2015
DOI: 10.1109/tpwrd.2015.2409887
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Evaluation of Communication Network Architectures for Power Substations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
10
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 22 publications
(12 citation statements)
references
References 20 publications
1
10
0
Order By: Relevance
“…The cyber-attacks in the electric power substations can affect the pattern of data traffic in SCN, as confirmed by related studies (e.g. [13]). For example, in the recent cyber-attacks in Ukrainian and Israeli power grids [14], the BlackEnergy-led combo attacks and a series of malicious code injection have paralysed the communications network, blocked critical channels, manipulated SCADA systems and delayed the substation systems recovery process.…”
Section: Substation Network Cyber-attackssupporting
confidence: 66%
See 1 more Smart Citation
“…The cyber-attacks in the electric power substations can affect the pattern of data traffic in SCN, as confirmed by related studies (e.g. [13]). For example, in the recent cyber-attacks in Ukrainian and Israeli power grids [14], the BlackEnergy-led combo attacks and a series of malicious code injection have paralysed the communications network, blocked critical channels, manipulated SCADA systems and delayed the substation systems recovery process.…”
Section: Substation Network Cyber-attackssupporting
confidence: 66%
“…The data traffic exhibits diverse patterns and characteristics in the underlying SCN in the substation [13, 18] and the main characteristics are summarised as follows: Self‐similarity and long range dependence: It refers to the fact that a wide range of complexities can be observed in a small range [19]. The relationship between the Hurst parameter H and the time series data properties can be described as the following cases: in the case of 0H<0.5, the sequence tends to be anti‐persistence and ergodicity and exhibits a mean value return tendency, which is more sudden and volatile than the random sequence.…”
Section: Scn Data Traffic and Characterisationmentioning
confidence: 99%
“…Initially, a brief review of intelligent substations based on the IEC 61850 standards, as well as a discussion of the characteristics of SCN data traffic is provided. As SCNs are required for the intelligent function of electrical substations, and diverse communication patterns are exhibited by SCN data traffic, the characteristics of the SCN data are essential and are utilised in the model developed [45], [46], [47]. SCN data traffic can be considered with the following characteristics [45], [48]: 1.…”
Section: Farima Based Threshold Model For Data Characterizationmentioning
confidence: 99%
“…We can connect search engine of the anomaly detection in the form of plug-ins, thus facilitating the abnormal detection for the intrusion detection technology system. We compare the data from the anomaly detection engine and the simulated data model calculated by the cluster analysis, while recording and editing the source of the data to facilitate the effective tracking [10] . Figure 2 is the flow chart of the anomaly detection.…”
Section: The Technical Advantages Of the New Detection Systemmentioning
confidence: 99%