A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Cyberattack Detection in Intelligent Grids Using Non-linear Filtering
[article]
2018
arXiv
pre-print
In this paper, we introduce an algorithm for detecting cyberattacks based on non-linear filtering by using cyber-physical information from Kirchhoff laws. ...
Our results show that the proposed methodology can detect cyberattacks to the SE in 99.9% of the cases with very little false alarms on the identification of spoiled measurements (4.6%). ...
As well as in image processing [19] , in the application of cyberattack detection, one-dimensional and two-dimensional median filtering can be used.
A. ...
arXiv:1806.10812v2
fatcat:sjnxrhk2zveopjgeayw2extheu
A Deep Learning-Based Cyberattack Detection System for Transmission Protective Relays
2020
IEEE Transactions on Smart Grid
In this environment, there is a pressing need for the development of cyberattack detection systems for substations and in particular protective relays, a critical component of substation operation. ...
In particular, the potential of supply chain cyberattacks is on the rise in industrial control systems. ...
A non-nested generalized exemplar and state extraction method has been used in [37] for intrusion detection. ...
doi:10.1109/tsg.2020.3040361
fatcat:k4qulrgcafeftgoeaxtzefzxfe
A Comprehensive Review of Cybersecurity in Inverter-based Smart Power System amid the Boom of Renewable Energy
2022
IEEE Access
This paper provides an all-inclusive survey at the state of the art smart grid cybersecurity research and paves the path for potential research topics in the future. ...
The smart inverter is one of the most critical components for the optimal operation of Smart Grid. ...
designing and drawing beautiful figures for this journal and Le Ngoc Dung for his help in data analysis and classification of types of cyberattack. ...
doi:10.1109/access.2022.3163551
fatcat:adylc72usbenzb6awm3pyqiyri
A Two-stage Kalman Filter for Cyber-attack Detection in Automatic Generation Control System
2022
Journal of Modern Power Systems and Clean Energy
This paper proposes an optimal two-stage Kalman filter (OTS-KF) for simultaneous state and cyber-attack estimation in automatic generation control (AGC) system. ...
The simulation results under various test conditions demonstrate the efficacy of the proposed filter. ...
In [26] , a largescale power system is linearized and a two-stage estimator is proposed to deal with the scalable state estimation of the complex non-linear system when the measurement data are abundant ...
doi:10.35833/mpce.2019.000119
doaj:29b0e741df2a4fdf86be1f3be6d4327d
fatcat:ec3xiihrtjetxdcl6hodufjapi
Investigation of Cyber-Attack Methods and Measures in Smart Grids
2021
Sakarya University Journal of Science
As a result of these researches, cyberattacks that are experienced and likely to occur in smart networks were determined. The 20 most used cyber-attack methods were analyzed. ...
In the field of critical infrastructures such as natural gas, electricity, water, and energy systems, which are among the smart grids, its use has been increasing in Turkey and all over the world in recent ...
The system is modeled as a linear dynamic system with discrete time, and the state is estimated using the Kalman filter. Detectors for intrusion detection and recognition are proposed [52] . ...
doi:10.16984/saufenbilder.955914
fatcat:kjbuxja23zganodpk2ofuuzvpu
Challenges in Forecasting Malicious Events from Incomplete Data
[article]
2020
arXiv
pre-print
As we show in this paper, the process of filtering reduces the predictability of cyber-attacks. ...
We empirically quantify the loss of predictability due to filtering using real-world data from two organizations. Our work identifies the limits to forecasting cyber-attacks from highly filtered data. ...
Acknowledgements This work was supported by the Office of the Director of National Intelligence (ODNI) and the Intelligence Advanced Research Projects Activity (IARPA) via the Air Force Research Laboratory ...
arXiv:2004.04597v1
fatcat:k3bakwcd6fdu7kp2kzx3jjn3ue
Data‐driven operation of the resilient electric grid: A case of COVID‐19
2021
The Journal of Engineering
intelligence that can be applied to increase the resiliency of power systems in normal and extreme scenarios such as the COVID-19 pandemic. ...
Ukraine cyberattack, Hurricane Maria). ...
Gaussian mixture model is used to solve the problem. [63] Detecting intrusions in smart grids. ...
doi:10.1049/tje2.12065
pmid:34540233
pmcid:PMC8441621
fatcat:oglioz6qdraobb2jhuztrf24ra
Identification of vulnerable node clusters against false data injection attack in an AMI based Smart Grid
2015
Information Systems
In today's Smart Grid, the power Distribution System Operator (DSO) uses real-time measurement data from the Advanced Metering Infrastructure (AMI) for efficient, accurate and advanced monitoring and control ...
Presently, there is a lack of research in the area of power system analysis that relates the FDI attacks with system stability that is important for both analysis of the effect of cyberattack and for taking ...
Typically, Smart Grid has non-linear power flow characteristics and an ac model of power flow equations can ensure more accurate results. ...
doi:10.1016/j.is.2014.12.001
fatcat:b2b7qzlkrjhs3ansnfspakvytu
Smart Grid: Cyber Attacks, Critical Defense Approaches, and Digital Twin
[article]
2022
arXiv
pre-print
cyber systems, which include device identification, vulnerability discovery, intrusion detection systems (IDSs), honeypots, attribution, and threat intelligence (TI); iv) reviews the relevant content ...
The development towards an intelligent, digital, and Internetconnected smart grid has attracted external adversaries for malicious activities. ...
In addition, redundancy existing in a large amount of TI information needs automated, intelligent analytics methods to filter, extract, and relate relative information for practical usage. ...
arXiv:2205.11783v1
fatcat:fz43u2e6g5gyfepqz44tezelba
Malware Attack Predictive Analytics in a Cyber Supply Chain Context Using Machine Learning
2019
2019 International Conference on Cyber Security and Internet of Things (ICSIoT)
In this paper, we use ML techniques to learn dataset and predict which CSC nodes have detection or no detection. ...
The results show that ML algorithms in Decision Trees methods can be used in cyber supply chain predict analytics to detect and predict future cyber attack trends. ...
Further, deep learning-based approaches will be studied in cyberattacks prediction and cyber threat intelligence gatherings. ...
doi:10.1109/icsiot47925.2019.00019
fatcat:ga3okit7gngvxhfa2vdmbffezm
Analytic of China Cyberattack
2012
The International Journal of Multimedia & Its Applications
China cyberattack has become aggressive, disruptive, stealthy, and sophisticated. ...
Apparently, China's advantage is more on the cognitive domain than technical domain since information systems security is art and science-in some case, it is more art than science. ...
Army War College, to share his viewpoints with us on U.S.-China security policy. We would like to thank Jeff Deifik, CISSP, Sr. Software Engineer, for his comments on this paper. ...
doi:10.5121/ijma.2012.4304
fatcat:mw3sqecta5duhfvgymbpqf7hda
Cyber-Physical Microgrids: Toward Future Resilient Communities
[article]
2019
arXiv
pre-print
Research trends in monitoring have recently shifted from normal situational awareness in forecasting, state estimation, and prediction to anomalies' analysis and cyber-physical attacks' detection to support ...
In addition, confounding the interpretation of research findings is the lack of a widely accepted definition, analytical methods, and metrics to consistently describe the resilience of power grids, especially ...
The Ukraine power grid attack in December 2015 that left about 230 thousand people without electricity for several hours is a now-famous case of a cyberattack in power systems [144] . ...
arXiv:1912.05682v1
fatcat:nqmvi2rpmreate75cbrhm7bdtu
Introduction to the Issue on Signal and Information Processing for Critical Infrastructures
2018
IEEE Journal on Selected Topics in Signal Processing
We hope that you will find the articles in this special issue interesting, stimulating, and useful for your own research. ...
The paper also proposes attack detection methods for these non-circular attacks based on statistical tests. ...
The economic impact of cyberattacks of smart meters is addressed using real consumption data from Europe, Australia, and the USA. ...
doi:10.1109/jstsp.2018.2852118
fatcat:qoador5rkjgf3jcuazhmltkqbm
A Comprehensive Survey on the Cyber-Security of Smart Grids: Cyber-Attacks, Detection, Countermeasure Techniques, and Future Directions
[article]
2022
arXiv
pre-print
In this survey paper, we provide a classification of attacks based on the OSI model and discuss in more detail the cyber-attacks that can target the different layers of smart grid networks communication ...
We also propose new classifications for the detection and countermeasure techniques and describe existing techniques under each category. Finally, we discuss challenges and future research directions. ...
They modeled the smart grid network as a discrete linear dynamic system and exploited Kalman filter as the state estimation. ...
arXiv:2207.07738v1
fatcat:px2nhhvasngvfiuoe4ncty2eu4
An Analysis of Smart Grid Attacks and Countermeasures
2013
Journal of Communications
Work has also been done to measure the significance of threats and how attacks can be perpetrated in a smart grid environment. ...
In particular, we provide five different categories of attack types, and also perform an analysis of the various countermeasures thereof proposed in the literature. ...
In Ref. [17] , a scheme is proposed for detecting message replay attacks in the smart grid. ...
doi:10.12720/jcm.8.8.473-479
fatcat:er5i7avnznfubkkbborn7sqewi
« Previous
Showing results 1 — 15 out of 393 results