2019 IEEE Innovative Smart Grid Technologies - Asia (ISGT Asia) 2019
DOI: 10.1109/isgt-asia.2019.8881706
|View full text |Cite
|
Sign up to set email alerts
|

Tabulating Cybersecurity Solutions for Substations: Towards Pragmatic Design and Planning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2
2
1

Relationship

3
5

Authors

Journals

citations
Cited by 21 publications
(9 citation statements)
references
References 31 publications
0
9
0
Order By: Relevance
“…The next point of attack will be the devices and data flowing in between them. In order to enhance cybersecurity, various defense mechanisms such as zoning (physical or network) of power system, securing communication protocols as per IEC 62351, intruder detection system (IDS) based on statistics, machine learning (ML) [18] with integration of artificial intelligence (AI) [19], remote attestation (software or hardware based), deception technology such as honeypots and incident response (basically damage control after the attack) can be deployed by weighing in their advantages and demerits [20]. Machine learning techniques and algorithms provide efficient results when applied to network traffic for anomaly detection [21].…”
Section: Discussion On Cybersecurity Solutionsmentioning
confidence: 99%
“…The next point of attack will be the devices and data flowing in between them. In order to enhance cybersecurity, various defense mechanisms such as zoning (physical or network) of power system, securing communication protocols as per IEC 62351, intruder detection system (IDS) based on statistics, machine learning (ML) [18] with integration of artificial intelligence (AI) [19], remote attestation (software or hardware based), deception technology such as honeypots and incident response (basically damage control after the attack) can be deployed by weighing in their advantages and demerits [20]. Machine learning techniques and algorithms provide efficient results when applied to network traffic for anomaly detection [21].…”
Section: Discussion On Cybersecurity Solutionsmentioning
confidence: 99%
“…Many security solutions have been proposed and developed in the literature [16,23,48] to secure ICS. This section discusses some of them and explains why they are not suitable for addressing our security goals.…”
Section: Review Of Existing Security Solutionsmentioning
confidence: 99%
“…An intrusion detection system (IDS) is a system used to detect unauthorized intrusions into a system or network [32,40,48]. It is an important means of defense against cyber attacks in ICS.…”
Section: Intrusion Detection Systemmentioning
confidence: 99%
“…For instance, in the power grid domain, IEC 62351 standards [1] have been proposed by International Electrotechnical Commission (IEC) to define security specification for communication protocols such as IEC 61850, IEC 60870-5-104, and so forth. Moreover, cybersecurity technologies are proposed for securing modernized power grid systems, starting from intrusion detection systems to remote attestation [2]. However, as illustrated by Tan [2], each technology has advantages and disadvantages, and no single solution is perfect.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, cybersecurity technologies are proposed for securing modernized power grid systems, starting from intrusion detection systems to remote attestation [2]. However, as illustrated by Tan [2], each technology has advantages and disadvantages, and no single solution is perfect. Thus, it is desired to combine multiple, heterogeneous cybersecurity solutions that are complementary to each other, realizing defense in depth.…”
Section: Introductionmentioning
confidence: 99%