메뉴 건너뛰기




Volumn 5, Issue 1, 2014, Pages 3-13

SOCCA: A security-oriented cyber-physical contingency analysis in power infrastructures

Author keywords

Contingency analysis; cyber physical systems; security; situational awareness; state estimation

Indexed keywords

CONTINGENCY ANALYSIS; CYBER PHYSICAL SYSTEMS (CPSS); CYBER-PHYSICAL SECURITIES; NETWORK CONFIGURATION; POWER INFRASTRUCTURES; POWER SYSTEM TOPOLOGY; SECURITY; SITUATIONAL AWARENESS;

EID: 84892599904     PISSN: 19493053     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSG.2013.2280399     Document Type: Article
Times cited : (103)

References (44)
  • 5
    • 82155185229 scopus 로고    scopus 로고
    • Petri net modeling of cyber-physical attacks on smart grid
    • Dec.
    • T. M. Chen, S. Member, J. C. Sanchez-aarnoutse, and J. Buford, "Petri net modeling of cyber-physical attacks on smart grid," IEEE Trans. Smart Grid vol. 2, no. 4, pp. 741-749, Dec. 2011.
    • (2011) IEEE Trans. Smart Grid , vol.2 , Issue.4 , pp. 741-749
    • Chen, T.M.1    Member, S.2    Sanchez-Aarnoutse, J.C.3    Buford, J.4
  • 6
    • 84892605057 scopus 로고    scopus 로고
    • Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design
    • abs/1103.2795
    • F. Pasqualetti, F. Dörfler, and F. Bullo, "Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design," CoRR, vol. abs/1103.2795, 2011.
    • (2011) CoRR
    • Pasqualetti, F.1    Dörfler, F.2    Bullo, F.3
  • 7
    • 84155167085 scopus 로고    scopus 로고
    • Cyber-physical system security for the electric power grid
    • S. Sridhar, A. Hahn, and M. Govindarasu, "Cyber-physical system security for the electric power grid," Proc. IEEE, vol. 100, no. 1, pp. 210-224, 2012.
    • (2012) Proc. IEEE , vol.100 , Issue.1 , pp. 210-224
    • Sridhar, S.1    Hahn, A.2    Govindarasu, M.3
  • 8
    • 84872095646 scopus 로고    scopus 로고
    • Scpse: Security-oriented cyber-physical state estimation for power grid critical infrastructures
    • S. Zonouz, K. Rogers, R. Berthier, R. Bobba, W. Sanders, and T. Overbye, "Scpse: Security-oriented cyber-physical state estimation for power grid critical infrastructures," IEEE Trans. Smart Grid, vol. 3, no. 4, pp. 1790-1799, 2012.
    • (2012) IEEE Trans. Smart Grid , vol.3 , Issue.4 , pp. 1790-1799
    • Zonouz, S.1    Rogers, K.2    Berthier, R.3    Bobba, R.4    Sanders, W.5    Overbye, T.6
  • 9
    • 0016062145 scopus 로고
    • Fast decoupled load flow
    • May
    • B. Stott and O. Alsac, "Fast decoupled load flow," IEEE Trans. Power App. Syst., vol. PAS-93, no. 3, pp. 859-869, May 1974.
    • (1974) IEEE Trans. Power App. Syst. , vol.PAS-93 , Issue.3 , pp. 859-869
    • Stott, B.1    Alsac, O.2
  • 11
    • 84892561506 scopus 로고    scopus 로고
    • Standard mod-030-1 Flowgate Methodology, NERC [Online]. Available
    • Standard mod-030-1 Flowgate Methodology, NERC, 2008 [Online]. Available: www.nerc.com/files/MOD-030-1.pdf
    • (2008)
  • 12
    • 79960891853 scopus 로고    scopus 로고
    • Multiple element contingency screening
    • Aug.
    • C. M. Davis and T. J. Overbye, "Multiple element contingency screening," IEEE Trans. Power Syst., vol. 26, no. 3, pp. 1294-1301, Aug. 2011.
    • (2011) IEEE Trans. Power Syst. , vol.26 , Issue.3 , pp. 1294-1301
    • Davis, C.M.1    Overbye, T.J.2
  • 14
    • 84892600537 scopus 로고    scopus 로고
    • National Vulnerability Database August
    • "NULL pointer dereference in Linux Kernel 2.6.0," National Vulnerability Database, August 2009 [Online]. Available: http://web.nvd.nist. gov/view/vuln/detail?vulnId=CVE-2009-2692
    • (2009) NULL Pointer Dereference in Linux Kernel 2.6.0
  • 15
    • 33845524230 scopus 로고    scopus 로고
    • Common vulnerability scoring system
    • P. Mell, K. Scarfone, and S. Romanosky, "Common vulnerability scoring system," IEEE Security Privacy, vol. 4, no. 6, pp. 85-89, Nov.-Dec. 2006. (Pubitemid 44925881)
    • (2006) IEEE Security and Privacy , vol.4 , Issue.6 , pp. 85-89
    • Mell, P.1    Scarfone, K.2    Romanosky, S.3
  • 16
  • 17
    • 84872095646 scopus 로고    scopus 로고
    • Scpse: Security-oriented cyber-physical state estimation for power grid critical infrastructures
    • S. Zonouz, K. Rogers, R. Berthier, R. Bobba, W. Sanders, and T. Overbye, "Scpse: Security-oriented cyber-physical state estimation for power grid critical infrastructures," IEEE Trans. Smart Grid, vol. 3, no. 4, pp. 1790-1799, 2012.
    • (2012) IEEE Trans. Smart Grid , vol.3 , Issue.4 , pp. 1790-1799
    • Zonouz, S.1    Rogers, K.2    Berthier, R.3    Bobba, R.4    Sanders, W.5    Overbye, T.6
  • 18
    • 85066851244 scopus 로고    scopus 로고
    • Alert verification determining the success of intrusion attempts
    • C. Kruegel and W. K. Robertson, "Alert verification determining the success of intrusion attempts," in Proc. DIMVA, 2004, pp. 25-38.
    • (2004) Proc. DIMVA , pp. 25-38
    • Kruegel, C.1    Robertson, W.K.2
  • 21
    • 24944461245 scopus 로고    scopus 로고
    • Trust management survey
    • Trust Management: Third International Conference, iTrust 2005, Proceedings
    • S. Ruohomaa and L. Kutvonen, "Trust management survey," in Trust Management. New York: Springer, 2005, pp. 77-92. (Pubitemid 41313122)
    • (2005) Lecture Notes in Computer Science , vol.3477 , pp. 77-92
    • Ruohomaa, S.1    Kutvonen, L.2
  • 23
    • 84922794799 scopus 로고    scopus 로고
    • Managing alerts in a multi-intrusion detection environment
    • F. Cuppens, "Managing alerts in a multi-intrusion detection environment," in Proc. ACSAC, 2001, vol. 1, p. 22.
    • (2001) Proc. ACSAC , vol.1 , pp. 22
    • Cuppens, F.1
  • 25
    • 84892562122 scopus 로고    scopus 로고
    • XML: The Complete Reference. Noida, India: McGraw Hill Education Pvt. Ltd.2001 [Online] Available
    • XML: The Complete Reference. Noida, India: McGraw Hill Education Pvt. Ltd., 2001 [Online]. Available: http://books.google.com/books?id=1XErtcH8PHoC
  • 26
    • 58849130197 scopus 로고    scopus 로고
    • Usable global network access policy for process control systems
    • D. M. Nicol, W. H. Sanders, S. Singh, and M. Seri, "Usable global network access policy for process control systems," IEEE Security Privacy, vol. 6, pp. 30-36, 2008.
    • (2008) IEEE Security Privacy , vol.6 , pp. 30-36
    • Nicol, D.M.1    Sanders, W.H.2    Singh, S.3    Seri, M.4
  • 28
    • 0018544097 scopus 로고
    • IEEE reliability test system
    • R. T. S. T. F. of the Application of Probability Methods Subcommittee Nov.
    • R. T. S. T. F. of the Application of Probability Methods Subcommittee, "IEEE reliability test system," IEEE Trans. Power App. Syst., vol. PAS-98, no. 6, pp. 2047-2054, Nov. 1979.
    • (1979) IEEE Trans. Power App. Syst. , vol.PAS-98 , Issue.6 , pp. 2047-2054
  • 29
    • 0029332887 scopus 로고
    • Planning under time constraints in stochastic domains
    • Jul.
    • T. Dean, L. Kaelbling, J. Kirman, and A. Nicholson, "Planning under time constraints in stochastic domains," Artif. Intell., vol. 76, pp. 35-74, Jul. 1995.
    • (1995) Artif. Intell. , vol.76 , pp. 35-74
    • Dean, T.1    Kaelbling, L.2    Kirman, J.3    Nicholson, A.4
  • 31
    • 50249085983 scopus 로고    scopus 로고
    • An attack graph-based probabilistic security metric
    • Data and Applications Security XXII V. Atluri, Ed. Berlin/Heidelberg, Germany: Springer 10.1007/978-3-540-70567-3-22 [Online]. Available
    • L. Wang, T. Islam, T. Long, A. Singhal, and S. Jajodia, "An attack graph-based probabilistic security metric," in Data and Applications Security XXII, ser. Lecture Notes in Computer Science, V. Atluri, Ed. Berlin/Heidelberg, Germany: Springer, 2008, vol. 5094, pp. 283-296, 10.1007/978-3-540-70567-3-22 [Online]. Available: http://dx.doi.org/10.1007/978- 3-540-70567-3-22
    • (2008) Lecture Notes in Computer Science , vol.5094 , pp. 283-296
    • Wang, L.1    Islam, T.2    Long, T.3    Singhal, A.4    Jajodia, S.5
  • 32
    • 80055043688 scopus 로고    scopus 로고
    • Model-based security metrics using ADversary VIew Security Evaluation (ADVISE)
    • E. LeMay, M. D. Ford, K. Keefe, W. H. Sanders, and C. Muehrcke, "Model-based security metrics using ADversary VIew Security Evaluation (ADVISE)," in Proc. QEST, 2011, pp. 191-200.
    • (2011) Proc. QEST , pp. 191-200
    • Lemay, E.1    Ford, M.D.2    Keefe, K.3    Sanders, W.H.4    Muehrcke, C.5
  • 33
    • 23944456320 scopus 로고    scopus 로고
    • TRINETR: An architecture for collaborative intrusion detection and knowledge-based alert evaluation
    • DOI 10.1016/j.aei.2005.05.004, PII S1474034605000340, Collaorative Environment for Design and Manufacturing
    • J. Yu, Y. Ramana Reddy, S. Selliah, S. Reddy, V. Bharadwaj, and S. Kankanahalli, "TRINETR: An architecture for collaborative intrusion detection and knowledge-based alert evaluation," Adv. Eng. Informat., vol. 19, no. 2, pp. 93-101, 2005. (Pubitemid 41203511)
    • (2005) Advanced Engineering Informatics , vol.19 , Issue.2 , pp. 93-101
    • Yu, J.1    Reddy, Y.V.R.2    Selliah, S.3    Reddy, S.4    Bharadwaj, V.5    Kankanahalli, S.6
  • 36
    • 84866662118 scopus 로고    scopus 로고
    • Statistical causality analysis of INFOSEC alert data
    • New York: Springer
    • W. Lee and X. Qin, "Statistical causality analysis of INFOSEC alert data," in Managing Cyber Threats. New York: Springer, 2005, pp. 101-127.
    • (2005) Managing Cyber Threats , pp. 101-127
    • Lee, W.1    Qin, X.2
  • 37
    • 0022098010 scopus 로고
    • Analytical and computational improvements in performance-index ranking algorithms for networks
    • DOI 10.1016/0142-0615(85)90044-4
    • B. Stott, O. Alsac, and A. F. L., "Analytical and computational improvements in performance index ranking algorithms for networks," Int. J. Electr. Power Energy Syst., vol. 7, no. 3, pp. 154-160, 1985. (Pubitemid 15568572)
    • (1985) International Journal of Electrical Power and Energy System , vol.7 , Issue.3 , pp. 154-160
    • Stott, B.1    Alsac, O.2    Alvarado, F.L.3
  • 38
    • 0018324857 scopus 로고
    • Automatic contingency selection
    • G. C. Ejebe and B. F.Wollenberg, "Automatic contingency selection," IEEE Trans. Power App. Syst., vol. PAS-65, no. 1, pp. 859-109, 1979.
    • (1979) IEEE Trans. Power App. Syst. , vol.PAS-65 , Issue.1 , pp. 859-109
    • Ejebe, G.C.1    Wollenberg, B.F.2
  • 39
    • 0019528522 scopus 로고
    • An advanced contingency selection algorithm
    • Feb.
    • T. Mikolinnas and B.Wollenberg, "An advanced contingency selection algorithm," IEEE Trans. Power App. Syst., vol. PAS-100, no. 2, pp. 608-617, Feb. 1981.
    • (1981) IEEE Trans. Power App. Syst. , vol.PAS-100 , Issue.2 , pp. 608-617
    • Mikolinnas, T.1    Wollenberg, B.2
  • 40
    • 0019559507 scopus 로고
    • Automatic contingency selection method for on-line security analysis
    • G. Irisarri and A. Sasson, "An automatic contingency selection method for on-line security analysis," IEEE Trans. Power App. Syst., vol. PAS-100, no. 4, pp. 1838-1844, Apr. 1981. (Pubitemid 11498061)
    • (1981) IEEE transactions on power apparatus and systems , vol.PAS-100 , Issue.4 , pp. 1838-1844
    • Irisarri, G.D.1    Sasson, A.M.2
  • 41
    • 34248597839 scopus 로고    scopus 로고
    • Detection of island formation and identification of causal factors under multiple line outages
    • DOI 10.1109/TPWRS.2006.888985
    • T. Guler and G. Gross, "Detection of island formation and identification of causal factors under multiple line outages," IEEE Trans. Power Syst., vol. 22, no. 2, pp. 505-513, May 2007. (Pubitemid 46746211)
    • (2007) IEEE Transactions on Power Systems , vol.22 , Issue.2 , pp. 505-513
    • Guler, T.1    Gross, G.2
  • 44
    • 79960891853 scopus 로고    scopus 로고
    • Multiple element contingency screening
    • Aug.
    • C. Davis and T. Overbye, "Multiple element contingency screening," IEEE Trans. Power Syst., vol. 26, no. 3, pp. 1294-1301, Aug. 2011.
    • (2011) IEEE Trans. Power Syst. , vol.26 , Issue.3 , pp. 1294-1301
    • Davis, C.1    Overbye, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.