Filters








15,171 Hits in 7.4 sec

Graph theoretical defense mechanisms against false data injection attacks in smart grids

Mohammad Hasan ANSARI, Vahid Tabataba VAKILI, Behnam BAHRAK, Parmiss TAVASSOLI
2018 Journal of Modern Power Systems and Clean Energy  
In this paper we use a graph-theoretical formulation for false data injection attacks in smart grids and propose defense mechanisms to mitigating this type of attacks.  ...  Mohammad Hasan ANSARI received his Bachelor degree in electrical engineering, from KNTU and Master degree of power system engineering and communication system engineering from Iran  ...  A graph-theoretic algorithm for localizing the target of FDI attacks in large power system networks using real-time synchrophasor measurements is proposed in [27] .  ... 
doi:10.1007/s40565-018-0432-2 fatcat:ogoloc4d7rc2feejue2m7fovf4

Mathematical and Statistical Opportunities in Cyber Security [article]

Juan Meza, Scott Campbell, David Bailey
2009 arXiv   pre-print
Our first and most important assumption is that access to real-world data is necessary to understand large and complex systems like the Internet.  ...  The role of mathematics in a complex system such as the Internet has yet to be deeply explored.  ...  need for developing methods that ensure data integrity, and 3) the need to handle large amounts of data in real or almost real time.  ... 
arXiv:0904.1616v1 fatcat:5ucqd2ffbfbazkw55h5ek3a7e4

A Comprehensive Survey of Technologies for Building a Hybrid High Performance Intrusion Detection System

S. J.SathishAaronJoseph, R.Balasubramanian R.Balasubramanian
2015 International Journal of Computer Applications  
A detailed study on the datasets that can be used for effective building of an IDS is discussed.  ...  This paper presents a comprehensive survey of the technologies that are used for detecting intrusions.  ...  Increasing new techniques and increased sophistication in attacks has lead to the need for more powerful IDS/IDPS.  ... 
doi:10.5120/19904-2015 fatcat:d5sbwg2iozfk3niiz2izq3tlzq

Performance Evaluation of QOS Parameters of Hybrid ACO/PSO for Mobile ADHOC Networks

Meenu Punj, Tanupreet Singh
2015 International Journal of Computer Applications  
These real-time services have a stringent necessity of QoS factors like bandwidth, delay, jitter etc. to ensure clean, consistent, and fair sign to the receivers.  ...  In this paper, in the proposed technique the issue of multi-cast tree has been removed using clustering based technique.  ...  [11] proposed a new probabilistic key management algorithm for large-scale MANETs.  ... 
doi:10.5120/21111-3900 fatcat:pqpjulnwlvab3e33evjbpkf7ye

Toward Software Diversity in Heterogeneous Networked Systems [chapter]

Chu Huang, Sencun Zhu, Robert Erbacher
2014 Lecture Notes in Computer Science  
Following the survivability through heterogeneity philosophy, we present a novel approach to improving survivability of networked systems by adopting the technique of software diversity.  ...  Specifically, we design an efficient algorithm to select and deploy a set of off-the-shelf software to hosts in a networked system, such that the number and types of vulnerabilities presented on one host  ...  The work of Sencun Zhu was supported in part by NSF grant CCF-1320605 and a Google gift. We also thank the reviewers for helpful comments.  ... 
doi:10.1007/978-3-662-43936-4_8 fatcat:xrvp72t265ee3iwx7hoby32esm

A Systematic Review on Complex Networks and its Performance Evaluation Metrics

Selasie A. Brown, Patrick Kudjo, Francis Amavi
2020 International Journal of Computer Applications  
Finally, the paper provides a thorough analysis of complex network, report some related works, and attempt to address some challenges associated with using discrete-event simulators for performance evaluation  ...  The rapid advancement in computer systems has generated an increasing interest in the study and analysis of complex networks and its applications in the real world.  ...  It uses a 3D render engine to display large networks in real-time and to speed up the exploration. Simulations are normally conducted using synthetic networks and real-world data.  ... 
doi:10.5120/ijca2020920614 fatcat:hmycw5qfvfatdlarklxdc4jppq

A Resilient Real-Time System Design for a Secure and Reconfigurable Power Grid

Hairong Qi, Xiaorui Wang, Leon M. Tolbert, Fangxing Li, Fang Z. Peng, Peng Ning, Massoud Amin
2011 IEEE Transactions on Smart Grid  
of the power grid; and 5) the adoption of a control-theoretic real-time adaptation strategy to guarantee the availability of large distributed systems.  ...  These blackouts were a wake-up call for both the industry and academia to consider new techniques and system architecture design that can help assure the security and reliability of the power grid.  ...  Control-Theoretic Adaptation to System Changes for Real-Time Guarantee A power grid system must be capable of adapting to unpredictable changes or security attacks (e.g., when the attacks have penetrated  ... 
doi:10.1109/tsg.2011.2159819 fatcat:sq63bil2drh6dhmkk7q5evkiw4

Cyber-Physical Power System (CPPS): A Review on Modelling, Simulation, and Analysis with Cyber Security Applications

Rajaa Vikhram Yohanandhan, Rajvikram Madurai Elavarasan, Manoharan Premkumar, Lucian Mihet-Popa
2020 IEEE Access  
The PMU is a device used to estimate the real-time voltage and current phasor values of CPPS using a common time source through a Global Positioning System (GPS) for synchronization.  ...  Classification of attack graph modelling with network security applications. Real-time attack graph modelling with network security applications to be considered.  ... 
doi:10.1109/access.2020.3016826 fatcat:caax2ubyyrclhj37g5ynvlm66q

SmartWalk

Yushan Liu, Shouling Ji, Prateek Mittal
2016 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16  
Currently, the design of such social security mechanisms is limited to the classical paradigm of using fixed-length random walks for all nodes on a social graph.  ...  Using experiments on multiple real world topologies, we show that the desired walk length starting from a specific node can be well predicted given the local features of the node, and limited knowledge  ...  We use 10 various large-scale real-world social network topologies that mainly come from the Stanford Large Network Dataset Collection [23] and other sources [45] to evaluate the local mixing time  ... 
doi:10.1145/2976749.2978319 dblp:conf/ccs/LiuJM16 fatcat:gumslqzrxzalpgq7mfp4cadbju

A Survey on Cyber Situation Awareness Systems: Framework, Techniques, and Insights

Hooman Alavizadeh, Julian Jang-Jaccard, Simon Yusuf Enoch, Harith Al-Sahaf, Ian Welch, Seyit A. Camtepe, Dan Dongseong Kim
2022 ACM Computing Surveys  
, and devising a plan to avoid further attacks.  ...  of the techniques, and evaluation methods.  ...  MBIE) of New Zealand as a part of the Catalyst Strategy Funds under Grant MAUX1912.  ... 
doi:10.1145/3530809 fatcat:cwk5bp56ere5re2frzgzox56ka

Exploiting Trust and Distrust Information to Combat Sybil Attack in Online Social Networks [chapter]

Huanhuan Zhang, Chang Xu, Jie Zhang
2014 IFIP Advances in Information and Communication Technology  
To enhance the robustness of these approaches against target attacks, we then also introduce an effective similarity-based graph pruning technique utilizing local structure similarity.  ...  Specifically, we first use existing topological anti-Sybil algorithms as a subroutine to produce reliable Sybil seeds.  ...  In this experiment, we combine the SybilRank algorithm with graph pruning technique to seek for reliable Sybil seeds.  ... 
doi:10.1007/978-3-662-43813-8_6 fatcat:byuusdhklngnvkdetzrjk32gam

Survey on Botnet Detection Techniques: Classification, Methods, and Evaluation

Ying Xing, Hui Shu, Hao Zhao, Dannong Li, Li Guo, Jude Hemanth
2021 Mathematical Problems in Engineering  
It focuses on the application of advanced technologies such as deep learning, complex network, swarm intelligence, moving target defense (MTD), and software-defined network (SDN) for botnet detection.  ...  From the four dimensions of service, intelligence, collaboration, and assistant, a common bot detection evaluation system (CBDES) is proposed, which defines a new global capability measurement standard  ...  Using the time-series data in the network is suitable for a real-time detection. e summary of typical botnet detection techniques based on combination method is shown in Table 7 .  ... 
doi:10.1155/2021/6640499 fatcat:hkafnnj2cnbzjdbuk6iel3b5cm

Guest Editorial Special Section on Cyber-Physical Systems and Security for Smart Grid

Hamid Gharavi, Hsiao-Hwa Chen, Christian Wietfeld
2015 IEEE Transactions on Smart Grid  
In this paper, "A Real-Time Attack Localization Algorithm for Large Power System Networks Using Graph-Theoretic Techniques" by Thomas. R.  ...  The cyber-physical infrastructure underlying the modern power grid would require developing a measurementbased disturbance localization algorithm for large-scale power systems.  ... 
doi:10.1109/tsg.2015.2464911 fatcat:52qkiqc5ojfxvf67omcytwgyze

Table of Contents

2018 2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)  
: An Open Discussion 318-323 GPU-Accelerated Scalable Solver for Large Linear Systems over Finite Fields 324-329 Efficient Approaches to Mitigate the Effect of Sybil Attack in MANET for High Network Lifetime  ...  An Aggregated Similarity Based Hierarchical Clustering Technique for Relational DDBS Design 295-299 Real-Time Parallel Computing Design for Implementation of Point/Small Target Detection Algorithm  ... 
doi:10.1109/pdgc.2018.8745765 fatcat:hgy7virczjhcrosc2susu6smzq

A Survey on Different Graph Based Anomaly Detection Techniques

Debajit Sensarma, Samar Sen Sarma
2015 Indian Journal of Science and Technology  
Finally, the relevance of cyber crime and its elimination is highlighted throughout the paper with some real world applications of graph based anomaly detection techniques and also some future direction  ...  This survey paper cites some methods of graph based anomaly detection in the field of information security, finance, cybersecurity, online social networks, health care, law enforcement etc. and their classification  ...  In future, it can be used to track abnormalities in the graph structure and can be used to differentiate between normal and abnormal patterns. • Many algorithms for time-evolving graphs require a time-window  ... 
doi:10.17485/ijst/2015/v8i1/75197 fatcat:2eckrpzh6va7dmixqooukngtly
« Previous Showing results 1 — 15 out of 15,171 results