[go: up one dir, main page]

Xie et al., 2019 - Google Patents

Physical and cybersecurity in a smart grid environment

Xie et al., 2019

View PDF
Document ID
8602029413810713616
Author
Xie J
Stefanov A
Liu C
Publication year
Publication venue
Advances in Energy Systems: The Large‐scale Renewable Energy Integration Challenge

External Links

Snippet

As a critical infrastructure, the electric power grid is vulnerable with respect to malicious physical and cyberattacks. This chapter discusses critical vulnerabilities of a smart grid that can be exploited for physical and cyber intrusions. A comprehensive survey is conducted on …
Continue reading at wires.onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B29/00Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation

Similar Documents

Publication Publication Date Title
Xie et al. Physical and cybersecurity in a smart grid environment
Zhang et al. Smart grid cyber-physical attack and defense: A review
Wang et al. Review of the false data injection attack against the cyber‐physical power system
Nafees et al. Smart grid cyber-physical situational awareness of complex operational technology attacks: A review
He et al. Cyber‐physical attacks and defences in the smart grid: a survey
Giraldo et al. Security and privacy in cyber-physical systems: A survey of surveys
US11689544B2 (en) Intrusion detection via semantic fuzzing and message provenance
Liu et al. False data attack models, impact analyses and defense strategies in the electricity grid
Jarmakiewicz et al. Cybersecurity protection for power grid control infrastructures
Hossain et al. Cyber–physical security for on‐going smart grid initiatives: a survey
Achaal et al. Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges
Yang et al. Attack and defence methods in cyber‐physical power system
Zheng et al. Smart grid: Cyber attacks, critical defense approaches, and digital twin
Cai et al. Review of cyber-attacks and defense research on cyber physical power system
Elbez et al. A new classification of attacks against the cyber-physical security of smart grids
Sarkar et al. A cybersecurity assessment framework for virtual operational technology in power system automation
Starke et al. Cross‐layered distributed data‐driven framework for enhanced smart grid cyber‐physical security
Li et al. Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems
Duman et al. Factor of security (FoS): Quantifying the security effectiveness of redundant smart grid subsystems
Zang et al. Research and Prospect of Defense for Integrated Energy Cyber–Physical Systems Against Deliberate Attacks
Mavale et al. Review of cyber-attacks on smart grid system
Xie et al. On‐line physical security monitoring of power substations
Bîrleanu et al. Cyber security objectives and requirements for smart grid
Johnson et al. Physical security and cybersecurity of energy storage systems
Ramos et al. Lstm-based detection of ot cyber-attacks for an offshore hvac-cooling process