Filters








195 Hits in 6.2 sec

Secure and private smart grid: the SPEAR project

Panagiotis Sarigiannidis, Panagiotis Sarigiannidis
2021 The project repository journal : prj 9  
Secure and private smart grid: the SPEAR project The rapid evolution of the smart technologies has digitised the electrical grid into a new paradigm called smart grid (SG).  ...  SPEAR provides a global cybersecurity solution, which (a) detects SG-related cyberthreats, (b) provides an advanced forensic readiness framework; and (c) introduces an SG cyber hygiene framework.  ...  there is no current EU-wide consensus on the minimum range of capabilities required for smart devices and meters.  ... 
doi:10.54050/prj10014017 fatcat:rorhchkp2ra6ppr6sipjiqbh64

Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures

Leandros Maglaras, Mohamed Ferrag, Abdelouahid Derhab, Mithun Mukherjee, Helge Janicke, Stylianos Rallis
2018 EAI Endorsed Transactions on Security and Safety  
Finally we provide an overview of current methods and practices regarding cyber attribution and cyber peace keeping.  ...  In this article, we present main threats to critical infrastructures along with protective measures that one nation can take, and which are classified according to legal, technical, organizational, capacity  ...  SCADA system is the core of smart grid decision making. This interconnection between SCADA system and smart grid creates new possibilities and threats.  ... 
doi:10.4108/eai.15-10-2018.155856 fatcat:vfxzvkj2irad7jbllg235shqja

A Trust-Based Framework and Deep Learning-Based Attack Detection for Smart Grid Home Area Network

2022 International Journal of Intelligent Engineering and Systems  
an edge-of-things solution smart grid for real time data collection.  ...  smart meters and the ones they shall have available to applications that comprise of Advanced Metering solve the threats smart grids provide.  ... 
doi:10.22266/ijies2022.0228.11 fatcat:bjwkk7bhobbptcs3rcwaasxju4

Threats, Protection and Attribution of Cyber Attacks on Critical Infrastructures [article]

Leandros Maglaras, Mohamed Amine Ferrag, Abdelouahid Derhab, Mithun Mukherjee, Helge Janicke, Stylianos Rallis
2019 arXiv   pre-print
Finally we provide an overview of current methods and practices regarding cyber attribution and cyber peace keeping  ...  In this article, we present main threats to critical infrastructures along with protective measures that one nation can take, and which are classified according to legal, technical, organizational, capacity  ...  SCADA system is the core of smart grid decision making. This interconnection between SCADA system and smart grid creates new possibilities and threats.  ... 
arXiv:1901.03899v1 fatcat:ibrinwuagffalnd3dqko55ro44

MITRE ATT&CK Based Evaluation on In-Network Deception Technology for Modernized Electrical Substation Systems

Daisuke Mashima
2022 Sustainability  
In this paper, we pick one concrete design and implementation of in-network deception technology for IEC 61850 standard compliant smart substation systems in smart grid, named DecIED, and discuss its effectiveness  ...  The evaluation is conducted based on the MITRE ATT&CK Matrix for industrial control systems, which tabulates phases and tactics of cyberattack against industrial control systems.  ...  threat intelligence.  ... 
doi:10.3390/su14031256 fatcat:5yjnojkg4jbujgbl5iyi4zcpee

Cyber Hygiene Maturity Assessment Framework for Smart Grid Scenarios

Inna Skarga-Bandurova, Igor Kotsiuba, Erkuden Rios Velasco
2021 Frontiers in Computer Science  
It can be applied for the assessment of the CHL of Smart Grids operating organizations with respect to a number of recommended good practices in cyber hygiene.  ...  In an attempt to achieve high resilience of Smart Grids against negative impacts caused by different types of common, predictable but also uncommon, unexpected, and uncertain threats and keep entities  ...  ACKNOWLEDGMENTS The authors acknowledge all the SPEAR Consortium for their valuable help in this work.  ... 
doi:10.3389/fcomp.2021.614337 fatcat:zzky6lijjbfv3nx5j3gasfmqay

A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems [article]

Javier Franco, Ahmet Aris, Berk Canberk, A. Selcuk Uluagac
2021 arXiv   pre-print
It provides a taxonomy and extensive analysis of the existing honeypots and honeynets, states key design factors for the state-of-the-art honeypot/honeynet research and outlines open issues for future  ...  This paper provides a comprehensive survey of the research that has been carried out on honeypots and honeynets for IoT, IIoT, and CPS.  ...  Moreover, we outlined and discussed the key design factors for honeypots and honeynets for IoT, IIoT, and CPS applications.  ... 
arXiv:2108.02287v1 fatcat:l4b23mylyfd6xjtfhrtsrin3zq

Game Theoretic Honeypot Deployment in Smart Grid

Panagiotis Diamantoulakis, Christos Dalamagkas, Panagiotis Radoglou-Grammatikis, Panagiotis Sarigiannidis, George Karagiannidis
2020 Sensors  
In this paper, we investigate the use of honeypots, which are considered to mimic the common services of the smart grid and are able to detect unauthorized accesses, collect evidence, and help hide the  ...  More specifically, the interaction of an attacker and a defender is considered, who both optimize the number of attacks and the defending system configuration, i.e., the number of real devices and honeypots  ...  The honeypots are designed to mimic common services of the smart grid, including Industrial Control System (ICS) devices, smart meters, and smart appliances, among others [7] .  ... 
doi:10.3390/s20154199 pmid:32731595 pmcid:PMC7435919 fatcat:jmsiklehnbh2rkialftwlmrt3e

Demystifying Deception Technology:A Survey [article]

Daniel Fraunholz, Simon Duque Anton, Christoph Lipps, Daniel Reti, Daniel Krohmer, Frederic Pohl, Matthias Tammen, Hans Dieter Schotten
2018 arXiv   pre-print
Deception boosts security for systems and components by denial, deceit, misinformation, camouflage and obfuscation.  ...  In this work an extensive overview of the deception technology environment is presented.  ...  The authors alone are responsible for the content of the paper.  ... 
arXiv:1804.06196v1 fatcat:72zhe65le5hstovras43caqzdq

A Survey on Cyber Situation Awareness Systems: Framework, Techniques, and Insights

Hooman Alavizadeh, Julian Jang-Jaccard, Simon Yusuf Enoch, Harith Al-Sahaf, Ian Welch, Seyit A. Camtepe, Dan Dongseong Kim
2022 ACM Computing Surveys  
To debilitate these types of threats, a modern and intelligent Cyber Situation Awareness (SA) system needs to be developed which has the ability of monitoring and capturing various types of threats, analyzing  ...  This paper provides a comprehensive study on the current state-of-the-art in the cyber SA to discuss the following aspects of SA: key design principles, framework, classifications, data collection, analysis  ...  ACKNOWLEDGMENTS This work was supported by the Cyber Security Research Programme-"Artificial Intelligence for Automating Response to Threats" from the Ministry of Business, Innovation, and Employment (  ... 
doi:10.1145/3530809 fatcat:cwk5bp56ere5re2frzgzox56ka

A Survey on Threat Situation Awareness Systems: Framework, Techniques, and Insights [article]

Hooman Alavizadeh, Julian Jang-Jaccard, Simon Yusuf Enoch, Harith Al-Sahaf, Ian Welch, Seyit A. Camtepe, Dong Seong Kim
2021 arXiv   pre-print
To debilitate these types of threats, a modern and intelligent Cyber Situation Awareness (SA) system need to be developed which has the ability of monitoring and capturing various types of threats, analyzing  ...  This paper provides a comprehensive study on the current state-of-the-art in the cyber SA to discuss the following aspects of SA: key design principles, framework, classifications, data collection, and  ...  ACKNOWLEDGEMENT This work was supported by the Cyber Security Research Programme-"Artificial Intelligence for Automating Response to Threats" from the Ministry of Business, Innovation, and Employment (  ... 
arXiv:2110.15747v1 fatcat:zboddcg4a5gdxmq5hqmo5cpj34

Study Investigation of the Internet of Vehicle (IoV) Security

Emmanuel O. Akingboye, Thaier Hamid
2021 International Journal of Computer Applications  
Cybersecurity is the protection of the things connected to the Internet in one way or the other with a lot of things and millions of connections involved, the Internet connection becomes the target for  ...  of vehicle security, and lastly provide a security mitigation recommendation for the Internet of vehicle users.  ...  The tremendous increase in the number of IoV devices and vehicles directly shows the need for safety features needed in vehicles.Furthermore, the Internet on its own since invention has enhanced various  ... 
doi:10.5120/ijca2021921738 fatcat:nhtufvd575bpnjengfa66qleva

IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges

Pooja Anand, Yashwant Singh, Arvind Selwal, Mamoun Alazab, Sudeep Tanwar, Neeraj Kumar
2020 IEEE Access  
Over the last few decades, sustainable computing has been widely used in areas like social computing, artificial intelligence-based agent systems, mobile computing, and Internet of Things (IoT).  ...  ., Internet which opens the gates for various types of attacks on them.  ...  In the IoT based Grid system, machine learning techniques are applied for proper analysis of the large volumes of data and thus aids in decision making to run the grid (smart).  ... 
doi:10.1109/access.2020.3022842 fatcat:ifkplk2lsjhupkt4c42fovqpta

CAVs Cybersecurity threats digest and analysis

S. Steinhorst, J. Lauinger, N.A. Nijdam, A. Collen, A. Zacharaki, M. Aslam
2019 Zenodo  
research relating to the particular topic of cybersecurity in CAVs, autonomous vehicles, and smart-city infrastructures.Moreover, the limitations of state-of-the-art cybersecurity systems and the constantly  ...  This effort will start as a systemic in-depth literature review of cybersecurity environment aiming to provide explicit, reproducible and auditable methodology for evaluating and interpreting all available  ...  Mobile honeypots are honeypots, which runs on a mobile device including smart phones, tablets, (2009)[42], which demonstrated the practical use of mobile honeypots.  ... 
doi:10.5281/zenodo.4728214 fatcat:fonojcfo6fdzbnc7oz6w66zoh4

A Survey of Denial-of-Service Attacks and Solutions in the Smart Grid

A. Huseinovic, S. Mrdovic, K. Bicakci, S. Uludag
2020 IEEE Access  
HONEYPOTS It is a recommended practice to have honeypots as part of SG systems. Honyepots are specifically designed devices that mimic the target of malicious attacks.  ...  An important enabler of the Smart Grid initiatives is the enhanced use of sensing and measurement capabilities.  ... 
doi:10.1109/access.2020.3026923 fatcat:cpdqhwe2era6hmewqvmmja7dny
« Previous Showing results 1 — 15 out of 195 results