Bader et al., 2023 - Google Patents
Comprehensively analyzing the impact of cyberattacks on power gridsBader et al., 2023
View PDF- Document ID
- 5527367732402202484
- Author
- Bader L
- Serror M
- Lamberts O
- Sen �
- van der Velde D
- Hacker I
- Filter J
- Padilla E
- Henze M
- Publication year
- Publication venue
- 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P)
External Links
Snippet
The increasing digitalization of power grids and especially the shift towards IP-based communication drastically increase the susceptibility to cyberattacks, potentially leading to blackouts and physical damage. Understanding the involved risks, the interplay of …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/06—Arrangements for maintenance or administration or management of packet switching networks involving management of faults or events or alarms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Quincozes et al. | A survey on intrusion detection and prevention systems in digital substations | |
Sun et al. | Cyber security of a power grid: State-of-the-art | |
Huseinović et al. | A survey of denial-of-service attacks and solutions in the smart grid | |
Ashok et al. | Cyber-physical attack-resilient wide-area monitoring, protection, and control for the power grid | |
Jin et al. | Toward a cyber resilient and secure microgrid using software-defined networking | |
Chen et al. | Implementing attacks for modbus/TCP protocol in a real-time cyber physical system test bed | |
Liu et al. | Intruders in the grid | |
Hussain et al. | Vulnerabilities and countermeasures in electrical substations | |
Bader et al. | Comprehensively analyzing the impact of cyberattacks on power grids | |
Babay et al. | Deploying intrusion-tolerant SCADA for the power grid | |
da Silva et al. | A new methodology for real-time detection of attacks in IEC 61850-based systems | |
Wermann et al. | ASTORIA: A framework for attack simulation and evaluation in smart grids | |
Albarakati et al. | Security monitoring of IEC 61850 substations using IEC 62351-7 network and system management | |
Ghaleb et al. | Scada-sst: a scada security testbed | |
Elbez et al. | A new classification of attacks against the cyber-physical security of smart grids | |
Khan et al. | Demonstrating cyber-physical attacks and defense for synchrophasor technology in smart grid | |
Bahsi et al. | A cyber attack taxonomy for microgrid systems | |
Qassim et al. | Simulating command injection attacks on IEC 60870-5-104 protocol in SCADA system | |
Singh et al. | Sharp-net: Platform for self-healing and attack resilient pmu networks | |
Singh et al. | A novel architecture for attack-resilient wide-area protection and control system in smart grid | |
Banik et al. | Implementing man-in-the-middle attack to investigate network vulnerabilities in smart grid test-bed | |
Mustafa et al. | CPGrid-OT: Cyber-power data generation using real-time reconfigurable testbed for resiliency | |
Aljohani et al. | Modeling time-varying wide-scale distributed denial of service attacks on electric vehicle charging Stations | |
Lin et al. | RICSel21 data collection: Attacks in a virtual power network | |
Semertzis et al. | Power System Stability Analysis from Cyber Attacks Perspective |