메뉴 건너뛰기




Volumn , Issue , 2007, Pages 103-107

Attack and fault identification in electric power control systems: An approach to improve the security

Author keywords

Control centers; Critical infrastructure; Hackers; Power system operation; Power system security

Indexed keywords

BEAMFORMING; ELECTRIC FAULT LOCATION; ELECTRIC POWER MEASUREMENT; POWER CONTROL; SET THEORY;

EID: 50849130209     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PCT.2007.4538300     Document Type: Conference Paper
Times cited : (5)

References (32)
  • 1
    • 50849085617 scopus 로고    scopus 로고
    • USA Patriot Act 2001, http://www.epic.org/privacy/terrorism/hr3162.pdf
    • (2001)
    • Patriot Act, U.S.A.1
  • 2
    • 50849126351 scopus 로고    scopus 로고
    • Gamez,D., Nadjm-Tehrani, S., Bigham, J., Balducelli, C., Burbeck, K., Chyssler, T., Chapter 19 Safeguarding Critical Infrastructures, Edited by Professor Hassan B. Diab & Professor Albert Y. Zomaya ,Dependable Computing Systems: Paradigms, Performance Issues, and Applications, Wiley STM, 2000.
    • Gamez,D., Nadjm-Tehrani, S., Bigham, J., Balducelli, C., Burbeck, K., Chyssler, T., "Chapter 19 Safeguarding Critical Infrastructures", Edited by Professor Hassan B. Diab & Professor Albert Y. Zomaya ,"Dependable Computing Systems: Paradigms, Performance Issues, and Applications", Wiley STM, 2000.
  • 4
    • 50849095957 scopus 로고    scopus 로고
    • The National Strategy to Secure Cyberspace, Washington D.C, February, 2003
    • "The National Strategy to Secure Cyberspace", Washington D.C., February, 2003, http://www.dhs.gov/interweb/assetlibrary/ National_Cyberspace_Strategy.pdf
  • 5
    • 12344300052 scopus 로고    scopus 로고
    • Washington D.C, January, 2002
    • "Homeland Security Act of 2002", Washington D.C., January, 2002, http://www.dhs.gov/interweb/assetlibrary/hr_5005_enr.pdf
    • Homeland Security Act of 2002
  • 6
    • 42549090817 scopus 로고    scopus 로고
    • IT-Grundschutz Manual 2004, http://www.bsi.bund.de/english/gshb/index. htm]
    • (2004) Manual
    • IT-Grundschutz1
  • 7
    • 50849089802 scopus 로고    scopus 로고
    • http://www.bsi.bund.de/cc/index.htm
  • 8
    • 1542697911 scopus 로고    scopus 로고
    • IT Security for Industrial Control Systems
    • February
    • Falco, J., Stouffer, K., Wavering, A., Proctor, F., "IT Security for Industrial Control Systems", NISTIR 6859, February 2002
    • (2002) NISTIR , vol.6859
    • Falco, J.1    Stouffer, K.2    Wavering, A.3    Proctor, F.4
  • 10
    • 33847264121 scopus 로고    scopus 로고
    • The Myths and Facts behind Cyber Security Risks for Industrial Control Systems
    • VDE, Berlin, October
    • Byres, E. and Lowe, J., "The Myths and Facts behind Cyber Security Risks for Industrial Control Systems", VDE 2004 Congress, VDE, Berlin, October, 2004
    • (2004) VDE 2004 Congress
    • Byres, E.1    Lowe, J.2
  • 12
    • 42549090335 scopus 로고    scopus 로고
    • Industrial Information System Security - Part I, Part2, and Part 3
    • ABB Review
    • Naedele, M., Dzung, D., "Industrial Information System Security - Part I, Part2, and Part 3", ABB Review 2005.
    • (2005)
    • Naedele, M.1    Dzung, D.2
  • 13
    • 42549166280 scopus 로고    scopus 로고
    • The role of Intrusion Detection Systems
    • September/October
    • McHugh, J., Christie, A., Allen, J., "The role of Intrusion Detection Systems", IEEE Software, September/October/2000.
    • (2000) IEEE Software
    • McHugh, J.1    Christie, A.2    Allen, J.3
  • 14
    • 50849107517 scopus 로고    scopus 로고
    • Hale, J., Bose, A., Information Survivability in the Electric Utility Industry, ISW'98, http://www.cert.org/research/isw/isw98/ all_the_papers/no19.html
    • Hale, J., Bose, A., "Information Survivability in the Electric Utility Industry", ISW'98, http://www.cert.org/research/isw/isw98/ all_the_papers/no19.html
  • 15
    • 27944439331 scopus 로고    scopus 로고
    • Institute for Security Technology Studies at Dartmouth College, December
    • Goetz,E., "Cyber Security of the Electric Power Industry", Institute for Security Technology Studies at Dartmouth College", December,2002.
    • (2002) Cyber Security of the Electric Power Industry
    • Goetz, E.1
  • 16
    • 1642265495 scopus 로고    scopus 로고
    • Protecting the Grid From Cyber Attack, Part II: Safeguarding IEDS, Substations and SCADA Systems, Utility
    • Oman, P., Schweitzer, E., and Roberts, J., "Protecting the Grid From Cyber Attack, Part II: Safeguarding IEDS, Substations and SCADA Systems", Utility Automation, 7(1), 2002, pp. 25-32.
    • (2002) Automation , vol.7 , Issue.1 , pp. 25-32
    • Oman, P.1    Schweitzer, E.2    Roberts, J.3
  • 17
    • 0023294428 scopus 로고
    • An Intrusion-Detection Model
    • Feb
    • Denning, D., "An Intrusion-Detection Model", IEEE Transaction Software Engineering, vol. SE-13, No. 2, pp.222-232, Feb. 1987
    • (1987) IEEE Transaction Software Engineering , vol.SE-13 , Issue.2 , pp. 222-232
    • Denning, D.1
  • 19
    • 0012127229 scopus 로고    scopus 로고
    • Intrusion and Intrusion Detection
    • Aug, DOI 10.1007/s102070100001, URL
    • McHugh, J., "Intrusion and Intrusion Detection", International Journal of Information Security, Volume 1, Issue 1, Aug 2001, Pages 14 - 35, DOI 10.1007/s102070100001, URL http://dx.doi.org/10.1007/s102070100001
    • (2001) International Journal of Information Security , vol.1 , Issue.1 , pp. 14-35
    • McHugh, J.1
  • 20
    • 0038223829 scopus 로고    scopus 로고
    • NIST Special Publication on Intrusion Detection System
    • Bace,R., Mell, P. "Intrusion Detection Systems", NIST Special Publication on Intrusion Detection System,http://csrc.nist.gov/publication/ nistpubs/800-31/sp800-31.pdf
    • Intrusion Detection Systems
    • Bace, R.1    Mell, P.2
  • 21
    • 1642408137 scopus 로고    scopus 로고
    • Survey of Intrusion Detection Research
    • Technical Report 02-04, Chalmers University of Technology, Göteborg, Sweeden
    • Lundin,E., Jonson,E., "Survey of Intrusion Detection Research", Technical Report 02-04, Chalmers University of Technology, Göteborg, Sweeden, 2001.
    • (2001)
    • Lundin, E.1    Jonson, E.2
  • 22
    • 10444240629 scopus 로고    scopus 로고
    • Intrusion Detection: A Bibliograpy
    • Technical Report SSIR-2001-01, September, SUPELEC, France
    • Mé, L., Michel, C., "Intrusion Detection: a Bibliograpy", Technical Report SSIR-2001-01, September,2001, SUPELEC, France.
    • (2001)
    • Mé, L.1    Michel, C.2
  • 24
    • 50849125921 scopus 로고    scopus 로고
    • Porras,P.A., Neumann, P.G., EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances, Proc. National Information Systems Security Confrenece, Baltimore, MD, Oct. 1997.
    • Porras,P.A., Neumann, P.G., "EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances", Proc. National Information Systems Security Confrenece, Baltimore, MD, Oct. 1997.
  • 26
    • 42549119227 scopus 로고    scopus 로고
    • Desenvolvimento de um Sistema Adaptativo de Detecção de Intrusos em Redes de Computadores
    • PhD Thesis, Instituto de Física de São Carlos, USP, São Carlos, SP
    • Cansian, A.M., "Desenvolvimento de um Sistema Adaptativo de Detecção de Intrusos em Redes de Computadores", PhD Thesis, Instituto de Física de São Carlos, USP, São Carlos, SP, 1997.
    • (1997)
    • Cansian, A.M.1
  • 27
    • 35048861836 scopus 로고    scopus 로고
    • Electric Power System Anomaly Detection Using Neural Networks
    • Springer-Verlag, Heidelberg, Oct
    • Martinelli,M., Tronci,E., Dipoppa,E.,Balducelli,C., "Electric Power System Anomaly Detection Using Neural Networks", Lecture Notes in Computer Science, Vol.3213/2004, pp 1242-1248, Springer-Verlag, Heidelberg, Oct. 2004.
    • (2004) Lecture Notes in Computer Science , vol.3213 , pp. 1242-1248
    • Martinelli, M.1    Tronci, E.2    Dipoppa, E.3    Balducelli, C.4
  • 28
    • 33847767196 scopus 로고    scopus 로고
    • Safeguarding SCADA Systems with Anomaly Detection
    • V.Gorodetsky et al.Eds, MMM-ACNS 2003, Springer-Verlag Berlin Heidelberg
    • Bigham, J., Gamez, D., Ning Lu, "Safeguarding SCADA Systems with Anomaly Detection", V.Gorodetsky et al.(Eds.):MMM-ACNS 2003, LNCS 2776, pp. 171-182, Springer-Verlag Berlin Heidelberg, 2003.
    • (2003) LNCS , vol.2776 , pp. 171-182
    • Bigham, J.1    Gamez, D.2    Lu, N.3
  • 30
    • 50849091119 scopus 로고    scopus 로고
    • Lambert-Torres, G. et al, Power System Security Analysis Based on Rough Classification, Rough-Fuzzy Hybridization: New Trend in Decision Making, S.K. Pal & A. Skowron, Springer-Verlag Co., pp. 263-274, 1999.
    • Lambert-Torres, G. et al, "Power System Security Analysis Based on Rough Classification", Rough-Fuzzy Hybridization: New Trend in Decision Making, S.K. Pal & A. Skowron, Springer-Verlag Co., pp. 263-274, 1999.
  • 31
    • 0036082436 scopus 로고    scopus 로고
    • Applications of Rough Sets in Power System Control Center Data Mining
    • Lambert-Torres, G., "Applications of Rough Sets in Power System Control Center Data Mining", IEEE Power Engineering Society Winter Meeting 2002, Vol. 1, pp. 627-631.
    • (2002) IEEE Power Engineering Society Winter Meeting , vol.1 , pp. 627-631
    • Lambert-Torres, G.1
  • 32
    • 50849128990 scopus 로고    scopus 로고
    • The reliability Test System Task Force of the Application of Probability Methods Sub-committee, The IEEE Reliability Test System - 1996, IEEE Trans. on Power System, 14, No. 3, August 1999.
    • "The reliability Test System Task Force of the Application of Probability Methods Sub-committee", The IEEE Reliability Test System - 1996, IEEE Trans. on Power System, Vol 14, No. 3, August 1999.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.