2022
DOI: 10.3390/en15134726
|View full text |Cite
|
Sign up to set email alerts
|

A Multi-Agent Adaptive Architecture for Smart-Grid-Intrusion Detection and Prevention

Abstract: The present paper deals with selected aspects of energy prosumers’ security needs. The analysis reported aim to illustrate the concept of the implementation of intrusion-detection systems (IDS)/intrusion-prevention systems (IPS), as supporting agent systems for smart grids. The contribution proposes the architecture of an agent system aimed at collecting, processing, monitoring, and possibly reacting to changes in the smart grid. Furthermore, an algorithm is proposed to support the construction of a smart-grid… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 33 publications
(42 reference statements)
0
2
0
Order By: Relevance
“…Data integrity attacks [13,21,25,29,40,41,48,49,53,55,[59][60][61][62]70,75,76] Unusual consumption behaviors and measurements [6,24,27,32,34,35,38,46,52,67,68,[71][72][73] Network intrusions [16,18,19,56,63,69] Network infrastructure anomalies [14,15,17,20,22,33,39,47,58,64] Electrical data anomalies [7,23,26,36,…”
Section: Study Object Papermentioning
confidence: 99%
See 1 more Smart Citation
“…Data integrity attacks [13,21,25,29,40,41,48,49,53,55,[59][60][61][62]70,75,76] Unusual consumption behaviors and measurements [6,24,27,32,34,35,38,46,52,67,68,[71][72][73] Network intrusions [16,18,19,56,63,69] Network infrastructure anomalies [14,15,17,20,22,33,39,47,58,64] Electrical data anomalies [7,23,26,36,…”
Section: Study Object Papermentioning
confidence: 99%
“…Enhanced network user monitoring can effectively reduce the risk of data leakage, phishing, and spam attacks through the implementation of statistically based detection models and an adaptive multi-agent architecture [69]. An architecture, as such, will not indicate what a system can do, but how it should work.…”
Section: Network Intrusionsmentioning
confidence: 99%
“…It is possible to utilize an IPS to detect when workers or visitors to a network are breaking the regulations set out by the company. In contrast, an IDS is just tasked with monitoring the network and alerting system administrators to any suspicious activity [131].…”
Section: Ips and Idsmentioning
confidence: 99%
“…Modern smart grids [17][18][19] today include new controls, communications, smart monitoring, and self-healing products, technologies, and services. These organizations offer a variety of advantages, including simple connection and operating efficiency for generators of all sizes and technology [20] . Customers here are aware of the information about the systems and play a crucial part in enhancing operation of the system.…”
Section: Introductionmentioning
confidence: 99%