2007 IEEE Lausanne Power Tech 2007
DOI: 10.1109/pct.2007.4538300
|View full text |Cite
|
Sign up to set email alerts
|

Attack and Fault Identification in Electric Power Control Systems: An Approach to Improve the Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…Their algorithm is compared with a relatively simple one which adopts static thresholds on a dataset coming from the SWIM-BOX s 1 which includes various types of parameters such as syscall errors, signals, and scheduling time of processes. An interesting work is presented in [20] where the emphasis is placed on identifying and discriminating attacks and faults under the scope of improving the security of Electric Power Control Systems. The methodology is based on a set of rules discovered by using the Rough Sets Classification Algorithm.…”
Section: The Case Of Critical Infrastructuresmentioning
confidence: 99%
“…Their algorithm is compared with a relatively simple one which adopts static thresholds on a dataset coming from the SWIM-BOX s 1 which includes various types of parameters such as syscall errors, signals, and scheduling time of processes. An interesting work is presented in [20] where the emphasis is placed on identifying and discriminating attacks and faults under the scope of improving the security of Electric Power Control Systems. The methodology is based on a set of rules discovered by using the Rough Sets Classification Algorithm.…”
Section: The Case Of Critical Infrastructuresmentioning
confidence: 99%
“…We argue that this adversary capability highlights a requirement for additional sensors [2,6,20] to provide different points of view in order to detect anomalies [21]. This requirement is underscored by the introduction of sophisticated control processes that rely on multivariate controls and, hence, require more complex forms of supervision [19].…”
Section: Related Workmentioning
confidence: 99%
“…While protocol analysis may signal anomalies as proposed by Coutinho, et al [2], a skilled adversary can issue apparently authentic commands [18] using legitimate protocols. Analysis may be extended using state estimation techniques, but should not be applied naïvely [10,16], especially in non-linear environments such as those encountered in the biochemical industry [6].…”
Section: Introductionmentioning
confidence: 99%