Filters








393 Hits in 4.2 sec

Cyberattack Detection in Intelligent Grids Using Non-linear Filtering [article]

Irina Lukicheva, David Pozo, Alexander Kulikov
2018 arXiv   pre-print
In this paper, we introduce an algorithm for detecting cyberattacks based on non-linear filtering by using cyber-physical information from Kirchhoff laws.  ...  Our results show that the proposed methodology can detect cyberattacks to the SE in 99.9% of the cases with very little false alarms on the identification of spoiled measurements (4.6%).  ...  As well as in image processing [19] , in the application of cyberattack detection, one-dimensional and two-dimensional median filtering can be used. A.  ... 
arXiv:1806.10812v2 fatcat:sjnxrhk2zveopjgeayw2extheu

A Deep Learning-Based Cyberattack Detection System for Transmission Protective Relays

Yew Meng Khaw, Amir Abiri Jahromi, Mohammadreza F. M. Arani, Scott Sanner, Deepa Kundur, Marthe Kassouf
2020 IEEE Transactions on Smart Grid  
In this environment, there is a pressing need for the development of cyberattack detection systems for substations and in particular protective relays, a critical component of substation operation.  ...  In particular, the potential of supply chain cyberattacks is on the rise in industrial control systems.  ...  A non-nested generalized exemplar and state extraction method has been used in [37] for intrusion detection.  ... 
doi:10.1109/tsg.2020.3040361 fatcat:k4qulrgcafeftgoeaxtzefzxfe

A Comprehensive Review of Cybersecurity in Inverter-based Smart Power System amid the Boom of Renewable Energy

Nguyen Duc Tuyen, Nguyen Sy Quan, Vo Ba Linh, Tuyen V. Vu, Goro Fujita
2022 IEEE Access  
This paper provides an all-inclusive survey at the state of the art smart grid cybersecurity research and paves the path for potential research topics in the future.  ...  The smart inverter is one of the most critical components for the optimal operation of Smart Grid.  ...  designing and drawing beautiful figures for this journal and Le Ngoc Dung for his help in data analysis and classification of types of cyberattack.  ... 
doi:10.1109/access.2022.3163551 fatcat:adylc72usbenzb6awm3pyqiyri

A Two-stage Kalman Filter for Cyber-attack Detection in Automatic Generation Control System

Ayyarao S. L. V. Tummala, Ravi Kiran Inapakurthi
2022 Journal of Modern Power Systems and Clean Energy  
This paper proposes an optimal two-stage Kalman filter (OTS-KF) for simultaneous state and cyber-attack estimation in automatic generation control (AGC) system.  ...  The simulation results under various test conditions demonstrate the efficacy of the proposed filter.  ...  In [26] , a largescale power system is linearized and a two-stage estimator is proposed to deal with the scalable state estimation of the complex non-linear system when the measurement data are abundant  ... 
doi:10.35833/mpce.2019.000119 doaj:29b0e741df2a4fdf86be1f3be6d4327d fatcat:ec3xiihrtjetxdcl6hodufjapi

Investigation of Cyber-Attack Methods and Measures in Smart Grids

İsa AVCI
2021 Sakarya University Journal of Science  
As a result of these researches, cyberattacks that are experienced and likely to occur in smart networks were determined. The 20 most used cyber-attack methods were analyzed.  ...  In the field of critical infrastructures such as natural gas, electricity, water, and energy systems, which are among the smart grids, its use has been increasing in Turkey and all over the world in recent  ...  The system is modeled as a linear dynamic system with discrete time, and the state is estimated using the Kalman filter. Detectors for intrusion detection and recognition are proposed [52] .  ... 
doi:10.16984/saufenbilder.955914 fatcat:kjbuxja23zganodpk2ofuuzvpu

Challenges in Forecasting Malicious Events from Incomplete Data [article]

Nazgol Tavabi, Andrés Abeliuk, Negar Mokhberian, Jeremy Abramson, Kristina Lerman
2020 arXiv   pre-print
As we show in this paper, the process of filtering reduces the predictability of cyber-attacks.  ...  We empirically quantify the loss of predictability due to filtering using real-world data from two organizations. Our work identifies the limits to forecasting cyber-attacks from highly filtered data.  ...  Acknowledgements This work was supported by the Office of the Director of National Intelligence (ODNI) and the Intelligence Advanced Research Projects Activity (IARPA) via the Air Force Research Laboratory  ... 
arXiv:2004.04597v1 fatcat:k3bakwcd6fdu7kp2kzx3jjn3ue

Data‐driven operation of the resilient electric grid: A case of COVID‐19

H. Noorazar, A. Srivastava, S. Pannala, Sajan K Sadanandan
2021 The Journal of Engineering  
intelligence that can be applied to increase the resiliency of power systems in normal and extreme scenarios such as the COVID-19 pandemic.  ...  Ukraine cyberattack, Hurricane Maria).  ...  Gaussian mixture model is used to solve the problem. [63] Detecting intrusions in smart grids.  ... 
doi:10.1049/tje2.12065 pmid:34540233 pmcid:PMC8441621 fatcat:oglioz6qdraobb2jhuztrf24ra

Identification of vulnerable node clusters against false data injection attack in an AMI based Smart Grid

Adnan Anwar, Abdun Naser Mahmood, Zahir Tari
2015 Information Systems  
In today's Smart Grid, the power Distribution System Operator (DSO) uses real-time measurement data from the Advanced Metering Infrastructure (AMI) for efficient, accurate and advanced monitoring and control  ...  Presently, there is a lack of research in the area of power system analysis that relates the FDI attacks with system stability that is important for both analysis of the effect of cyberattack and for taking  ...  Typically, Smart Grid has non-linear power flow characteristics and an ac model of power flow equations can ensure more accurate results.  ... 
doi:10.1016/j.is.2014.12.001 fatcat:b2b7qzlkrjhs3ansnfspakvytu

Smart Grid: Cyber Attacks, Critical Defense Approaches, and Digital Twin [article]

Tianming Zheng, Ming Liu, Deepak Puthal, Ping Yi, Yue Wu, Xiangjian He
2022 arXiv   pre-print
cyber systems, which include device identification, vulnerability discovery, intrusion detection systems (IDSs), honeypots, attribution, and threat intelligence (TI); iv) reviews the relevant content  ...  The development towards an intelligent, digital, and Internetconnected smart grid has attracted external adversaries for malicious activities.  ...  In addition, redundancy existing in a large amount of TI information needs automated, intelligent analytics methods to filter, extract, and relate relative information for practical usage.  ... 
arXiv:2205.11783v1 fatcat:fz43u2e6g5gyfepqz44tezelba

Malware Attack Predictive Analytics in a Cyber Supply Chain Context Using Machine Learning

Abel Yeboah-Ofori, Charles Boachie
2019 2019 International Conference on Cyber Security and Internet of Things (ICSIoT)  
In this paper, we use ML techniques to learn dataset and predict which CSC nodes have detection or no detection.  ...  The results show that ML algorithms in Decision Trees methods can be used in cyber supply chain predict analytics to detect and predict future cyber attack trends.  ...  Further, deep learning-based approaches will be studied in cyberattacks prediction and cyber threat intelligence gatherings.  ... 
doi:10.1109/icsiot47925.2019.00019 fatcat:ga3okit7gngvxhfa2vdmbffezm

Analytic of China Cyberattack

Robert Lai
2012 The International Journal of Multimedia & Its Applications  
China cyberattack has become aggressive, disruptive, stealthy, and sophisticated.  ...  Apparently, China's advantage is more on the cognitive domain than technical domain since information systems security is art and science-in some case, it is more art than science.  ...  Army War College, to share his viewpoints with us on U.S.-China security policy. We would like to thank Jeff Deifik, CISSP, Sr. Software Engineer, for his comments on this paper.  ... 
doi:10.5121/ijma.2012.4304 fatcat:mw3sqecta5duhfvgymbpqf7hda

Cyber-Physical Microgrids: Toward Future Resilient Communities [article]

Tuyen Vu, Bang Nguyen, Zheyuan Cheng, Mo-Yuen Chow, Bin Zhang
2019 arXiv   pre-print
Research trends in monitoring have recently shifted from normal situational awareness in forecasting, state estimation, and prediction to anomalies' analysis and cyber-physical attacks' detection to support  ...  In addition, confounding the interpretation of research findings is the lack of a widely accepted definition, analytical methods, and metrics to consistently describe the resilience of power grids, especially  ...  The Ukraine power grid attack in December 2015 that left about 230 thousand people without electricity for several hours is a now-famous case of a cyberattack in power systems [144] .  ... 
arXiv:1912.05682v1 fatcat:nqmvi2rpmreate75cbrhm7bdtu

Introduction to the Issue on Signal and Information Processing for Critical Infrastructures

D. Kundur, J. Contreras, D. Srinivasan, N. Gatsis, S. Wang, S. Peeta
2018 IEEE Journal on Selected Topics in Signal Processing  
We hope that you will find the articles in this special issue interesting, stimulating, and useful for your own research.  ...  The paper also proposes attack detection methods for these non-circular attacks based on statistical tests.  ...  The economic impact of cyberattacks of smart meters is addressed using real consumption data from Europe, Australia, and the USA.  ... 
doi:10.1109/jstsp.2018.2852118 fatcat:qoador5rkjgf3jcuazhmltkqbm

A Comprehensive Survey on the Cyber-Security of Smart Grids: Cyber-Attacks, Detection, Countermeasure Techniques, and Future Directions [article]

Tala Talaei Khoei, Hadjar Ould Slimane, Naima Kaabouch
2022 arXiv   pre-print
In this survey paper, we provide a classification of attacks based on the OSI model and discuss in more detail the cyber-attacks that can target the different layers of smart grid networks communication  ...  We also propose new classifications for the detection and countermeasure techniques and describe existing techniques under each category. Finally, we discuss challenges and future research directions.  ...  They modeled the smart grid network as a discrete linear dynamic system and exploited Kalman filter as the state estimation.  ... 
arXiv:2207.07738v1 fatcat:px2nhhvasngvfiuoe4ncty2eu4

An Analysis of Smart Grid Attacks and Countermeasures

Zubair A. Baig, Abdul-Raoof Amoudi
2013 Journal of Communications  
Work has also been done to measure the significance of threats and how attacks can be perpetrated in a smart grid environment.  ...  In particular, we provide five different categories of attack types, and also perform an analysis of the various countermeasures thereof proposed in the literature.   ...  In Ref. [17] , a scheme is proposed for detecting message replay attacks in the smart grid.  ... 
doi:10.12720/jcm.8.8.473-479 fatcat:er5i7avnznfubkkbborn7sqewi
« Previous Showing results 1 — 15 out of 393 results