Proceedings ArticleDOI
Intrusion Detection for Advanced Metering Infrastructures: Requirements and Architectural Directions
Robin Berthier,William H. Sanders,Himanshu Khurana +2 more
- pp 350-355
Reads0
Chats0
TLDR
The practical needs for monitoring and intrusion detection in Advanced Metering Infrastructures are explored through a thorough analysis of the different threats targeting an AMI.Abstract:
The security of Advanced Metering Infrastructures (AMIs) is of critical importance. The use of secure protocols and the enforcement of strong security properties have the potential to prevent vulnerabilities from being exploited and from having costly consequences. However, as learned from experiences in IT security, prevention is one aspect of a comprehensive approach that must also include the development of a complete monitoring solution. In this paper, we explore the practical needs for monitoring and intrusion detection through a thorough analysis of the different threats targeting an AMI.read more
Citations
More filters
Journal ArticleDOI
Smart Grid — The New and Improved Power Grid: A Survey
TL;DR: In this paper, the authors survey the literature till 2011 on the enabling technologies for the Smart Grid and explore three major systems, namely the smart infrastructure system, the smart management system, and the smart protection system.
Smart Grid - The New and Improved Power Grid:
TL;DR: This article surveys the literature till 2011 on the enabling technologies for the Smart Grid, and explores three major systems, namely the smart infrastructure system, the smart management system, and the smart protection system.
Journal ArticleDOI
Cyber–Physical System Security for the Electric Power Grid
TL;DR: The significance of cyber infrastructure security in conjunction with power application security to prevent, mitigate, and tolerate cyber attacks is highlighted and a layered approach is introduced to evaluating risk based on the security of both the physical power applications and the supporting cyber infrastructure.
Journal ArticleDOI
Cyber Security and Privacy Issues in Smart Grids
TL;DR: In order to build a reliable smart grid, an overview of relevant cyber security and privacy issues is presented and several potential research fields are discussed at the end of this paper.
Journal ArticleDOI
Distributed Intrusion Detection System in a Multi-Layer Network Architecture of Smart Grids
TL;DR: Simulation results demonstrate that this is a promising methodology for supporting the optimal communication routing and improving system security through the identification of malicious network traffic.
References
More filters
Journal ArticleDOI
Anomaly-based network intrusion detection: Techniques, systems and challenges
TL;DR: The main challenges to be dealt with for the wide scale deployment of anomaly-based intrusion detectors, with special emphasis on assessment issues are outlined.
Proceedings ArticleDOI
Performance analysis of the CONFIDANT protocol
TL;DR: It is shown that a network with CONFIDANT and up to 60% of misbehaving nodes behaves almost as well as a benign network, in sharp contrast to a defenseless network.
Proceedings Article
Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes - Fairness In Dynamic Ad-hoc NeTworks
TL;DR: It is shown that a network with CONFIDANT and up to 60% of misbehaving nodes behaves almost as well as a benign network, in sharp contrast to a defenseless network.
Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection
TL;DR: Three classes of attacks which exploit fundamentally problems with the reliability of passive protocol analysis are defined--insertion, evasion and denial of service attacks--and how to apply these three types of attacks to IP and TCP protocol analysis is described.
Book ChapterDOI
Aggregation and Correlation of Intrusion-Detection Alerts
Hervé Debar,Andreas Wespi +1 more
TL;DR: An aggregation and correlation algorithm used in the design and implementation of an intrusion-detection console built on top of the Tivoli Enterprise Console (TEC) to expose a more condensed view of the security issues raised by intrusion- detection systems.