Revealing Temporal Features of Attacks Against Smart Grid
|
|
- Elfreda Jennings
- 5 years ago
- Views:
Transcription
1 Revealing Temporal Features of Attacks Against Smart Grid Presenter: Yihai Zhu Authors: Jun Yan, Yihai Zhu, Yan Sun, Haibo He Dept. of Electrical, Computer & Biomedical Engineering University of Rhode Island
2 Outline Security Issues in Smart Grid Modeling and Formulation Temporal Features Revealed 2
3 Outline Security Issues in Smart Grid Modeling and Formulation Temporal Features Revealed 3
4 Challenges in Smart Grid Security Direct attacks - Hacking into power system control center - Bring down transmission facilities Data attacks - Intercept or manipulate data streams o False data injection on PMU/AMI Privacy attacks - Consumer data theft 4
5 Motivation for comprehensive analyses Identifying critical components Assessing the process of cascading propagation Evaluating the impact of malicious attacks from, - Spatial regions - Electrical statistics - Temporal process 5
6 Outline Security Issues in Smart Grid Modeling and Formulation Temporal Features Revealed 6
7 The simulation model Start: End: Fig.2: The flowchart of the cascading simulator 7
8 8 Modeling of Attack and Failure Attack and Load redistribution A victim (or a failed component) will be removed. Disconnection will lead to an immediate local impact o Load of a failed node will be added proportionally to all its alive neighbors ) ( ) ( ) ( ) ( ) ( v L u L w L w L v N u =
9 Overloading Modeling of Attack and Failure - If the nodal load L(t) > its capacity C = T*L 0 Conceptual measurement of time - Use round as a unit of time, the duration between two consecutive failures. [1] M. Eppstein and P. Hines, A Random Chemistry algorithm for identifying multiple contingencies that initiate cascading failure, IEEE Transactions on Power Systems 9
10 Modeling of Attack and Failure Accumulation of overloading and node failure - Accumulative function of rounds to identify a fatal overload Accumulation function of overloading d( n) = n k = 0 Node failure d(n) >η ( L k T * L0) Eta: overloaded by 50% for D rounds [1], where D is time-delay. [1] M. Eppstein and P. Hines, A Random Chemistry algorithm for identifying multiple contingencies that initiate cascading failure, IEEE Transactions on Power Systems 10
11 Identifiable Temporal Features 11
12 Identifiable Temporal Features 3. Buffer period The interval of time between leaps Helpful when the defense strength of power grids, before which actions should be taken to avoid further blackouts. 12
13 Outline Security Issues in Smart Grid Modeling and Formulation Temporal Features Revealed 13
14 1. Benchmark power grid o Bay area (510 nodes) Experiment Setup 2. Test parameters o T = 1.1 o D = 0, 1,, 5 14
15 Temporal Features Revealed Finding nodes (substations) of interest *With D = 0 and T =
16 Case study: Temporal Features Revealed Fig.3: The change of PoF with time in the attack of Node 57 16
17 Temporal Features Revealed 17
18 Temporal Features Revealed Conclusions - Different temporal patterns of failure propagation - Impact of time delay D Potential utilization of the features - Critical moments to prevent or intervene cascading failure - Better design of redistribution policy 18
19 Acknowledgement We gratefully acknowledge the support from National Science Foundation (NSF) under Grant # CNS For more information, please contact Prof. Haibo He at he@ele.uri.edu 19
20 References 1. M. Eppstein and P. Hines, A Random Chemistry algorithm for identifying multiple contingencies that initiate cascading failure, IEEE Transactions on Power Systems, Vol. 27, No. 3, August J. Yan, Y. Yang, W. Wang, H. He, Y. Sun, An integrated visualization approach for smart grid attacks, IEEE Intelligent Control and Information Processing (ICICIP), Y. Zhu, Y. Sun and H. He, Load Distribution Vector Based Attack Strategies against Power Grid Systems, in IEEE Global Telecommunications Conference (GLOBECOM 2012 ), Dec W. Wang, Q. Cai, Y. Sun, and H. He, Risk-aware attacks and catastrophic cascading failures in U.S. power grid, in IEEE Global Telecommunications Conference (GLOBECOM 2011)Dec
21 Thank you! Questions? 21
Risk-Aware Vulnerability Analysis of Electric Grids from Attacker s Perspective
Risk-Aware Vulnerability Analysis of Electric Grids Presenter: Yihai Zhu Authors: Yihai Zhu, Jun Yan Yan Sun, Haibo He Dept. of Electrical, Computer & Biomedical Engineering University of Rhode Island
More informationThe Sequential Attack against Power Grid Networks
The Sequential Attack against Power Grid Networks Yihai Zhu, Jun Yan, Yufei Tang, Yan (Lindsay) Sun, and Haibo He Department of Electrical, Computer, and Biomedical Engineering, University of Rhode Island,
More informationThe Sequential Attack against Power Grid Networks. Associate Professor at University of Rhode Island
The Sequential Attack against Power Grid Networks Yihai i Zhu, Jun Yan, YfiT Yufei Tang, Yan (Lindsay) Sun, Haibo Hib He Presenter: Yan (Lindsay) Sun Associate Professor at University of Rhode Island Email:
More informationRisk-Aware Vulnerability Analysis of Electric Grids from Attacker s Perspective
Risk-Aware Vulnerability Analysis of Electric Grids from Attacker s Perspective Yihai Zhu, Jun Yan, Yan (Lindsay) Sun, and Haibo He Department of Electrical, Computer, and Biomedical Engineering, University
More informationLoad Distribution Vector Based Attack Strategies against Power Grid Systems
Load Distribution Vector Based Attack Strategies against Power Grid Systems Yihai Zhu, Yan (Lindsay) Sun, and Haibo He Department of Electrical, Computer, and Biomedical Engineering, University of Rhode
More informationELECTRIC grids have been developing over decades
2340 IEEE TRANSACTIONS ON INFORATION FORENSICS AND SECURITY, VOL. 9, NO. 12, DECEBER 2014 Resilience Analysis of Power Grids Under the Sequential Attack Yihai Zhu, Student ember, IEEE, Jun Yan, Student
More informationMARCH 2013 VOLUME 8 NUMBER 3 ITIFA6 (ISSN ) APRIL 2013 VOLUME 8 NUMBER 4
MARCH 2013 VOLUME 8 NUMBER 3 ITIFA6 (ISSN 1556-6013) APRIL 2013 VOLUME 8 NUMBER 4 Texas Power grid shown in ArcMap 10.0 with substations and transmission lines (top) and its clustering result with the
More informationTHE MODERN complex network systems, including communication
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 3, MARCH 2014 451 Integrated Security Analysis on Cascading Failure in Complex Networks Jun Yan, Student Member, IEEE, HaiboHe,Senior
More informationFailure Diagnosis and Cyber Intrusion Detection in Transmission Protection System Assets Using Synchrophasor Data
Failure Diagnosis and Cyber Intrusion Detection in Transmission Protection System Assets Using Synchrophasor Data Anurag Srivastava, Bo Cui, P. Banerjee Washington State University NASPI March 2017 Outline
More informationRevealing Cascading Failure Vulnerability in Power Grids using Risk-Graph
Revealing Cascading Failure Vulnerability in Power Grids using Risk-Graph Yihai Zhu, Student ember, IEEE, Jun Yan, Student ember, IEEE, Yan Sun, ember, IEEE, and Haibo He, Senior ember, IEEE, Abstract
More informationCOMPUTER NETWORK SECURITY
COMPUTER NETWORK SECURITY Prof. Dr. Hasan Hüseyin BALIK (1 st Week) Outline Course Information and Policies Course Syllabus 1. Overview Course Information Instructor: Prof. Dr. Hasan H. BALIK, balik@yildiz.edu.tr,
More informationUSE CASE 14 CONTROLLED ISLANDING
I USE CASE 14 CONTROLLED ISLANDING Use Case Title Centralized application separates grid into islands to prevent blackout Use Case Summary Controlled islanding is a method that can significantly improve
More informationCan an influence graph driven by outage data determine transmission line upgrades that mitigate cascading blackouts?
Preprint; IEEE International Conference Probabilistic Methods Applied to Power Systems (PMAPS), June 2018, Boise ID USA Can an influence graph driven by outage data determine transmission line upgrades
More informationACASCADING failure of the transmission network of a
IEEE TRANSACTIONS ON SMART GRID, VOL. XX, NO. X, FEBRUARY 2018 1 Control of Communications-Dependent Cascading Failures in Power Grids Jose Cordova-Garcia, Member, IEEE, Xin Wang, Member, IEEE, Dong-Liang
More informationAn efficient and practical solution to secure password-authenticated scheme using smart card
An efficient and practical solution to secure password-authenticated scheme using smart card R. Deepa 1, R. Prabhu M.Tech 2, PG Research scholor 1, Head of the Department 2 Dept.of Information Technology,
More informationA Statistical Method for Synthetic Power Grid Generation based on the U.S. Western Interconnection
A Statistical Method for Synthetic Power Grid Generation based on the U.S. Western Interconnection Saleh Soltan, Gil Zussman Columbia University New York, NY Failures in Power Grids One of the most essential
More informationA Survey on False Data Injection Attack and Detection in Smart Grid
A Survey on False Data Injection Attack and Detection in Smart Grid Presenter: Yessica Saez Submitted in Partial Fulfillment of the Course Requirements for ECEN 689: Cyber Security of the Smart Grid Instructor:
More informationCyber Security of Power Grids
Cyber Security of Power Grids Chen-Ching Liu Boeing Distinguished Professor Director, Energy Systems Innovation Center Washington State University In Collaboration with M. Govindarasu, Iowa State University
More informationSimulating Smart Grid Cascade Failure Mitigation
Simulating Smart Grid Cascade Failure Mitigation Claudia Whitten Department of Computer Science California Institute of Technology Pasadena, CA 91126 whitten@caltech.edu ABSTRACT Smart grid power systems
More informationOptimized Packet Filtering Honeypot with Intrusion Detection System for WLAN
Amandeep Singh, Pankush Singla, Navdeep Kaur Khiva 101 Optimized Packet Filtering Honeypot with Intrusion Detection System for WLAN Amandeep Singh Pankush Sukhpreet Singla Singh Navdeep Kaur Khiva Second
More informationUnpredictable Software-based Attestation Solution for Node Compromise Detection in Mobile WSN
Unpredictable Software-based Attestation Solution for Node Compromise Detection in Mobile WSN Xinyu Jin, Rodrigo Jose Salmeron, Pasd Putthapipat, Niki Pissinou, Deng Pan, Jeffrey Fan Florida International
More informationCyber Security and Privacy Issues in Smart Grids
Cyber Security and Privacy Issues in Smart Grids Acknowledgement: Slides by Hongwei Li from Univ. of Waterloo References Main Reference Liu, J. and Xiao, Y. and Li, S. and Liang, W. and Chen, C. Cyber
More informationCritical Resilient Interdependent Infrastructure Systems and Processes
TeleNeT Program Critical Resilient Interdependent Infrastructure Systems and Processes David Tipper, Professor Graduate Telecommunications and Networking Program School of Computing and Information University
More informationNodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks
IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI
More informationChair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8
Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 8 System Vulnerabilities and Denial of Service Attacks System Vulnerabilities and
More informationSecuring the Smart Grid. Understanding the BIG Picture 11/1/2011. Proprietary Information of Corporate Risk Solutions, Inc. 1.
Securing the Smart Grid Understanding the BIG Picture The Power Grid The electric power system is the most capital-intensive infrastructure in North America. The system is undergoing tremendous change
More informationACS / Computer Security And Privacy. Fall 2018 Mid-Term Review
ACS-3921-001/4921-001 Computer Security And Privacy Fall 2018 Mid-Term Review ACS-3921/4921-001 Slides Used In The Course A note on the use of these slides: These slides has been adopted and/or modified
More informationLocation Spoofing Attack and Its Countermeasures in Database-Driven Cognitive Radio Networks
Location Spoofing Attack and Its Countermeasures in Database-Driven Cognitive Radio Networks Kexiong (Curtis) Zeng, Sreeraksha Kondaji Ramesh, Yaling Yang. Outline Background and Motivation Our Works Overview
More informationAn Analysis of Onion-Based Anonymous Routing in Delay Tolerant Networks
An Analysis of Onion-Based Anonymous Routing in Delay Tolerant Networks Kazuya Sakai, Tokyo Metropolitan University Min-Te Sun, National Central University Wei-Shinn Ku, Auburn University Jie Wu, Temple
More informationAdvanced Security Solution in IPv6
Advanced Security Solution in IPv6 Vahid Heydari University of Alabama in Huntsville vahid.heydari@uah.edu Outline IPv6, IPsec, and VPN Remote attacks and zero-day vulnerability Moving target defense Related
More informationTemporal Correlations between Spam and Phishing Websites
Temporal Correlations between Spam and Phishing Websites, Richard Clayton and Henry Stern Center for Research on Computation and Society Harvard University USENIX LEET 09 Boston, MA April 21, 2009 Outline
More informationSTLAC: A Spatial and Temporal Locality-Aware Cache and Networkon-Chip
STLAC: A Spatial and Temporal Locality-Aware Cache and Networkon-Chip Codesign for Tiled Manycore Systems Mingyu Wang and Zhaolin Li Institute of Microelectronics, Tsinghua University, Beijing 100084,
More informationThe Challenges of Risk Assessment for Smart Grid
The Challenges of Risk Assessment for Smart Grid Lucie Langer and Paul Smith firstname.lastname@ait.ac.at AIT Austrian Institute of Technology ComForEn Workshop Monday 29 th September, 2014 Risk Assessment:
More informationNext Generation Monitoring and Control Functions for Future Control Centers
1 Next Generation Monitoring and Control Functions for Future Control Centers Fangxing Li, Senior Member, IEEE, Pei Zhang, Senior Member, IEEE, and Navin Bhatt, Senior Member, IEEE Abstract This paper
More informationEnergy Management Issue in Ad Hoc Networks
Wireless Ad Hoc and Sensor Networks - Energy Management Outline Energy Management Issue in ad hoc networks WS 2010/2011 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management
More informationCybersecurity Test and Evaluation Facilities at Texas A&M
Cybersecurity Test and Evaluation Facilities at Texas A&M Dr. Karen L. Butler-Purry, Bo Chen Department of Electrical and Computer Engineering Nishant Pattanaik Department of Computer Science Dr. Ana Goulart
More informationGCSE Computer Science for OCR Overview Scheme of Work
GCSE Computer Science for OCR Overview Scheme of Work The following assumes a two-year model. During the course, the final challenges can be used for practice in computational thinking, algorithm design
More informationEnergy Management Issue in Ad Hoc Networks
Wireless Ad Hoc and Sensor Networks (Energy Management) Outline Energy Management Issue in ad hoc networks WS 2009/2010 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management
More informationPowerCyber: CPS Security Testbed for Power Grid
Learn invent impact PowerCyber: CPS Security Testbed for Power Grid REMOTE ACCESS INTERFACE USER GUIDE Version 1.0 Funded jointly by: NSF Award #CNS 1446831 Compiled by: Sujatha K Swamy, Graduate Research
More informationCYBER ATTACKS EXPLAINED: WIRELESS ATTACKS
CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables and related problems. But with these
More informationConcept White Paper. Concepts for Proposed Content of Eventual Standard(s) for Project : Real-Time Monitoring and Analysis Capabilities
Concept White Paper Concepts for Proposed Content of Eventual Standard(s) for Project 2009-02: Real-Time Monitoring and Analysis Capabilities Real-time Monitoring and Analysis Capabilities Standard Drafting
More informationOn Bounded Rationality in Cyber-Physical Systems Security: Game-Theoretic Analysis with Application to Smart Grid Protection
On Bounded Rationality in Cyber-Physical Systems Security: Game-Theoretic Analysis with Application to Smart Grid Protection CPSR-SG 2016 CPS Week 2016 April 12, 2016 Vienna, Austria Outline CPS Security
More informationSMALL WORLD NETWORK. -Naveen Teja Vempati -Ravi Teja Mitta
SMALL WORLD NETWORK -Naveen Teja Vempati -Ravi Teja Mitta INTRODUCTION Every person in this world is some way or other connected by some means is the idea behind evolution of small world phenomenon. Later
More informationDistributed Internet-Based Load Altering Attacks Against Smart Power Grids Authors: A.-H. Mohsenian-Rad and A. Leon-Garcia
Distributed Internet-Based Load Altering Attacks Against Smart Power Grids Authors: A.-H. Mohsenian-Rad and A. Leon-Garcia Presenter: Harsha Patibandla Submitted in Partial Fulfillment of the Course Requirements
More informationResilience of Infrastructure Networks
Resilience of Infrastructure Networks Moshe Zukerman City University of Hong Kong Collaborators: D. J. Hill (HKU) G. Wang (HKUST) J. Yang (HKU) F. Cucker (CityU) D. M. Chiu (CUHK) Y. Wang (CityU) X. Yuan
More informationDistributed Agent-Based Intrusion Detection for the Smart Grid
Distributed Agent-Based Intrusion Detection for the Smart Grid Presenter: Esther M. Amullen January 19, 2018 Introduction The smart-grid can be viewed as a Large-Scale Networked Control System (LSNCS).
More informationPerformance Analysis of Storage-Based Routing for Circuit-Switched Networks [1]
Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1] Presenter: Yongcheng (Jeremy) Li PhD student, School of Electronic and Information Engineering, Soochow University, China
More informationWeb Security Vulnerabilities: Challenges and Solutions
Web Security Vulnerabilities: Challenges and Solutions A Tutorial Proposal for ACM SAC 2018 by Dr. Hossain Shahriar Department of Information Technology Kennesaw State University Kennesaw, GA 30144, USA
More informationHASTINGS HIGH SCHOOL
HASTINGS HIGH SCHOOL EXAMINATION GUIDE 2017-19 Subject Course code Website address Provisional examination dates Computer Science Computer Science (9-1) - J276 https://www.ocr.org.uk/qualifications/gcse/computerscience-j276-from-2016/
More informationComputing 1: Computer Systems
U1 U2 U3 1 2 3 Computing 1: Computer Systems G: I know how to create strong passwords G: I know how to stay safe online and how to alert an adult if I am worried about anything G: I can list a range of
More informationPhD Thesis Defense Performance Improvements in Software-defined and Virtualized Wireless Networks
PhD Thesis Defense Performance Improvements in Software-defined and Virtualized Wireless Networks Chengchao Liang Supervisor: Prof. F. Richard Yu Department of Systems and Computer Engineering Carleton
More informationVulnerability of Energy and Telecom Infrastructures to Extreme Weather Events A Risk Assessment Tool
Vulnerability of Energy and Telecom Infrastructures to Extreme Weather Events A Risk Assessment Tool Xavier Clotet, Milenko Halat Aplicaciones en Informática Avanzada S.L., Spain. Friday 24 March 2017
More informationCybersecurity for Department of Defense Microgrids: An Army Perspective
Cybersecurity for Department of Defense Microgrids: An Army Perspective Lori Ross O Neil with Cliff Glantz, David McKinnon, Fleur DePeralta, Mark Watson, Paul Boyd, Emily Barrett and Darlene Thorsen Pacific
More informationIntelligent Three-dimensional Layout Design of Video Cameras in Substations
6th International Conference on Electronic, Mechanical, Information and Management (EMIM 2016) Intelligent Three-dimensional Layout Design of Video Cameras in Substations Zhengwei Chang1, a * and Xiaona
More informationKeywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION
Performance Analysis of Network Parameters, Throughput Optimization Using Joint Routing, XOR Routing and Medium Access Control in Wireless Multihop Network 1 Dr. Anuradha M. S., 2 Ms. Anjali kulkarni 1
More informationWIRELESS sensor networks have received a lot of attention
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 2, FEBRUARY 2006 395 Secure and Resilient Clock Synchronization in Wireless Sensor Networks Kun Sun, Peng Ning, Member, IEEE, and Cliff Wang,
More informationSemantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids
Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids Hui Lin, Adam Slagell, Zbigniew Kalbarczyk, Peter W. Sauer, and Ravishankar K. Iyer Department of Electrical
More informationSECURE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR NETWORKS IN THE PRESENCE OF SECURITY THREATS
SECURE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR NETWORKS IN THE PRESENCE OF SECURITY THREATS G.Gomathi 1, C.Yalini 2, T.K.Revathi. 3, 1 M.E Student, Kongunadu College of Engineering, Trichy 2, 3
More informationMalicious Data Attacks on Smart Grid State Estimation: Attack Strategies and Countermeasures
Malicious Data Attacks on Smart Grid State Estimation: Attack Strategies and Countermeasures Authors: O. Kosut, J. Liyan, R. J. Thomas and L. Tong Presenter: Daehyun. Choi Submitted in Partial Fulfillment
More informationarxiv: v4 [physics.soc-ph] 20 Sep 2010
Do topological models provide good information about electricity infrastructure vulnerability? Paul Hines, 1, a) Eduardo Cotilla-Sanchez, 1, b) 2, c) and Seth Blumsack 1) School of Engineering, University
More informationApplication of Monitoring Standards for enhancing Energy System Security
Application of Monitoring Standards for enhancing Energy System Security G. DONDOSSOLA*, R. TERRUGGIA*, P. WYLACH*, G. PUGNI**, F. BELLIO*** RSE SpA*, Enel SpA**, Enel Produzione SpA*** Italy About RSE
More informationInfluence of Route Choice Behavior on Vulnerability to Cascading Failure in Transportation Networks
Influence of Route Choice Behavior on Vulnerability to Cascading Failure in Transportation Networks 〇 Kashin Sugishita, Yasuo Asakura Ph.D Candidate Department of Civil and Environmental Engineering Tokyo
More informationStudy on data encryption technology in network information security. Jianliang Meng, Tao Wu a
nd International Workshop on Materials Engineering and Computer Sciences (IWMECS 05) Study on data encryption technology in network information security Jianliang Meng, Tao Wu a School of North China Electric
More informationMIX Network for Location Privacy First Draft
2G1319 Communication Systems Design Department of Microelectronics and Information Technology, KTH csd2002-ipv6privacy@2g1319.ssvl.kth.se MIX Network for Location Privacy First Draft O. Sirovatcenko April
More informationQuarter 3, 2007 (2007Q3) Generation Deliverability Assessment Study Plan
Quarter 3, (Q3) Generation Deliverability Assessment Study Plan Background and Purpose of Study Phases I & II Generation and Import Deliverability Studies were completed that established the deliverability
More informationA Distributed k-secure Sum Protocol for Secure Multi-Party Computations
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/ A Distributed k-secure Sum Protocol for Secure Multi-Party Computations Rashid Sheikh, Beerendra Kumar, Durgesh Kumar Mishra 68 Abstract Secure sum computation
More informationSecure coding practices
Secure coding practices www.infosys.com/finacle Universal Banking Solution Systems Integration Consulting Business Process Outsourcing Secure coding practices Writing good code is an art but equally important
More informationDoD Energy Resilience
Energy Resilience to Achieve Mission Assurance Working Together to Achieve Energy Resilience DoD Energy Resilience Ariel S. Castillo, PhD OASD(EI&E), Installation Energy August 9, 2016 DISTRIBUTION STATEMENT
More informationAdvanced Security Tester Course Outline
Advanced Security Tester Course Outline General Description This course provides test engineers with advanced skills in security test analysis, design, and execution. In a hands-on, interactive fashion,
More informationDmitry Ishchenko/Reynaldo Nuqui/Steve Kunsman, September 21, 2016 Collaborative Defense of Transmission and Distribution Protection & Control Devices
Dmitry Ishchenko/Reynaldo Nuqui/Steve Kunsman, September 21, 2016 Collaborative Defense of Transmission and Distribution Protection & Control Devices Against Cyber Attacks (CODEF) Cyber Security of the
More informationANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS
ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS Saulius Grusnys, Ingrida Lagzdinyte Kaunas University of Technology, Department of Computer Networks, Studentu 50,
More informationStandard Course Outline IS 656 Information Systems Security and Assurance
Standard Course Outline IS 656 Information Systems Security and Assurance I. General Information s Course number: IS 656 s Title: Information Systems Security and Assurance s Units: 3 s Prerequisites:
More informationSummary of Cyber Security Issues in the Electric Power Sector
Summary of Cyber Security Issues in the Electric Power Sector Jeff Dagle, PE Chief Electrical Engineer Energy Technology Development Group Pacific Northwest National Laboratory (509) 375-3629 jeff.dagle@pnl.gov
More informationEFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV)
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,
More informationDiscussion on measuring electricity security of supply and potential indicators of Smart Grids
Discussion on measuring electricity security of supply and potential indicators of Smart Grids Riccardo Vailati Co-chair CEER Electricity Quality of Supply Task Force SECURE stakeholder workshop, Milan,
More informationSAFEGUARD THE AUTOMATIC GENERATION CONTROL USING GAME THEORY TECHNIQUE
SAFEGUARD THE AUTOMATIC GENERATION CONTROL USING GAME THEORY TECHNIQUE C.Kowsalya* 1 and M.Sangeetha* 2 1 PG student, Department of Electrical and Electronics Engineering, The Kavery Engineering College,
More informationInterfacing Power System and ICT Simulators: Challenges, State-of-the-Art and Study Cases
IEEE Power & Energy Society eneral Meeting 2014 National Harbor, MD, USA, July 31th, 2014 IEEE Task Force on Interfacing Techniques for Simulation Tools Interfacing Power System and ICT Simulators: Contributors:
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Advisors and Special Event Domestic Incident Tracker Overview Federal
More informationSmart Grid Operations - Clemson University Research, Education and Innovation-Ecosystem Opportunities
Smart Grid Operations - Clemson University Research, Education and Innovation-Ecosystem Opportunities G. Kumar Venayagamoorthy, PhD, FIET, FSAIEE Duke Energy Distinguished Professor & Director & Founder
More information3rd International Conference on Mechanical Engineering and Intelligent Systems (ICMEIS 2015)
3rd International Conference on Mechanical Engineering and Intelligent Systems (ICMEIS 2015) Development Of SSP510 Frequency Voltage Emergency Control Device Qinghua Si 1,2,a *, Zhukun Li 1,2, Yunsong
More informationUnsupervised Moving Object Edge Segmentation Using Dual-Tree Complex Wavelet Transform
International Journal of Natural and Engineering Sciences 2 (3): 69-74, 2008 ISSN: 307-49, www.nobelonline.net Unsupervised Moving Object Edge Segmentation Using Dual-Tree Complex Wavelet Transform Turgay
More informationModelling Cascading Failure in Power Networks
Modelling Cascading Failure in Power Networks Sydney, July 2017 Image: IEEEXplore C. K. Michael Tse WSCC System Blackout in 1996 July 1996 WSCC: Western System Coordinating Council, now called WESC, which
More informationRouting Scheme in Energy efficient based Protocols for Wireless Sensor Networks
Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks 1 Chiranjeevi Rampilla, 2 Pallikonda Anil Kumar, 1 Student, DEPT.OF CSE, PVPSIT, KANURU, VIJAYAWADA. 2 Asst.Professor, DEPT.OF
More informationNetwork Access Control and VoIP. Ben Hostetler Senior Information Security Advisor
Network Access Control and VoIP Ben Hostetler Senior Information Security Advisor Objectives/Discussion Points Network Access Control Terms & Definitions Certificate Based 802.1X MAC Authentication Bypass
More informationLESSON 12: WI FI NETWORKS SECURITY
LESSON 12: WI FI NETWORKS SECURITY Raúl Siles raul@taddong.com Founder and Security Analyst at Taddong Introduction to Wi Fi Network Security Wireless networks or Wi Fi networks IEEE 802.11 Standards Information
More informationChapter 8: Smart Grid Communication and Networking
Chapter 8: Smart Grid Communication and Networking Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 1. The framework of smart grid 2. Network
More informationSIMULATION BASED ANALYSIS OF THE INTERACTION OF END-TO-END AND HOP-BY-HOP FLOW CONTROL SCHEMES IN PACKET SWITCHING LANS
SIMULATION BASED ANALYSIS OF THE INTERACTION OF END-TO-END AND HOP-BY-HOP FLOW CONTROL SCHEMES IN PACKET SWITCHING LANS J Wechta, A Eberlein, F Halsall and M Spratt Abstract To meet the networking requirements
More informationChitChat: An Effective Message Delivery Method in Sparse Pocket-Switched Networks
ChitChat: An Effective Message Delivery Method in Sparse Pocket-Switched Networks Douglas McGeehan Dan Lin Sanjay Madria Department of Computer Science Missouri University of Science and Technology Rolla,
More informationKPI Dictionary ABRIDGED SAMPLE. A KPI Reference Guide for Use in Performance Management. Information Technology (IT)
KPI Dictionary Information Technology (IT) A KPI Reference Guide for Use in Performance Management ABRIDGED SAMPLE Do you need a customized KPI Dictionary for your organization? Contact us - we're ready
More informationReal Time Monitoring of
Real Time Monitoring of Cascading Events Mladen Kezunovic Nan Zhang, Hongbiao Song Texas A&M University Tele-Seminar, March 28, 2006 Project Reports (S-19) M. Kezunovic, H. Song and N. Zhang, Detection,
More informationLecture 02 Chapter 10: Circuit Switching and Packet Switching
NET 456 High Speed Networks Lecture 02 Chapter 10: Circuit Switching and Packet Switching Dr. Anis Koubaa Reformatted slides from textbook Data and Computer Communications, Ninth Edition by William Stallings,
More informationDoD Energy Resilience
Energy Resilience to Achieve Mission Assurance Energy Resilience Policy DoD Energy Resilience Ariel S. Castillo, PhD OASD(EI&E), Installation Energy August 9, 2016 DISTRIBUTION STATEMENT A. Approved for
More informationFalse Analog Data Injection Attack Towards Topology Errors: Formulation and Feasibility Analysis
False Analog Data Injection Attack Towards Topology Errors: Formulation and Feasibility Analysis Yuqi Zhou, Jorge Cisneros-Saldana, Le Xie Department of Electrical and Computer Engineering Texas A&M University
More informationEarly detection of Crossfire attacks using deep learning
Early detection of Crossfire attacks using deep learning Saurabh Misra, Mengxuan Tan, Mostafa Rezazad, Ngai-Man Cheung Singapore University of Technology and Design Content The Crossfire Attack A brief
More informationSystem Models. 2.1 Introduction 2.2 Architectural Models 2.3 Fundamental Models. Nicola Dragoni Embedded Systems Engineering DTU Informatics
System Models Nicola Dragoni Embedded Systems Engineering DTU Informatics 2.1 Introduction 2.2 Architectural Models 2.3 Fundamental Models Architectural vs Fundamental Models Systems that are intended
More informationA Framework for Optimizing IP over Ethernet Naming System
www.ijcsi.org 72 A Framework for Optimizing IP over Ethernet Naming System Waleed Kh. Alzubaidi 1, Dr. Longzheng Cai 2 and Shaymaa A. Alyawer 3 1 Information Technology Department University of Tun Abdul
More informationSimulation Analysis of Linear Programming Based Load Balancing Algorithms for Routers
Simulation Analysis of Linear Programming Based Load Balancing Algorithms for Routers School of Computer Science & IT Devi Ahilya University, Indore ABSTRACT The work in this paper is the extension of
More informationApplications and Analysis Tools for Monitoring Dynamics on the Grid
1 Applications and Analysis Tools for Monitoring Dynamics on the Grid Phil Overholt Program Manager Office of Electricity Delivery and Energy Reliability (OE) Energy Infrastructure Modeling and Analysis
More informationReliable Communication using Packet Coding for Underwater Acoustic Channels
Reliable Communication using Packet Coding for Underwater Acoustic Channels Rameez Ahmed and Milica Stojanovic Northeastern University, Boston, MA 02115, USA Email: rarameez@ece.neu.edu, millitsa@ece.neu.edu
More informationAlarming and Operations of openpdc at ISO-NE
A U G 1 4, 2 0 1 3 A T L A N T A, G A Alarming and Operations of openpdc at ISO-NE Qiang Frankie Zhang, Patrick Pentz (Developer) Outline Project Overview Project Status Development Challenges Discussion
More information