2011 IEEE Power and Energy Society General Meeting 2011
DOI: 10.1109/pes.2011.6039375
|View full text |Cite
|
Sign up to set email alerts
|

An intrusion and defense testbed in a cyber-power system environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
3
2

Relationship

2
7

Authors

Journals

citations
Cited by 37 publications
(13 citation statements)
references
References 7 publications
0
13
0
Order By: Relevance
“…The testbed consists of four parts: (1) a commercial EMS is used in the SCADA system network; (2) IEC 61850 communication formed the SCN in simulated substations; (3) a power system simulation tool (i.e., DIgSILENT) is used to simulate a power system; and (4) the Object Linking and Embedding for Process Control (OPC) communication protocol bridges the physical and cyber domains [62].…”
Section: Testbed At Research Institutesmentioning
confidence: 99%
“…The testbed consists of four parts: (1) a commercial EMS is used in the SCADA system network; (2) IEC 61850 communication formed the SCN in simulated substations; (3) a power system simulation tool (i.e., DIgSILENT) is used to simulate a power system; and (4) the Object Linking and Embedding for Process Control (OPC) communication protocol bridges the physical and cyber domains [62].…”
Section: Testbed At Research Institutesmentioning
confidence: 99%
“…Mallouhi et al [2] utilized Opnet, PowerWorld simulation system and Autonomic Software Protection System (ASPS) to develop a SCADA testbed and presented an anomaly-based cyber attack detection technique. Hong et al [3] implemented a testbed for anomaly detection in the cyberpower system environment using power system simulation and substation automation based on OPC client-server architecture. Dondossola et al [4] has developed a testbed for simulated power control systems to collect statistical data for resilience testing and cyber risk assessment.…”
Section: Recent Developments Of Scada Testbedmentioning
confidence: 99%
“…Both sets are subsets of , and the relationship between the denied and accepted malicious packets is defined by (16) When the packet is filtered by one firewall, the reduced attack space in (17) is determined by the remaining sets of malicious packets, , i.e.,…”
Section: F Attack Spacementioning
confidence: 99%
“…This testbed provides a realistic environment for simulation of the measurements, controls, logging, and cyber attack-defense scenarios [16].…”
Section: Attack Modelsmentioning
confidence: 99%