extraction for intrusion detection in IEC-61850 communication networks |