Xie et al., 2019 - Google Patents
Physical and cybersecurity in a smart grid environmentXie et al., 2019
View PDF- Document ID
- 8602029413810713616
- Author
- Xie J
- Stefanov A
- Liu C
- Publication year
- Publication venue
- Advances in Energy Systems: The Large‐scale Renewable Energy Integration Challenge
External Links
Snippet
As a critical infrastructure, the electric power grid is vulnerable with respect to malicious physical and cyberattacks. This chapter discusses critical vulnerabilities of a smart grid that can be exploited for physical and cyber intrusions. A comprehensive survey is conducted on …
- 238000004891 communication 0 abstract description 42
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B29/00—Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Xie et al. | Physical and cybersecurity in a smart grid environment | |
| Zhang et al. | Smart grid cyber-physical attack and defense: A review | |
| Wang et al. | Review of the false data injection attack against the cyber‐physical power system | |
| Nafees et al. | Smart grid cyber-physical situational awareness of complex operational technology attacks: A review | |
| He et al. | Cyber‐physical attacks and defences in the smart grid: a survey | |
| Giraldo et al. | Security and privacy in cyber-physical systems: A survey of surveys | |
| US11689544B2 (en) | Intrusion detection via semantic fuzzing and message provenance | |
| Liu et al. | False data attack models, impact analyses and defense strategies in the electricity grid | |
| Jarmakiewicz et al. | Cybersecurity protection for power grid control infrastructures | |
| Hossain et al. | Cyber–physical security for on‐going smart grid initiatives: a survey | |
| Achaal et al. | Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges | |
| Yang et al. | Attack and defence methods in cyber‐physical power system | |
| Zheng et al. | Smart grid: Cyber attacks, critical defense approaches, and digital twin | |
| Cai et al. | Review of cyber-attacks and defense research on cyber physical power system | |
| Elbez et al. | A new classification of attacks against the cyber-physical security of smart grids | |
| Sarkar et al. | A cybersecurity assessment framework for virtual operational technology in power system automation | |
| Starke et al. | Cross‐layered distributed data‐driven framework for enhanced smart grid cyber‐physical security | |
| Li et al. | Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems | |
| Duman et al. | Factor of security (FoS): Quantifying the security effectiveness of redundant smart grid subsystems | |
| Zang et al. | Research and Prospect of Defense for Integrated Energy Cyber–Physical Systems Against Deliberate Attacks | |
| Mavale et al. | Review of cyber-attacks on smart grid system | |
| Xie et al. | On‐line physical security monitoring of power substations | |
| Bîrleanu et al. | Cyber security objectives and requirements for smart grid | |
| Johnson et al. | Physical security and cybersecurity of energy storage systems | |
| Ramos et al. | Lstm-based detection of ot cyber-attacks for an offshore hvac-cooling process |