Overview of Cyber Security Threats and Defense Technologies for Energy Critical Infrastructure

被引:3
作者
Li Jianhua [1 ,2 ]
机构
[1] Shanghai Jiao Tong Univ, Inst Cyber Sci & Technol, Shanghai 200240, Peoples R China
[2] China Energy Res Soc, Res Ctr Energy Secur, Beijing 100045, Peoples R China
基金
中国国家自然科学基金;
关键词
Energy critical infrastructure; Cyber security; Artificial Intelligence (AI); Advanced Persistent Threat (APT); Software-defined networking; ADVANCED PERSISTENT THREATS; SMART; ATTACKS; EDGE; CHALLENGES; FRAMEWORK; EFFICIENT; INTERNET; SYSTEM;
D O I
10.11999/JEIT191055
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Energy critical infrastructure has undergone transformative rapid development in the context of the rapid development of information technology, and has been deeply integrated with new technologies such as Artificial Intelligence (AI), big data, and the Internet of Things. While information technology significantly improves the efficiency and performance of energy critical infrastructure, it also brings new types of security threats that are more persistent and covert. An urgent problem is how to establish a systematic and intelligent security defense system for energy critical infrastructure. This paper starts with the development trend of energy critical infrastructure, and analyzes the mechanism of the traditional and new security threat mechanisms it faces. On this basis, insightful analysis on the research status and evolution trends of defense technologies for energy critical infrastructures is made.
引用
收藏
页码:2065 / 2081
页数:17
相关论文
共 102 条
[11]  
Basso T., 2012, Innovative Smart Grid Technologies (ISGT), 2012 IEEE PES, P1, DOI [10.1109/ISGT.2012.6175748, DOI 10.1109/ISGT.2012.6175748]
[12]   Cloud Computing Applications for Smart Grid: A Survey [J].
Bera, Samaresh ;
Misra, Sudip ;
Rodrigues, Joel J. P. C. .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (05) :1477-1494
[13]   A Survey on Detection Techniques for Cryptographic Ransomware [J].
Berrueta, Eduardo ;
Morato, Daniel ;
Magana, Eduardo ;
Izal, Mikel .
IEEE ACCESS, 2019, 7 :144925-144944
[14]  
Bush GeorgeW., 2001, Harv. JL Pub. Pol'y, V25, pxviii
[15]  
CHAI Zhengyi, 2008, J HEBEI NORMAL U NAT, V32, P310
[16]   Smart Attacks in Smart Grid Communication Networks [J].
Chen, Pin-Yu ;
Cheng, Shin-Ming ;
Chen, Kwang-Cheng .
IEEE COMMUNICATIONS MAGAZINE, 2012, 50 (08) :24-29
[17]   Security of SCADA Systems Against Cyber-Physical Attacks [J].
Do, Van Long ;
Fillatre, Lionel ;
Nikiforov, Igor ;
Willett, Peter .
IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 2017, 32 (05) :28-45
[18]  
ELATTAR M., 2020, RELIABLE COMMUNICATI
[19]   Challenges of Connecting Edge and Cloud Computing: A Security and Forensic Perspective [J].
Esposito, Christian ;
Castiglione, Aniello ;
Pop, Florin ;
Choo, Kim-Kwang Raymond .
IEEE CLOUD COMPUTING, 2017, 4 (02) :13-17
[20]   Smart Grid - The New and Improved Power Grid: A Survey [J].
Fang, Xi ;
Misra, Satyajayant ;
Xue, Guoliang ;
Yang, Dejun .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2012, 14 (04) :944-980