Revealing Temporal Features of Attacks Against Smart Grid

Size: px
Start display at page:

Download "Revealing Temporal Features of Attacks Against Smart Grid"

Transcription

1 Revealing Temporal Features of Attacks Against Smart Grid Presenter: Yihai Zhu Authors: Jun Yan, Yihai Zhu, Yan Sun, Haibo He Dept. of Electrical, Computer & Biomedical Engineering University of Rhode Island

2 Outline Security Issues in Smart Grid Modeling and Formulation Temporal Features Revealed 2

3 Outline Security Issues in Smart Grid Modeling and Formulation Temporal Features Revealed 3

4 Challenges in Smart Grid Security Direct attacks - Hacking into power system control center - Bring down transmission facilities Data attacks - Intercept or manipulate data streams o False data injection on PMU/AMI Privacy attacks - Consumer data theft 4

5 Motivation for comprehensive analyses Identifying critical components Assessing the process of cascading propagation Evaluating the impact of malicious attacks from, - Spatial regions - Electrical statistics - Temporal process 5

6 Outline Security Issues in Smart Grid Modeling and Formulation Temporal Features Revealed 6

7 The simulation model Start: End: Fig.2: The flowchart of the cascading simulator 7

8 8 Modeling of Attack and Failure Attack and Load redistribution A victim (or a failed component) will be removed. Disconnection will lead to an immediate local impact o Load of a failed node will be added proportionally to all its alive neighbors ) ( ) ( ) ( ) ( ) ( v L u L w L w L v N u =

9 Overloading Modeling of Attack and Failure - If the nodal load L(t) > its capacity C = T*L 0 Conceptual measurement of time - Use round as a unit of time, the duration between two consecutive failures. [1] M. Eppstein and P. Hines, A Random Chemistry algorithm for identifying multiple contingencies that initiate cascading failure, IEEE Transactions on Power Systems 9

10 Modeling of Attack and Failure Accumulation of overloading and node failure - Accumulative function of rounds to identify a fatal overload Accumulation function of overloading d( n) = n k = 0 Node failure d(n) >η ( L k T * L0) Eta: overloaded by 50% for D rounds [1], where D is time-delay. [1] M. Eppstein and P. Hines, A Random Chemistry algorithm for identifying multiple contingencies that initiate cascading failure, IEEE Transactions on Power Systems 10

11 Identifiable Temporal Features 11

12 Identifiable Temporal Features 3. Buffer period The interval of time between leaps Helpful when the defense strength of power grids, before which actions should be taken to avoid further blackouts. 12

13 Outline Security Issues in Smart Grid Modeling and Formulation Temporal Features Revealed 13

14 1. Benchmark power grid o Bay area (510 nodes) Experiment Setup 2. Test parameters o T = 1.1 o D = 0, 1,, 5 14

15 Temporal Features Revealed Finding nodes (substations) of interest *With D = 0 and T =

16 Case study: Temporal Features Revealed Fig.3: The change of PoF with time in the attack of Node 57 16

17 Temporal Features Revealed 17

18 Temporal Features Revealed Conclusions - Different temporal patterns of failure propagation - Impact of time delay D Potential utilization of the features - Critical moments to prevent or intervene cascading failure - Better design of redistribution policy 18

19 Acknowledgement We gratefully acknowledge the support from National Science Foundation (NSF) under Grant # CNS For more information, please contact Prof. Haibo He at he@ele.uri.edu 19

20 References 1. M. Eppstein and P. Hines, A Random Chemistry algorithm for identifying multiple contingencies that initiate cascading failure, IEEE Transactions on Power Systems, Vol. 27, No. 3, August J. Yan, Y. Yang, W. Wang, H. He, Y. Sun, An integrated visualization approach for smart grid attacks, IEEE Intelligent Control and Information Processing (ICICIP), Y. Zhu, Y. Sun and H. He, Load Distribution Vector Based Attack Strategies against Power Grid Systems, in IEEE Global Telecommunications Conference (GLOBECOM 2012 ), Dec W. Wang, Q. Cai, Y. Sun, and H. He, Risk-aware attacks and catastrophic cascading failures in U.S. power grid, in IEEE Global Telecommunications Conference (GLOBECOM 2011)Dec

21 Thank you! Questions? 21

Risk-Aware Vulnerability Analysis of Electric Grids from Attacker s Perspective

Risk-Aware Vulnerability Analysis of Electric Grids from Attacker s Perspective Risk-Aware Vulnerability Analysis of Electric Grids Presenter: Yihai Zhu Authors: Yihai Zhu, Jun Yan Yan Sun, Haibo He Dept. of Electrical, Computer & Biomedical Engineering University of Rhode Island

More information

The Sequential Attack against Power Grid Networks

The Sequential Attack against Power Grid Networks The Sequential Attack against Power Grid Networks Yihai Zhu, Jun Yan, Yufei Tang, Yan (Lindsay) Sun, and Haibo He Department of Electrical, Computer, and Biomedical Engineering, University of Rhode Island,

More information

The Sequential Attack against Power Grid Networks. Associate Professor at University of Rhode Island

The Sequential Attack against Power Grid Networks. Associate Professor at University of Rhode Island The Sequential Attack against Power Grid Networks Yihai i Zhu, Jun Yan, YfiT Yufei Tang, Yan (Lindsay) Sun, Haibo Hib He Presenter: Yan (Lindsay) Sun Associate Professor at University of Rhode Island Email:

More information

Risk-Aware Vulnerability Analysis of Electric Grids from Attacker s Perspective

Risk-Aware Vulnerability Analysis of Electric Grids from Attacker s Perspective Risk-Aware Vulnerability Analysis of Electric Grids from Attacker s Perspective Yihai Zhu, Jun Yan, Yan (Lindsay) Sun, and Haibo He Department of Electrical, Computer, and Biomedical Engineering, University

More information

Load Distribution Vector Based Attack Strategies against Power Grid Systems

Load Distribution Vector Based Attack Strategies against Power Grid Systems Load Distribution Vector Based Attack Strategies against Power Grid Systems Yihai Zhu, Yan (Lindsay) Sun, and Haibo He Department of Electrical, Computer, and Biomedical Engineering, University of Rhode

More information

ELECTRIC grids have been developing over decades

ELECTRIC grids have been developing over decades 2340 IEEE TRANSACTIONS ON INFORATION FORENSICS AND SECURITY, VOL. 9, NO. 12, DECEBER 2014 Resilience Analysis of Power Grids Under the Sequential Attack Yihai Zhu, Student ember, IEEE, Jun Yan, Student

More information

MARCH 2013 VOLUME 8 NUMBER 3 ITIFA6 (ISSN ) APRIL 2013 VOLUME 8 NUMBER 4

MARCH 2013 VOLUME 8 NUMBER 3 ITIFA6 (ISSN ) APRIL 2013 VOLUME 8 NUMBER 4 MARCH 2013 VOLUME 8 NUMBER 3 ITIFA6 (ISSN 1556-6013) APRIL 2013 VOLUME 8 NUMBER 4 Texas Power grid shown in ArcMap 10.0 with substations and transmission lines (top) and its clustering result with the

More information

THE MODERN complex network systems, including communication

THE MODERN complex network systems, including communication IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 3, MARCH 2014 451 Integrated Security Analysis on Cascading Failure in Complex Networks Jun Yan, Student Member, IEEE, HaiboHe,Senior

More information

Failure Diagnosis and Cyber Intrusion Detection in Transmission Protection System Assets Using Synchrophasor Data

Failure Diagnosis and Cyber Intrusion Detection in Transmission Protection System Assets Using Synchrophasor Data Failure Diagnosis and Cyber Intrusion Detection in Transmission Protection System Assets Using Synchrophasor Data Anurag Srivastava, Bo Cui, P. Banerjee Washington State University NASPI March 2017 Outline

More information

Revealing Cascading Failure Vulnerability in Power Grids using Risk-Graph

Revealing Cascading Failure Vulnerability in Power Grids using Risk-Graph Revealing Cascading Failure Vulnerability in Power Grids using Risk-Graph Yihai Zhu, Student ember, IEEE, Jun Yan, Student ember, IEEE, Yan Sun, ember, IEEE, and Haibo He, Senior ember, IEEE, Abstract

More information

COMPUTER NETWORK SECURITY

COMPUTER NETWORK SECURITY COMPUTER NETWORK SECURITY Prof. Dr. Hasan Hüseyin BALIK (1 st Week) Outline Course Information and Policies Course Syllabus 1. Overview Course Information Instructor: Prof. Dr. Hasan H. BALIK, balik@yildiz.edu.tr,

More information

USE CASE 14 CONTROLLED ISLANDING

USE CASE 14 CONTROLLED ISLANDING I USE CASE 14 CONTROLLED ISLANDING Use Case Title Centralized application separates grid into islands to prevent blackout Use Case Summary Controlled islanding is a method that can significantly improve

More information

Can an influence graph driven by outage data determine transmission line upgrades that mitigate cascading blackouts?

Can an influence graph driven by outage data determine transmission line upgrades that mitigate cascading blackouts? Preprint; IEEE International Conference Probabilistic Methods Applied to Power Systems (PMAPS), June 2018, Boise ID USA Can an influence graph driven by outage data determine transmission line upgrades

More information

ACASCADING failure of the transmission network of a

ACASCADING failure of the transmission network of a IEEE TRANSACTIONS ON SMART GRID, VOL. XX, NO. X, FEBRUARY 2018 1 Control of Communications-Dependent Cascading Failures in Power Grids Jose Cordova-Garcia, Member, IEEE, Xin Wang, Member, IEEE, Dong-Liang

More information

An efficient and practical solution to secure password-authenticated scheme using smart card

An efficient and practical solution to secure password-authenticated scheme using smart card An efficient and practical solution to secure password-authenticated scheme using smart card R. Deepa 1, R. Prabhu M.Tech 2, PG Research scholor 1, Head of the Department 2 Dept.of Information Technology,

More information

A Statistical Method for Synthetic Power Grid Generation based on the U.S. Western Interconnection

A Statistical Method for Synthetic Power Grid Generation based on the U.S. Western Interconnection A Statistical Method for Synthetic Power Grid Generation based on the U.S. Western Interconnection Saleh Soltan, Gil Zussman Columbia University New York, NY Failures in Power Grids One of the most essential

More information

A Survey on False Data Injection Attack and Detection in Smart Grid

A Survey on False Data Injection Attack and Detection in Smart Grid A Survey on False Data Injection Attack and Detection in Smart Grid Presenter: Yessica Saez Submitted in Partial Fulfillment of the Course Requirements for ECEN 689: Cyber Security of the Smart Grid Instructor:

More information

Cyber Security of Power Grids

Cyber Security of Power Grids Cyber Security of Power Grids Chen-Ching Liu Boeing Distinguished Professor Director, Energy Systems Innovation Center Washington State University In Collaboration with M. Govindarasu, Iowa State University

More information

Simulating Smart Grid Cascade Failure Mitigation

Simulating Smart Grid Cascade Failure Mitigation Simulating Smart Grid Cascade Failure Mitigation Claudia Whitten Department of Computer Science California Institute of Technology Pasadena, CA 91126 whitten@caltech.edu ABSTRACT Smart grid power systems

More information

Optimized Packet Filtering Honeypot with Intrusion Detection System for WLAN

Optimized Packet Filtering Honeypot with Intrusion Detection System for WLAN Amandeep Singh, Pankush Singla, Navdeep Kaur Khiva 101 Optimized Packet Filtering Honeypot with Intrusion Detection System for WLAN Amandeep Singh Pankush Sukhpreet Singla Singh Navdeep Kaur Khiva Second

More information

Unpredictable Software-based Attestation Solution for Node Compromise Detection in Mobile WSN

Unpredictable Software-based Attestation Solution for Node Compromise Detection in Mobile WSN Unpredictable Software-based Attestation Solution for Node Compromise Detection in Mobile WSN Xinyu Jin, Rodrigo Jose Salmeron, Pasd Putthapipat, Niki Pissinou, Deng Pan, Jeffrey Fan Florida International

More information

Cyber Security and Privacy Issues in Smart Grids

Cyber Security and Privacy Issues in Smart Grids Cyber Security and Privacy Issues in Smart Grids Acknowledgement: Slides by Hongwei Li from Univ. of Waterloo References Main Reference Liu, J. and Xiao, Y. and Li, S. and Liang, W. and Chen, C. Cyber

More information

Critical Resilient Interdependent Infrastructure Systems and Processes

Critical Resilient Interdependent Infrastructure Systems and Processes TeleNeT Program Critical Resilient Interdependent Infrastructure Systems and Processes David Tipper, Professor Graduate Telecommunications and Networking Program School of Computing and Information University

More information

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI

More information

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8 Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 8 System Vulnerabilities and Denial of Service Attacks System Vulnerabilities and

More information

Securing the Smart Grid. Understanding the BIG Picture 11/1/2011. Proprietary Information of Corporate Risk Solutions, Inc. 1.

Securing the Smart Grid. Understanding the BIG Picture 11/1/2011. Proprietary Information of Corporate Risk Solutions, Inc. 1. Securing the Smart Grid Understanding the BIG Picture The Power Grid The electric power system is the most capital-intensive infrastructure in North America. The system is undergoing tremendous change

More information

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review ACS-3921-001/4921-001 Computer Security And Privacy Fall 2018 Mid-Term Review ACS-3921/4921-001 Slides Used In The Course A note on the use of these slides: These slides has been adopted and/or modified

More information

Location Spoofing Attack and Its Countermeasures in Database-Driven Cognitive Radio Networks

Location Spoofing Attack and Its Countermeasures in Database-Driven Cognitive Radio Networks Location Spoofing Attack and Its Countermeasures in Database-Driven Cognitive Radio Networks Kexiong (Curtis) Zeng, Sreeraksha Kondaji Ramesh, Yaling Yang. Outline Background and Motivation Our Works Overview

More information

An Analysis of Onion-Based Anonymous Routing in Delay Tolerant Networks

An Analysis of Onion-Based Anonymous Routing in Delay Tolerant Networks An Analysis of Onion-Based Anonymous Routing in Delay Tolerant Networks Kazuya Sakai, Tokyo Metropolitan University Min-Te Sun, National Central University Wei-Shinn Ku, Auburn University Jie Wu, Temple

More information

Advanced Security Solution in IPv6

Advanced Security Solution in IPv6 Advanced Security Solution in IPv6 Vahid Heydari University of Alabama in Huntsville vahid.heydari@uah.edu Outline IPv6, IPsec, and VPN Remote attacks and zero-day vulnerability Moving target defense Related

More information

Temporal Correlations between Spam and Phishing Websites

Temporal Correlations between Spam and Phishing Websites Temporal Correlations between Spam and Phishing Websites, Richard Clayton and Henry Stern Center for Research on Computation and Society Harvard University USENIX LEET 09 Boston, MA April 21, 2009 Outline

More information

STLAC: A Spatial and Temporal Locality-Aware Cache and Networkon-Chip

STLAC: A Spatial and Temporal Locality-Aware Cache and Networkon-Chip STLAC: A Spatial and Temporal Locality-Aware Cache and Networkon-Chip Codesign for Tiled Manycore Systems Mingyu Wang and Zhaolin Li Institute of Microelectronics, Tsinghua University, Beijing 100084,

More information

The Challenges of Risk Assessment for Smart Grid

The Challenges of Risk Assessment for Smart Grid The Challenges of Risk Assessment for Smart Grid Lucie Langer and Paul Smith firstname.lastname@ait.ac.at AIT Austrian Institute of Technology ComForEn Workshop Monday 29 th September, 2014 Risk Assessment:

More information

Next Generation Monitoring and Control Functions for Future Control Centers

Next Generation Monitoring and Control Functions for Future Control Centers 1 Next Generation Monitoring and Control Functions for Future Control Centers Fangxing Li, Senior Member, IEEE, Pei Zhang, Senior Member, IEEE, and Navin Bhatt, Senior Member, IEEE Abstract This paper

More information

Energy Management Issue in Ad Hoc Networks

Energy Management Issue in Ad Hoc Networks Wireless Ad Hoc and Sensor Networks - Energy Management Outline Energy Management Issue in ad hoc networks WS 2010/2011 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management

More information

Cybersecurity Test and Evaluation Facilities at Texas A&M

Cybersecurity Test and Evaluation Facilities at Texas A&M Cybersecurity Test and Evaluation Facilities at Texas A&M Dr. Karen L. Butler-Purry, Bo Chen Department of Electrical and Computer Engineering Nishant Pattanaik Department of Computer Science Dr. Ana Goulart

More information

GCSE Computer Science for OCR Overview Scheme of Work

GCSE Computer Science for OCR Overview Scheme of Work GCSE Computer Science for OCR Overview Scheme of Work The following assumes a two-year model. During the course, the final challenges can be used for practice in computational thinking, algorithm design

More information

Energy Management Issue in Ad Hoc Networks

Energy Management Issue in Ad Hoc Networks Wireless Ad Hoc and Sensor Networks (Energy Management) Outline Energy Management Issue in ad hoc networks WS 2009/2010 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management

More information

PowerCyber: CPS Security Testbed for Power Grid

PowerCyber: CPS Security Testbed for Power Grid Learn invent impact PowerCyber: CPS Security Testbed for Power Grid REMOTE ACCESS INTERFACE USER GUIDE Version 1.0 Funded jointly by: NSF Award #CNS 1446831 Compiled by: Sujatha K Swamy, Graduate Research

More information

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables and related problems. But with these

More information

Concept White Paper. Concepts for Proposed Content of Eventual Standard(s) for Project : Real-Time Monitoring and Analysis Capabilities

Concept White Paper. Concepts for Proposed Content of Eventual Standard(s) for Project : Real-Time Monitoring and Analysis Capabilities Concept White Paper Concepts for Proposed Content of Eventual Standard(s) for Project 2009-02: Real-Time Monitoring and Analysis Capabilities Real-time Monitoring and Analysis Capabilities Standard Drafting

More information

On Bounded Rationality in Cyber-Physical Systems Security: Game-Theoretic Analysis with Application to Smart Grid Protection

On Bounded Rationality in Cyber-Physical Systems Security: Game-Theoretic Analysis with Application to Smart Grid Protection On Bounded Rationality in Cyber-Physical Systems Security: Game-Theoretic Analysis with Application to Smart Grid Protection CPSR-SG 2016 CPS Week 2016 April 12, 2016 Vienna, Austria Outline CPS Security

More information

SMALL WORLD NETWORK. -Naveen Teja Vempati -Ravi Teja Mitta

SMALL WORLD NETWORK. -Naveen Teja Vempati -Ravi Teja Mitta SMALL WORLD NETWORK -Naveen Teja Vempati -Ravi Teja Mitta INTRODUCTION Every person in this world is some way or other connected by some means is the idea behind evolution of small world phenomenon. Later

More information

Distributed Internet-Based Load Altering Attacks Against Smart Power Grids Authors: A.-H. Mohsenian-Rad and A. Leon-Garcia

Distributed Internet-Based Load Altering Attacks Against Smart Power Grids Authors: A.-H. Mohsenian-Rad and A. Leon-Garcia Distributed Internet-Based Load Altering Attacks Against Smart Power Grids Authors: A.-H. Mohsenian-Rad and A. Leon-Garcia Presenter: Harsha Patibandla Submitted in Partial Fulfillment of the Course Requirements

More information

Resilience of Infrastructure Networks

Resilience of Infrastructure Networks Resilience of Infrastructure Networks Moshe Zukerman City University of Hong Kong Collaborators: D. J. Hill (HKU) G. Wang (HKUST) J. Yang (HKU) F. Cucker (CityU) D. M. Chiu (CUHK) Y. Wang (CityU) X. Yuan

More information

Distributed Agent-Based Intrusion Detection for the Smart Grid

Distributed Agent-Based Intrusion Detection for the Smart Grid Distributed Agent-Based Intrusion Detection for the Smart Grid Presenter: Esther M. Amullen January 19, 2018 Introduction The smart-grid can be viewed as a Large-Scale Networked Control System (LSNCS).

More information

Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1]

Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1] Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1] Presenter: Yongcheng (Jeremy) Li PhD student, School of Electronic and Information Engineering, Soochow University, China

More information

Web Security Vulnerabilities: Challenges and Solutions

Web Security Vulnerabilities: Challenges and Solutions Web Security Vulnerabilities: Challenges and Solutions A Tutorial Proposal for ACM SAC 2018 by Dr. Hossain Shahriar Department of Information Technology Kennesaw State University Kennesaw, GA 30144, USA

More information

HASTINGS HIGH SCHOOL

HASTINGS HIGH SCHOOL HASTINGS HIGH SCHOOL EXAMINATION GUIDE 2017-19 Subject Course code Website address Provisional examination dates Computer Science Computer Science (9-1) - J276 https://www.ocr.org.uk/qualifications/gcse/computerscience-j276-from-2016/

More information

Computing 1: Computer Systems

Computing 1: Computer Systems U1 U2 U3 1 2 3 Computing 1: Computer Systems G: I know how to create strong passwords G: I know how to stay safe online and how to alert an adult if I am worried about anything G: I can list a range of

More information

PhD Thesis Defense Performance Improvements in Software-defined and Virtualized Wireless Networks

PhD Thesis Defense Performance Improvements in Software-defined and Virtualized Wireless Networks PhD Thesis Defense Performance Improvements in Software-defined and Virtualized Wireless Networks Chengchao Liang Supervisor: Prof. F. Richard Yu Department of Systems and Computer Engineering Carleton

More information

Vulnerability of Energy and Telecom Infrastructures to Extreme Weather Events A Risk Assessment Tool

Vulnerability of Energy and Telecom Infrastructures to Extreme Weather Events A Risk Assessment Tool Vulnerability of Energy and Telecom Infrastructures to Extreme Weather Events A Risk Assessment Tool Xavier Clotet, Milenko Halat Aplicaciones en Informática Avanzada S.L., Spain. Friday 24 March 2017

More information

Cybersecurity for Department of Defense Microgrids: An Army Perspective

Cybersecurity for Department of Defense Microgrids: An Army Perspective Cybersecurity for Department of Defense Microgrids: An Army Perspective Lori Ross O Neil with Cliff Glantz, David McKinnon, Fleur DePeralta, Mark Watson, Paul Boyd, Emily Barrett and Darlene Thorsen Pacific

More information

Intelligent Three-dimensional Layout Design of Video Cameras in Substations

Intelligent Three-dimensional Layout Design of Video Cameras in Substations 6th International Conference on Electronic, Mechanical, Information and Management (EMIM 2016) Intelligent Three-dimensional Layout Design of Video Cameras in Substations Zhengwei Chang1, a * and Xiaona

More information

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION Performance Analysis of Network Parameters, Throughput Optimization Using Joint Routing, XOR Routing and Medium Access Control in Wireless Multihop Network 1 Dr. Anuradha M. S., 2 Ms. Anjali kulkarni 1

More information

WIRELESS sensor networks have received a lot of attention

WIRELESS sensor networks have received a lot of attention IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 2, FEBRUARY 2006 395 Secure and Resilient Clock Synchronization in Wireless Sensor Networks Kun Sun, Peng Ning, Member, IEEE, and Cliff Wang,

More information

Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids

Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids Hui Lin, Adam Slagell, Zbigniew Kalbarczyk, Peter W. Sauer, and Ravishankar K. Iyer Department of Electrical

More information

SECURE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR NETWORKS IN THE PRESENCE OF SECURITY THREATS

SECURE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR NETWORKS IN THE PRESENCE OF SECURITY THREATS SECURE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR NETWORKS IN THE PRESENCE OF SECURITY THREATS G.Gomathi 1, C.Yalini 2, T.K.Revathi. 3, 1 M.E Student, Kongunadu College of Engineering, Trichy 2, 3

More information

Malicious Data Attacks on Smart Grid State Estimation: Attack Strategies and Countermeasures

Malicious Data Attacks on Smart Grid State Estimation: Attack Strategies and Countermeasures Malicious Data Attacks on Smart Grid State Estimation: Attack Strategies and Countermeasures Authors: O. Kosut, J. Liyan, R. J. Thomas and L. Tong Presenter: Daehyun. Choi Submitted in Partial Fulfillment

More information

arxiv: v4 [physics.soc-ph] 20 Sep 2010

arxiv: v4 [physics.soc-ph] 20 Sep 2010 Do topological models provide good information about electricity infrastructure vulnerability? Paul Hines, 1, a) Eduardo Cotilla-Sanchez, 1, b) 2, c) and Seth Blumsack 1) School of Engineering, University

More information

Application of Monitoring Standards for enhancing Energy System Security

Application of Monitoring Standards for enhancing Energy System Security Application of Monitoring Standards for enhancing Energy System Security G. DONDOSSOLA*, R. TERRUGGIA*, P. WYLACH*, G. PUGNI**, F. BELLIO*** RSE SpA*, Enel SpA**, Enel Produzione SpA*** Italy About RSE

More information

Influence of Route Choice Behavior on Vulnerability to Cascading Failure in Transportation Networks

Influence of Route Choice Behavior on Vulnerability to Cascading Failure in Transportation Networks Influence of Route Choice Behavior on Vulnerability to Cascading Failure in Transportation Networks 〇 Kashin Sugishita, Yasuo Asakura Ph.D Candidate Department of Civil and Environmental Engineering Tokyo

More information

Study on data encryption technology in network information security. Jianliang Meng, Tao Wu a

Study on data encryption technology in network information security. Jianliang Meng, Tao Wu a nd International Workshop on Materials Engineering and Computer Sciences (IWMECS 05) Study on data encryption technology in network information security Jianliang Meng, Tao Wu a School of North China Electric

More information

MIX Network for Location Privacy First Draft

MIX Network for Location Privacy First Draft 2G1319 Communication Systems Design Department of Microelectronics and Information Technology, KTH csd2002-ipv6privacy@2g1319.ssvl.kth.se MIX Network for Location Privacy First Draft O. Sirovatcenko April

More information

Quarter 3, 2007 (2007Q3) Generation Deliverability Assessment Study Plan

Quarter 3, 2007 (2007Q3) Generation Deliverability Assessment Study Plan Quarter 3, (Q3) Generation Deliverability Assessment Study Plan Background and Purpose of Study Phases I & II Generation and Import Deliverability Studies were completed that established the deliverability

More information

A Distributed k-secure Sum Protocol for Secure Multi-Party Computations

A Distributed k-secure Sum Protocol for Secure Multi-Party Computations HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/ A Distributed k-secure Sum Protocol for Secure Multi-Party Computations Rashid Sheikh, Beerendra Kumar, Durgesh Kumar Mishra 68 Abstract Secure sum computation

More information

Secure coding practices

Secure coding practices Secure coding practices www.infosys.com/finacle Universal Banking Solution Systems Integration Consulting Business Process Outsourcing Secure coding practices Writing good code is an art but equally important

More information

DoD Energy Resilience

DoD Energy Resilience Energy Resilience to Achieve Mission Assurance Working Together to Achieve Energy Resilience DoD Energy Resilience Ariel S. Castillo, PhD OASD(EI&E), Installation Energy August 9, 2016 DISTRIBUTION STATEMENT

More information

Advanced Security Tester Course Outline

Advanced Security Tester Course Outline Advanced Security Tester Course Outline General Description This course provides test engineers with advanced skills in security test analysis, design, and execution. In a hands-on, interactive fashion,

More information

Dmitry Ishchenko/Reynaldo Nuqui/Steve Kunsman, September 21, 2016 Collaborative Defense of Transmission and Distribution Protection & Control Devices

Dmitry Ishchenko/Reynaldo Nuqui/Steve Kunsman, September 21, 2016 Collaborative Defense of Transmission and Distribution Protection & Control Devices Dmitry Ishchenko/Reynaldo Nuqui/Steve Kunsman, September 21, 2016 Collaborative Defense of Transmission and Distribution Protection & Control Devices Against Cyber Attacks (CODEF) Cyber Security of the

More information

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS Saulius Grusnys, Ingrida Lagzdinyte Kaunas University of Technology, Department of Computer Networks, Studentu 50,

More information

Standard Course Outline IS 656 Information Systems Security and Assurance

Standard Course Outline IS 656 Information Systems Security and Assurance Standard Course Outline IS 656 Information Systems Security and Assurance I. General Information s Course number: IS 656 s Title: Information Systems Security and Assurance s Units: 3 s Prerequisites:

More information

Summary of Cyber Security Issues in the Electric Power Sector

Summary of Cyber Security Issues in the Electric Power Sector Summary of Cyber Security Issues in the Electric Power Sector Jeff Dagle, PE Chief Electrical Engineer Energy Technology Development Group Pacific Northwest National Laboratory (509) 375-3629 jeff.dagle@pnl.gov

More information

EFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV)

EFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV) Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,

More information

Discussion on measuring electricity security of supply and potential indicators of Smart Grids

Discussion on measuring electricity security of supply and potential indicators of Smart Grids Discussion on measuring electricity security of supply and potential indicators of Smart Grids Riccardo Vailati Co-chair CEER Electricity Quality of Supply Task Force SECURE stakeholder workshop, Milan,

More information

SAFEGUARD THE AUTOMATIC GENERATION CONTROL USING GAME THEORY TECHNIQUE

SAFEGUARD THE AUTOMATIC GENERATION CONTROL USING GAME THEORY TECHNIQUE SAFEGUARD THE AUTOMATIC GENERATION CONTROL USING GAME THEORY TECHNIQUE C.Kowsalya* 1 and M.Sangeetha* 2 1 PG student, Department of Electrical and Electronics Engineering, The Kavery Engineering College,

More information

Interfacing Power System and ICT Simulators: Challenges, State-of-the-Art and Study Cases

Interfacing Power System and ICT Simulators: Challenges, State-of-the-Art and Study Cases IEEE Power & Energy Society eneral Meeting 2014 National Harbor, MD, USA, July 31th, 2014 IEEE Task Force on Interfacing Techniques for Simulation Tools Interfacing Power System and ICT Simulators: Contributors:

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Advisors and Special Event Domestic Incident Tracker Overview Federal

More information

Smart Grid Operations - Clemson University Research, Education and Innovation-Ecosystem Opportunities

Smart Grid Operations - Clemson University Research, Education and Innovation-Ecosystem Opportunities Smart Grid Operations - Clemson University Research, Education and Innovation-Ecosystem Opportunities G. Kumar Venayagamoorthy, PhD, FIET, FSAIEE Duke Energy Distinguished Professor & Director & Founder

More information

3rd International Conference on Mechanical Engineering and Intelligent Systems (ICMEIS 2015)

3rd International Conference on Mechanical Engineering and Intelligent Systems (ICMEIS 2015) 3rd International Conference on Mechanical Engineering and Intelligent Systems (ICMEIS 2015) Development Of SSP510 Frequency Voltage Emergency Control Device Qinghua Si 1,2,a *, Zhukun Li 1,2, Yunsong

More information

Unsupervised Moving Object Edge Segmentation Using Dual-Tree Complex Wavelet Transform

Unsupervised Moving Object Edge Segmentation Using Dual-Tree Complex Wavelet Transform International Journal of Natural and Engineering Sciences 2 (3): 69-74, 2008 ISSN: 307-49, www.nobelonline.net Unsupervised Moving Object Edge Segmentation Using Dual-Tree Complex Wavelet Transform Turgay

More information

Modelling Cascading Failure in Power Networks

Modelling Cascading Failure in Power Networks Modelling Cascading Failure in Power Networks Sydney, July 2017 Image: IEEEXplore C. K. Michael Tse WSCC System Blackout in 1996 July 1996 WSCC: Western System Coordinating Council, now called WESC, which

More information

Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks

Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks 1 Chiranjeevi Rampilla, 2 Pallikonda Anil Kumar, 1 Student, DEPT.OF CSE, PVPSIT, KANURU, VIJAYAWADA. 2 Asst.Professor, DEPT.OF

More information

Network Access Control and VoIP. Ben Hostetler Senior Information Security Advisor

Network Access Control and VoIP. Ben Hostetler Senior Information Security Advisor Network Access Control and VoIP Ben Hostetler Senior Information Security Advisor Objectives/Discussion Points Network Access Control Terms & Definitions Certificate Based 802.1X MAC Authentication Bypass

More information

LESSON 12: WI FI NETWORKS SECURITY

LESSON 12: WI FI NETWORKS SECURITY LESSON 12: WI FI NETWORKS SECURITY Raúl Siles raul@taddong.com Founder and Security Analyst at Taddong Introduction to Wi Fi Network Security Wireless networks or Wi Fi networks IEEE 802.11 Standards Information

More information

Chapter 8: Smart Grid Communication and Networking

Chapter 8: Smart Grid Communication and Networking Chapter 8: Smart Grid Communication and Networking Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 1. The framework of smart grid 2. Network

More information

SIMULATION BASED ANALYSIS OF THE INTERACTION OF END-TO-END AND HOP-BY-HOP FLOW CONTROL SCHEMES IN PACKET SWITCHING LANS

SIMULATION BASED ANALYSIS OF THE INTERACTION OF END-TO-END AND HOP-BY-HOP FLOW CONTROL SCHEMES IN PACKET SWITCHING LANS SIMULATION BASED ANALYSIS OF THE INTERACTION OF END-TO-END AND HOP-BY-HOP FLOW CONTROL SCHEMES IN PACKET SWITCHING LANS J Wechta, A Eberlein, F Halsall and M Spratt Abstract To meet the networking requirements

More information

ChitChat: An Effective Message Delivery Method in Sparse Pocket-Switched Networks

ChitChat: An Effective Message Delivery Method in Sparse Pocket-Switched Networks ChitChat: An Effective Message Delivery Method in Sparse Pocket-Switched Networks Douglas McGeehan Dan Lin Sanjay Madria Department of Computer Science Missouri University of Science and Technology Rolla,

More information

KPI Dictionary ABRIDGED SAMPLE. A KPI Reference Guide for Use in Performance Management. Information Technology (IT)

KPI Dictionary ABRIDGED SAMPLE. A KPI Reference Guide for Use in Performance Management. Information Technology (IT) KPI Dictionary Information Technology (IT) A KPI Reference Guide for Use in Performance Management ABRIDGED SAMPLE Do you need a customized KPI Dictionary for your organization? Contact us - we're ready

More information

Real Time Monitoring of

Real Time Monitoring of Real Time Monitoring of Cascading Events Mladen Kezunovic Nan Zhang, Hongbiao Song Texas A&M University Tele-Seminar, March 28, 2006 Project Reports (S-19) M. Kezunovic, H. Song and N. Zhang, Detection,

More information

Lecture 02 Chapter 10: Circuit Switching and Packet Switching

Lecture 02 Chapter 10: Circuit Switching and Packet Switching NET 456 High Speed Networks Lecture 02 Chapter 10: Circuit Switching and Packet Switching Dr. Anis Koubaa Reformatted slides from textbook Data and Computer Communications, Ninth Edition by William Stallings,

More information

DoD Energy Resilience

DoD Energy Resilience Energy Resilience to Achieve Mission Assurance Energy Resilience Policy DoD Energy Resilience Ariel S. Castillo, PhD OASD(EI&E), Installation Energy August 9, 2016 DISTRIBUTION STATEMENT A. Approved for

More information

False Analog Data Injection Attack Towards Topology Errors: Formulation and Feasibility Analysis

False Analog Data Injection Attack Towards Topology Errors: Formulation and Feasibility Analysis False Analog Data Injection Attack Towards Topology Errors: Formulation and Feasibility Analysis Yuqi Zhou, Jorge Cisneros-Saldana, Le Xie Department of Electrical and Computer Engineering Texas A&M University

More information

Early detection of Crossfire attacks using deep learning

Early detection of Crossfire attacks using deep learning Early detection of Crossfire attacks using deep learning Saurabh Misra, Mengxuan Tan, Mostafa Rezazad, Ngai-Man Cheung Singapore University of Technology and Design Content The Crossfire Attack A brief

More information

System Models. 2.1 Introduction 2.2 Architectural Models 2.3 Fundamental Models. Nicola Dragoni Embedded Systems Engineering DTU Informatics

System Models. 2.1 Introduction 2.2 Architectural Models 2.3 Fundamental Models. Nicola Dragoni Embedded Systems Engineering DTU Informatics System Models Nicola Dragoni Embedded Systems Engineering DTU Informatics 2.1 Introduction 2.2 Architectural Models 2.3 Fundamental Models Architectural vs Fundamental Models Systems that are intended

More information

A Framework for Optimizing IP over Ethernet Naming System

A Framework for Optimizing IP over Ethernet Naming System www.ijcsi.org 72 A Framework for Optimizing IP over Ethernet Naming System Waleed Kh. Alzubaidi 1, Dr. Longzheng Cai 2 and Shaymaa A. Alyawer 3 1 Information Technology Department University of Tun Abdul

More information

Simulation Analysis of Linear Programming Based Load Balancing Algorithms for Routers

Simulation Analysis of Linear Programming Based Load Balancing Algorithms for Routers Simulation Analysis of Linear Programming Based Load Balancing Algorithms for Routers School of Computer Science & IT Devi Ahilya University, Indore ABSTRACT The work in this paper is the extension of

More information

Applications and Analysis Tools for Monitoring Dynamics on the Grid

Applications and Analysis Tools for Monitoring Dynamics on the Grid 1 Applications and Analysis Tools for Monitoring Dynamics on the Grid Phil Overholt Program Manager Office of Electricity Delivery and Energy Reliability (OE) Energy Infrastructure Modeling and Analysis

More information

Reliable Communication using Packet Coding for Underwater Acoustic Channels

Reliable Communication using Packet Coding for Underwater Acoustic Channels Reliable Communication using Packet Coding for Underwater Acoustic Channels Rameez Ahmed and Milica Stojanovic Northeastern University, Boston, MA 02115, USA Email: rarameez@ece.neu.edu, millitsa@ece.neu.edu

More information

Alarming and Operations of openpdc at ISO-NE

Alarming and Operations of openpdc at ISO-NE A U G 1 4, 2 0 1 3 A T L A N T A, G A Alarming and Operations of openpdc at ISO-NE Qiang Frankie Zhang, Patrick Pentz (Developer) Outline Project Overview Project Status Development Challenges Discussion

More information