메뉴 건너뛰기




Volumn 5, Issue 4, 2014, Pages 1643-1653

Integrated anomaly detection for cyber security of the substations

Author keywords

Anomaly detection; cyber security of substations; GOOSE anomaly detection; SMV anomaly detection and intrusion detection

Indexed keywords

INTRUSION DETECTION; OUTAGES;

EID: 84903266307     PISSN: 19493053     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSG.2013.2294473     Document Type: Article
Times cited : (192)

References (37)
  • 1
    • 77952887452 scopus 로고    scopus 로고
    • Security technology for smart grid net works
    • Jun.
    • A. R. Metke and R. L. Ekl, "Security technology for smart grid net works," IEEE Trans. Smart Grid, vol. 1, no. 1, pp. 99-107, Jun. 2010.
    • (2010) IEEE Trans. Smart Grid , vol.1 , Issue.1 , pp. 99-107
    • Metke, A.R.1    Ekl, R.L.2
  • 3
    • 79960922435 scopus 로고    scopus 로고
    • Smart fault location for smart grids
    • Mar.
    • M. Kezunovic, "Smart fault location for smart grids," IEEE Trans. Smart Grid, vol. 2, no. 1, pp. 11-22, Mar. 2011.
    • (2011) IEEE Trans. Smart Grid , vol.2 , Issue.1 , pp. 11-22
    • Kezunovic, M.1
  • 4
    • 84903290390 scopus 로고    scopus 로고
    • NIST Framework and Roadmap for Smart Grid Interoperability Standards, NIST 1108R2, National Institute for Standards and Technology, Feb.
    • NIST Framework and Roadmap for Smart Grid Interoperability Standards, NIST 1108R2, National Institute for Standards and Technology, Feb. 2012 [Online]. Available: http://www.nist.gov/smartgrid/upload/NIST-Framework- Release-2-0-corr.pdf
    • (2012)
  • 6
    • 69249240176 scopus 로고    scopus 로고
    • Cascade-based attack vulnerability on the US power grid
    • Dec.
    • J.-W. Wang and L.-L. Rong, "Cascade-based attack vulnerability on the US power grid," Safety Sci., vol. 47, no. 10, pp. 1332-1336, Dec. 2009.
    • (2009) Safety Sci. , vol.47 , Issue.10 , pp. 1332-1336
    • Wang, J.-W.1    Rong, L.-L.2
  • 7
    • 84155167085 scopus 로고    scopus 로고
    • Cyber-physical system security for the electric power grid
    • Jan.
    • S. Sridhar, A. Hahn, and M. Govindarasu, "Cyber-physical system security for the electric power grid," Proc. IEEE, vol. 100, no. 1, pp. 210-224, Jan. 2012.
    • (2012) Proc. IEEE , vol.100 , Issue.1 , pp. 210-224
    • Sridhar, S.1    Hahn, A.2    Govindarasu, M.3
  • 12
    • 33746368048 scopus 로고    scopus 로고
    • Enhancing security using mobility-based anomaly detection in cellular mobile networks
    • DOI 10.1109/TVT.2006.874579
    • B. Sun, F. Yu, K. Wu, Y. Xiao, and V. C. M. Leung, "Enhancing security using mobility-based anomaly detection in cellular mobile networks," IEEE Trans. Veh. Technol., vol. 55, no. 4, pp. 1385-1396, Jul. 2006. (Pubitemid 44111432)
    • (2006) IEEE Transactions on Vehicular Technology , vol.55 , Issue.4 , pp. 1385-1396
    • Sun, B.1    Yu, F.2    Wu, K.3    Xiao, Y.4    Leung, V.C.M.5
  • 13
    • 0036647172 scopus 로고    scopus 로고
    • Multivariate statistical analysis of audit trails for host-based intrusion detection
    • DOI 10.1109/TC.2002.1017701
    • N. Ye, S. M. Emran, Q. Chen, and S. Vilbert, "Multivariate statistical analysis of audit trails for host-based intrusion detection," IEEE Trans. Comput., vol. 51, no. 7, pp. 810-820, Jul. 2002. (Pubitemid 34835448)
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.7 , pp. 810-820
    • Ye, N.1    Emran, S.M.2    Chen, Q.3    Vilbert, S.4
  • 14
    • 65249107163 scopus 로고    scopus 로고
    • A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection
    • Jan.
    • J. Hu, X. Yu, D. Qiu, and H.-H. Chen, "A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection," IEEE Netw., vol. 23, no. 1, pp. 42-47, Jan. 2009.
    • (2009) IEEE Netw. , vol.23 , Issue.1 , pp. 42-47
    • Hu, J.1    Yu, X.2    Qiu, D.3    Chen, H.-H.4
  • 15
    • 84863914072 scopus 로고    scopus 로고
    • Design and implementation of an open network and host-based intrusion detection testbed with an emphasis on accuracy and repeatability
    • Apr.
    • M. J. Shevenell and R. F. Erbacher, "Design and implementation of an open network and host-based intrusion detection testbed with an emphasis on accuracy and repeatability," in Proc. 9th Int. Conf. Inf. Technol.: New Generations (ITNG), Apr. 2012, pp. 409-416.
    • (2012) Proc. 9th Int. Conf. Inf. Technol.: New Generations (ITNG) , pp. 409-416
    • Shevenell, M.J.1    Erbacher, R.F.2
  • 16
    • 62949099388 scopus 로고    scopus 로고
    • HIDMN: A host and network-based intrusion detection for mobile networks
    • Dec.
    • S. Bijan and A. M. Kazemitabar, "HIDMN: A host and network-based intrusion detection for mobile networks," in Proc. Int. Conf. Comput. Electr. Eng. (ICCEE), Dec. 2008, pp. 204-208.
    • (2008) Proc. Int. Conf. Comput. Electr. Eng. (ICCEE) , pp. 204-208
    • Bijan, S.1    Kazemitabar, A.M.2
  • 18
    • 67349092535 scopus 로고    scopus 로고
    • Vulnerability assessment of cybersecurity for SCADA systems
    • Nov.
    • C.-W. Ten, C.-C. Liu, and G. Manimaran, "Vulnerability assessment of cybersecurity for SCADA systems," IEEE Trans. Power Syst., vol. 23, no. 4, pp. 1836-1846, Nov. 2008.
    • (2008) IEEE Trans. Power Syst. , vol.23 , Issue.4 , pp. 1836-1846
    • Ten, C.-W.1    Liu, C.-C.2    Manimaran, G.3
  • 19
    • 82155196441 scopus 로고    scopus 로고
    • Anomaly detection for cyberse-curity of the substations
    • Dec.
    • C.-W. Ten, J. Hong, and C.-C. Liu, "Anomaly detection for cyberse-curity of the substations," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 865-873, Dec. 2011.
    • (2011) IEEE Trans. Smart Grid , vol.2 , Issue.4 , pp. 865-873
    • Ten, C.-W.1    Hong, J.2    Liu, C.-C.3
  • 20
    • 84555217963 scopus 로고    scopus 로고
    • Smart grid-safe, secure, self-healing: Challenges and opportunities in power system security, resiliency, and privacy
    • Jan.
    • S.-M. Amin and A. M. Giacomoni, "Smart grid-safe, secure, self-healing: Challenges and opportunities in power system security, resiliency, and privacy," IEEE Power Energy Mag., pp. 33-40, Jan. 2012.
    • (2012) IEEE Power Energy Mag. , pp. 33-40
    • Amin, S.-M.1    Giacomoni, A.M.2
  • 21
    • 84865395858 scopus 로고    scopus 로고
    • Challenges in power system information security
    • Jul.
    • G. Dan, H. Sandberg, M. Ekstedt, and G. Bjorkman, "Challenges in power system information security," IEEE Security Privacy, vol. 10, no. 4, pp. 62-70, Jul. 2012.
    • (2012) IEEE Security Privacy , vol.10 , Issue.4 , pp. 62-70
    • Dan, G.1    Sandberg, H.2    Ekstedt, M.3    Bjorkman, G.4
  • 22
    • 84874917979 scopus 로고    scopus 로고
    • The real story of Stuxnet
    • Mar.
    • D. Kushner, "The real story of Stuxnet," IEEE Spectrum, vol. 50, no. 3, pp. 48-53, Mar. 2013.
    • (2013) IEEE Spectrum , vol.50 , Issue.3 , pp. 48-53
    • Kushner, D.1
  • 23
    • 84893302626 scopus 로고    scopus 로고
    • Future Grid Initiative White Paper, PSERC, Feb.
    • M. Govindarasu, A. Hann, and P. Sauer, "Cyber-physical systems security for smart grid," Future Grid Initiative White Paper, PSERC, Feb. 2012 [Online]. Available: http://www.pserc.wisc. edu/documents/publications/ papers/fgwhitepapers/Govindarasu-Fu-ture-Grid-White-Paper-CPS-May-2012.pdf
    • (2012) Cyber-physical Systems Security for Smart Grid
    • Govindarasu, M.1    Hann, A.2    Sauer, P.3
  • 25
    • 84903290391 scopus 로고    scopus 로고
    • Guidelines for Smart Grid Cyber Security, NISTIR 7628, National Institute for Standards and Technology, Aug.
    • Guidelines for Smart Grid Cyber Security, NISTIR 7628, National Institute for Standards and Technology, Aug. 2010 [Online]. Available: http://csrc.nist.gov/publications/nistir/ir7628/nistir-7628-vol2.pdf
    • (2010)
  • 27
    • 0037250819 scopus 로고    scopus 로고
    • Security issues and solutions in multicast content distribution: A survey
    • Jan.
    • P. Judge and M. Ammar, "Security issues and solutions in multicast content distribution: A survey," IEEE Netw., vol. 17, no. 1, pp. 30-36., Jan. 2003.
    • (2003) IEEE Netw. , vol.17 , Issue.1 , pp. 30-36
    • Judge, P.1    Ammar, M.2
  • 29
    • 84903290297 scopus 로고    scopus 로고
    • Standard: Sampled Values over ISO/IEC 8802-3, IEC 61850 9-2, Specific Communication Service Mapping (SCSM), Apr. 1st Ed
    • Standard: Sampled Values over ISO/IEC 8802-3, IEC 61850 9-2, Specific Communication Service Mapping (SCSM), Apr. 2004, 1st Ed.
    • (2004)
  • 30
    • 84903290283 scopus 로고    scopus 로고
    • Standard: Mapping to MMS (ISO/IEC9506-1 and ISO/IEC 9506-2), IEC 61850 8-1, Specific Communication Service Mapping (SCSM), May 1st edition
    • Standard: Mapping to MMS (ISO/IEC9506-1 and ISO/IEC 9506-2), IEC 61850 8-1, Specific Communication Service Mapping (SCSM), May 2004, 1st edition.
    • (2004)
  • 31
    • 84903290284 scopus 로고    scopus 로고
    • Standard: Communication Requirements for Functions and Device Models, IEC 61850-5, Communication Networks and Systems in Substations, Jul. 1st Edition
    • Standard: Communication Requirements for Functions and Device Models, IEC 61850-5, Communication Networks and Systems in Substations, Jul. 2003, 1st Edition.
    • (2003)
  • 32
    • 84903290285 scopus 로고    scopus 로고
    • U.S. Department of Energy, Office of Electricity Delivery and Energy Reliability, National SCADA Test Bed Program Jan.
    • U.S. Department of Energy, Office of Electricity Delivery and Energy Reliability, National SCADA Test Bed Program Jan. 2008 [Online]. Available: http://energy.gov/sites/prod/files/oeprod/Documentsand-Media/ DOE-OE-NSTB-Multi-Year-Plan.pdf
    • (2008)
  • 33
    • 82155196414 scopus 로고    scopus 로고
    • Cyber attack exposure evaluation framework for the smart grid
    • Jun.
    • A. Hahn and M. Govindarasu, "Cyber attack exposure evaluation framework for the smart grid," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 835-843, Jun. 2011.
    • (2011) IEEE Trans. Smart Grid , vol.2 , Issue.4 , pp. 835-843
    • Hahn, A.1    Govindarasu, M.2
  • 35
    • 84903310138 scopus 로고    scopus 로고
    • Stanford CA USA: Stanford Univ. Jul.
    • M. Hillenmeyer, Machine Learning. Stanford, CA, USA: Stanford Univ., Jul. 2005 [Online]. Available: http://www.stanford.edu/~mau-reenh/quals/pdf/ml.pdf
    • (2005) Machine Learning
    • Hillenmeyer, M.1
  • 36
    • 84903290286 scopus 로고    scopus 로고
    • M.S. Thesis, School of Electrical, Electronic and Mechanical Engineering, University College Dublin, Dublin, Ireland
    • A. Harvey, "Cybersecurity enhancement in a power substation," M.S. Thesis, School of Electrical, Electronic and Mechanical Engineering, University College Dublin, Dublin, Ireland, 2011.
    • (2011) Cybersecurity Enhancement in A Power Substation
    • Harvey, A.1
  • 37
    • 84903290287 scopus 로고    scopus 로고
    • tshark
    • tshark [Online]. Available: http://www.wireshark.org/docs/man-pages/ tshark.html


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.