1988
DOI: 10.1109/59.14552
|View full text |Cite
|
Sign up to set email alerts
|

A topology processor that tracks network modifications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
22
0
2

Year Published

1991
1991
2020
2020

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 90 publications
(24 citation statements)
references
References 4 publications
0
22
0
2
Order By: Relevance
“…An attacker can obtain data on power usage and breakers' status, and based on this information, estimate system state and determine network topology [5] [6]. Then he/she can use contingency analysis methods to decide on the attack strategy (e.g., which transmission lines to open) to cause maximum damage with minimum effort.…”
Section: Attack Preparationmentioning
confidence: 99%
See 1 more Smart Citation
“…An attacker can obtain data on power usage and breakers' status, and based on this information, estimate system state and determine network topology [5] [6]. Then he/she can use contingency analysis methods to decide on the attack strategy (e.g., which transmission lines to open) to cause maximum damage with minimum effort.…”
Section: Attack Preparationmentioning
confidence: 99%
“…As most proprietary SCADA protocols lack security properties (e.g., authentication and integrity), we assume that an attacker can install a malicious software on the SCADA system to either directly observe real-time measurements arriving from substations [4], or access data historians. Based on the measurements, it is also possible for an attacker to estimate network topology and system states [5] [6].  We trust measurements of power usage, current, and voltage directly obtained from sensing devices (or sensors) in substations.…”
Section: Attack Modelmentioning
confidence: 99%
“…(1) The outage area is identified to obtain the suspected fault sections using a real-time network topology determination method [21]. (2) An objective function, which reflect the discrepancy between the actual and the expected states of protective relays and circuit breakers, is formulated based on the logic relationship among the section faults, the actions of protective relays and the tripping of circuit breakers.…”
Section: Frameworkmentioning
confidence: 99%
“…First, the status information is read from the SCADA system. Second, outage areas are identified to obtain the suspected fault sections using network topology analysis method [10], [31]. Third, a fault diagnosis model for each section in each candidate outage area is built.…”
mentioning
confidence: 99%