2016 Power Systems Computation Conference (PSCC) 2016
DOI: 10.1109/pscc.2016.7540902
|View full text |Cite
|
Sign up to set email alerts
|

A coordinated cyber attack detection system (CCADS) for multiple substations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 17 publications
(13 citation statements)
references
References 17 publications
0
12
0
Order By: Relevance
“…In [23], the authors propose a method to detect and correlate attacks, using data collected from IDSs installed at different substations. The technique measures correlation according to patterns of abnormal behavior, criticality of substations and the geographical correlation.…”
Section: Coordinated Cyberattack Detection and Prevention Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…In [23], the authors propose a method to detect and correlate attacks, using data collected from IDSs installed at different substations. The technique measures correlation according to patterns of abnormal behavior, criticality of substations and the geographical correlation.…”
Section: Coordinated Cyberattack Detection and Prevention Methodsmentioning
confidence: 99%
“…Secondly, the decentralized correlation technique of DIP is compared to the centralized correlation method proposed in [23] (a REFerence method henceforth referred to as CENTRAL-REF). CENTRAL-REF originally correlates a location index, critical index and an abnormal behavior index in an iterative matrix multiplication technique.…”
Section: B Comparison With Centralized Correlationmentioning
confidence: 99%
“…3) CIs based on attack goals on the physical grid: Adversaries' goals described with reliability metrics or in terms of the criticality of a certain target are used to derive CIs. For example, in [4], substations are attack targets and their criticality is first ranked. In [12], the attack goal is modeled as causing an insufficient power transfer.…”
Section: A Related Workmentioning
confidence: 99%
“…Thus, and as opposed to regular (or independent) cyber‐attacks, whose severity is limited by the power grid's redundancy, CCAs could (i) inflict catastrophic consequences and (ii) be very challenging to detect in real‐time. CCAs could inflict catastrophic consequences as exemplified by the cyber‐attacks to the Ukrainian power grid (the ‘BlackEnergy’ malware attack in 2015 [3, 4], and the ‘Crash Override’ attack in 2016 [5]). These CCAs disconnected multiple substations that triggered power outages, leaving thousands of consumers and facilities without electricity.…”
Section: Introductionmentioning
confidence: 99%
“…In traditional information security technology, the intrusion process of the physical system is not considered, and it is difficult to effectively identify potential physical attack behavior [4]. Additionally, due to the combination of both cyber and physical attacks, the existing protection methods, such as intrusion detection system (IDS), firewalls, and abnormal data detection, lack effective correlation capabilities and cannot identify multi-step coordinated network attacks [5].…”
Section: Introductionmentioning
confidence: 99%