scispace - formally typeset
Proceedings ArticleDOI

Intrusion Detection for Advanced Metering Infrastructures: Requirements and Architectural Directions

Reads0
Chats0
TLDR
The practical needs for monitoring and intrusion detection in Advanced Metering Infrastructures are explored through a thorough analysis of the different threats targeting an AMI.
Abstract
The security of Advanced Metering Infrastructures (AMIs) is of critical importance. The use of secure protocols and the enforcement of strong security properties have the potential to prevent vulnerabilities from being exploited and from having costly consequences. However, as learned from experiences in IT security, prevention is one aspect of a comprehensive approach that must also include the development of a complete monitoring solution. In this paper, we explore the practical needs for monitoring and intrusion detection through a thorough analysis of the different threats targeting an AMI.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Smart Grid — The New and Improved Power Grid: A Survey

TL;DR: In this paper, the authors survey the literature till 2011 on the enabling technologies for the Smart Grid and explore three major systems, namely the smart infrastructure system, the smart management system, and the smart protection system.

Smart Grid - The New and Improved Power Grid:

TL;DR: This article surveys the literature till 2011 on the enabling technologies for the Smart Grid, and explores three major systems, namely the smart infrastructure system, the smart management system, and the smart protection system.
Journal ArticleDOI

Cyber–Physical System Security for the Electric Power Grid

TL;DR: The significance of cyber infrastructure security in conjunction with power application security to prevent, mitigate, and tolerate cyber attacks is highlighted and a layered approach is introduced to evaluating risk based on the security of both the physical power applications and the supporting cyber infrastructure.
Journal ArticleDOI

Cyber Security and Privacy Issues in Smart Grids

TL;DR: In order to build a reliable smart grid, an overview of relevant cyber security and privacy issues is presented and several potential research fields are discussed at the end of this paper.
Journal ArticleDOI

Distributed Intrusion Detection System in a Multi-Layer Network Architecture of Smart Grids

TL;DR: Simulation results demonstrate that this is a promising methodology for supporting the optimal communication routing and improving system security through the identification of malicious network traffic.
References
More filters
Journal ArticleDOI

Anomaly-based network intrusion detection: Techniques, systems and challenges

TL;DR: The main challenges to be dealt with for the wide scale deployment of anomaly-based intrusion detectors, with special emphasis on assessment issues are outlined.
Proceedings ArticleDOI

Performance analysis of the CONFIDANT protocol

TL;DR: It is shown that a network with CONFIDANT and up to 60% of misbehaving nodes behaves almost as well as a benign network, in sharp contrast to a defenseless network.
Proceedings Article

Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes - Fairness In Dynamic Ad-hoc NeTworks

TL;DR: It is shown that a network with CONFIDANT and up to 60% of misbehaving nodes behaves almost as well as a benign network, in sharp contrast to a defenseless network.

Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection

TL;DR: Three classes of attacks which exploit fundamentally problems with the reliability of passive protocol analysis are defined--insertion, evasion and denial of service attacks--and how to apply these three types of attacks to IP and TCP protocol analysis is described.
Book ChapterDOI

Aggregation and Correlation of Intrusion-Detection Alerts

TL;DR: An aggregation and correlation algorithm used in the design and implementation of an intrusion-detection console built on top of the Tivoli Enterprise Console (TEC) to expose a more condensed view of the security issues raised by intrusion- detection systems.
Related Papers (5)