2016 IEEE Conference on Technologies for Sustainability (SusTech) 2016
DOI: 10.1109/sustech.2016.7897148
|View full text |Cite
|
Sign up to set email alerts
|

Exploring security metrics for electric grid infrastructures leveraging attack graphs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…The results show that out of all 1,260 authors that published the 312 papers, only 2 authors (i.e., Nian Liu 109,124,128,134 and Manimaran Govindarasu 79,93,135,136 ) published 4 articles, 7 authors (i.e., Tansu Alpcan, 24,85,137 Aditya Ashok, 79,93,136 Quanyan Zhu, 24,66,138 Yingmeng Xiang, 109,124,128 Mohammad Shahidehpour, 126,139,140 John Hird, 91,141,142 and Lingfeng Wang 109,124,128 ) published 3 articles, and 70 authors published 2 articles. However, the rest of the authors are there with single entries.…”
Section: Findings Of Our Reviewmentioning
confidence: 99%
“…The results show that out of all 1,260 authors that published the 312 papers, only 2 authors (i.e., Nian Liu 109,124,128,134 and Manimaran Govindarasu 79,93,135,136 ) published 4 articles, 7 authors (i.e., Tansu Alpcan, 24,85,137 Aditya Ashok, 79,93,136 Quanyan Zhu, 24,66,138 Yingmeng Xiang, 109,124,128 Mohammad Shahidehpour, 126,139,140 John Hird, 91,141,142 and Lingfeng Wang 109,124,128 ) published 3 articles, and 70 authors published 2 articles. However, the rest of the authors are there with single entries.…”
Section: Findings Of Our Reviewmentioning
confidence: 99%
“…Pendleton et al [1] made a survey focusing on the state-of-the-art existing metrics in terms of their advantages/disadvantages and they designed a security metric framework to measure systemlevel security by aggregating vulnerabilities, defense power, attack/threat severity, and situations. Patapanchala et al [21] computed the cumulative probability that an attacker could succeed in gaining a specific privilege or carrying out an attack in the network by aggregating vulnerability metrics. Compared with the above methods, Fredj [22] vulnerable especially for sophisticated attack scenarios with multiple targets.…”
Section: Related Workmentioning
confidence: 99%
“…It is reflected that the sum of every row of the matrix P must be equal to 1. Thus, we convert the frequency of transitions between attack types into transition probabilities in lines (16)- (21). In other words, we assign the weight of the edge based on the number of frequencies of the transition from an alert to another.…”
Section: Definition 2 a Markov Chainmentioning
confidence: 99%
“…Subs 30bus = (2,4,6,7,8,22) Subs 118bus = (11,15,27,42,49,54,59,60,62,68,78,80,110,116) We allocated those substations according to 'Gordon-Loeb' model which shows that it is uneconomical to invest >37% of the expected loss of load from the occur by the entire security breach.…”
Section: Analysis Of Physical Systemmentioning
confidence: 99%
“…The lack of strong and well accepted metrics is currently a key challenging to the area of cybersecurity [5]. In recent days, many new metrics have been proposed to access the security risk of the traditional network [6,7]. However, improved cyber-physical security metrics are needed to help determine the most appropriate placement of security mechanisms to protect the grid.…”
Section: Introductionmentioning
confidence: 99%