A Diversity-Based Substation Cyber Defense Strategy Utilizing Coloring Games

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Diversity-based Substation Cyber Defense Strategy utilizing Coloring Games

Growing cybersecurity risks in the power grid require that utilities implement a variety of security mechanism (SM) composed mostly of VPNs, firewalls, or other custom security components. While they provide some protection, they might contain software vulnerabilities which can lead to a cyber-attack. In this paper, the severity of a cyber-attack has been decreased by employing a diverse set of...

متن کامل

Formalizing Agents' Beliefs for Cyber-Security Defense Strategy Planning

Abstract. Critical information infrastructures have been exposed to an increasing number of cyber attacks in recent years. Current protection approaches consider the reaction to a threat from an operational perspective, but leave out human aspects of an attacker. The problem is, no matter how good a defense planning from an operational perspective is, it must be considered that any action taken...

متن کامل

Ontology-based Adaptive Systems of Cyber Defense

In this paper we outline a holistic approach for understanding and simulating human decision making in knowledge-intensive tasks. To this purpose, we integrate semantic and cognitive models in a hybrid computational architecture. The contribution of the paper is twofold: first we describe a packetcentric ontology to represent network traffic. We show how the ontology is used to describe real-wo...

متن کامل

Cyber SA: Situational Awareness for Cyber Defense

1. Be aware of the current situation. This aspect can also be called situation perception. Situation perception includes both situation recognition and identification. Situation identification can include identifying the type of attack (recognition is only recognizing that an attack is occurring), the source (who, what) of an attack, the target of an attack, etc. Situation perception is beyond ...

متن کامل

Towards a Model-Based Cyber Defense Situational Awareness Visualization Environment

A wide variety of security components such as firewalls, anti-virus scanners, or intrusion detection systems are extensively used in computer networks for providing information assurance. The incident messages generated in case these components detect certain events are typically processed by a human operator at a central security console. The types of visualizations presently used for the anal...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Smart Grid

سال: 2019

ISSN: 1949-3053,1949-3061

DOI: 10.1109/tsg.2018.2881672