Overview of Cyber Security Threats and Defense Technologies for Energy Critical Infrastructure

被引:3
作者
Li Jianhua [1 ,2 ]
机构
[1] Shanghai Jiao Tong Univ, Inst Cyber Sci & Technol, Shanghai 200240, Peoples R China
[2] China Energy Res Soc, Res Ctr Energy Secur, Beijing 100045, Peoples R China
基金
中国国家自然科学基金;
关键词
Energy critical infrastructure; Cyber security; Artificial Intelligence (AI); Advanced Persistent Threat (APT); Software-defined networking; ADVANCED PERSISTENT THREATS; SMART; ATTACKS; EDGE; CHALLENGES; FRAMEWORK; EFFICIENT; INTERNET; SYSTEM;
D O I
10.11999/JEIT191055
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Energy critical infrastructure has undergone transformative rapid development in the context of the rapid development of information technology, and has been deeply integrated with new technologies such as Artificial Intelligence (AI), big data, and the Internet of Things. While information technology significantly improves the efficiency and performance of energy critical infrastructure, it also brings new types of security threats that are more persistent and covert. An urgent problem is how to establish a systematic and intelligent security defense system for energy critical infrastructure. This paper starts with the development trend of energy critical infrastructure, and analyzes the mechanism of the traditional and new security threat mechanisms it faces. On this basis, insightful analysis on the research status and evolution trends of defense technologies for energy critical infrastructures is made.
引用
收藏
页码:2065 / 2081
页数:17
相关论文
共 102 条
[1]   Synchrony in Networked Microgrids Under Attacks [J].
Abhinav, Shankar ;
Modares, Hamidreza ;
Lewis, Frank L. ;
Ferrese, Frank ;
Davoudi, Ali .
IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (06) :6731-6741
[2]  
Ahsan U., 2017, 2017 26th Wireless and Optical Communication Conference (WOCC), P1
[3]  
Ajtai M., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P99, DOI 10.1145/237814.237838
[4]   Low Latency Detection of Sparse False Data Injections in Smart Grids [J].
Akingeneye, Israel ;
Wu, Jingxian .
IEEE ACCESS, 2018, 6 :58564-58573
[5]   Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions [J].
Al-rimy, Bander Ali Saleh ;
Maarof, Mohd Aizaini ;
Shaid, Syed Zainudeen Mohd .
COMPUTERS & SECURITY, 2018, 74 :144-166
[6]  
Aloul F., 2012, Int. J. Smart Grid Clean Energy, V1, P1, DOI [DOI 10.12720/SGCE.1.1.1-6, 10.12720/sgce.1.1.1-6]
[7]   A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities [J].
Alshamrani, Adel ;
Myneni, Sowmya ;
Chowdhary, Ankur ;
Huang, Dijiang .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02) :1851-1877
[8]   Cyber Security of Water SCADA Systems-Part II: Attack Detection Using Enhanced Hydrodynamic Models [J].
Amin, Saurabh ;
Litrico, Xavier ;
Sastry, S. Shankar ;
Bayen, Alexandre M. .
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2013, 21 (05) :1679-1693
[9]  
[Anonymous], 2016, Tech. Rep. NISTIR 8105
[10]   Software Defined Networking for Resilient Communications in Smart Grid Active Distribution Networks [J].
Aydeger, Abdullah ;
Akkaya, Kemal ;
Cintuglu, Mehmet H. ;
Uluagac, A. Selcuk ;
Mohammed, Osama .
2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,