2014
DOI: 10.1109/tsg.2013.2294473
|View full text |Cite
|
Sign up to set email alerts
|

Integrated Anomaly Detection for Cyber Security of the Substations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
34
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 179 publications
(34 citation statements)
references
References 22 publications
0
34
0
Order By: Relevance
“…A number of GOOSE poisoning attacks are evaluated experimentally on a test bed and demonstrated to be successful. In [3], Hong et al integrate advantages of feature detection and behavior detection, proposes an integrated anomaly detection system based on host and network. Host based anomaly detection analyzes the log information to detect attacks (such as repeated user error passwords, illegal copying of files, etc.).…”
Section: Related Workmentioning
confidence: 99%
“…A number of GOOSE poisoning attacks are evaluated experimentally on a test bed and demonstrated to be successful. In [3], Hong et al integrate advantages of feature detection and behavior detection, proposes an integrated anomaly detection system based on host and network. Host based anomaly detection analyzes the log information to detect attacks (such as repeated user error passwords, illegal copying of files, etc.).…”
Section: Related Workmentioning
confidence: 99%
“…-GOOSE and SV Modification Attack: In [20], an attack is proposed. In this attack, the GOOSE control message packet is captured and then modified with a message that will allow the attacker to gain control and operate circuit breakers in a substation.…”
Section: Attacks On Goose and Sample Values (Sv)mentioning
confidence: 99%
“…However, a hybrid IDS has a higher performance in a CPS. For this purpose, an integrated ADS for substation cyber security is proposed [45]. The host-based anomaly detection inspects temporal anomalies in the substation facilities.…”
Section: Ids Protection Range Typementioning
confidence: 99%
“…The integrated ADS proposed in [45] is applied to and validated by the same scenario. For the cyber attack, it is assumed that attackers have full knowledge to access the communication systems in multiple substations.…”
Section: Test Casementioning
confidence: 99%