Anomaly Detection in Electricity Cyber Infrastructures
نویسندگان
چکیده
This paper presents a novel anomaly detection methodology for the protection of electricity critical infrastructures that learns the normal behaviour of the system, builds up a profile and detects anomalous operations which deviate from the profile. This can be used to identify attacks, failures and accidents and it can also be used to improve state estimation, correct topology errors and inform the operators about potential discrepancies between their view of the network and its actual state. This paper will cover two of the anomaly-detecting techniques that we have been developing for electricity networks invariant induction and simulated ants – and a Bayesian methodology for integrating the output of these detectors. The results presented in this paper demonstrate that this technique could make a significant contribution to the security of electricity critical infrastructures.
منابع مشابه
Cyber-Critical Infrastructure Protection Using Real-Time Payload-Based Anomaly Detection
With an increasing demand of inter-connectivity and protocol standardization modern cyber-critical infrastructures are exposed to a multitude of serious threats that may give rise to severe damage for life and assets without the implementation of proper safeguards. Thus, we propose a method that is capable to reliably detect unknown, exploit-based attacks on cyber-critical infrastructures carri...
متن کاملDesigning Cyber Warfare Information Infrastructure Resilience
Due to many cyber attacks in the last years, governments are realizing how vulnerable they have become should there be a break out of a cyberwar. This urged them to establish a cyber warfare information infrastructure in a short time. However, this cyber warfare information infrastructure relies heavily on public infrastructures, like electricity and the Internet, which will be most likely targ...
متن کاملA system dynamics approach for assessing the impact of cyber attacks on critical infrastructures
The massive proliferation of information and communications technologies (hardware and software) into the heart of modern critical infrastructures has given birth to a unique technological ecosystem. Despite the many advantages brought about by modern information and communications technologies, the shift from isolated environments to “systems-of-systems” integrated with massive information and...
متن کاملDistributed Intrusion Detection and Attack Containment for Organizational Cyber Security
The sheer number and sophistication of cyber attacks are making our nation’s critical computer networks increasingly vulnerable. At the same time, these networks are being called upon to play a key role in processing, data storage, monitoring and control of critical infrastructures such as energy, transportation, and finance. Disruption of these networks can have highly damaging affects on our ...
متن کاملAttack Detection and Mitigation for AGC
Cyber systems play a critical role in improving the efficiency and reliability of power system operation and ensuring the system remains within safe operating margins. An adversary can inflict severe damage to the underlying physical system by compromising the control and monitoring applications facilitated by the cyber layer. There is a growing need for cyber-attack-resilient control technique...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006