An Overview About Detection of Cyber-Attacks on Power SCADA Systems

被引:0
作者
de Figueiredo, Hugo F. M. [1 ]
Ferst, Matheus K. [1 ]
Denardin, Gustavo W. [1 ]
机构
[1] Fed Univ Technol Parana UTFPR, Postgrad Program Elect Engn PPGEE, Pato Branco, Brazil
来源
2019 IEEE 15TH BRAZILIAN POWER ELECTRONICS CONFERENCE AND 5TH IEEE SOUTHERN POWER ELECTRONICS CONFERENCE (COBEP/SPEC) | 2019年
关键词
SCADA Systems; Smart Grids; Security; Intrusion Detection Systems; DATA-INJECTION ATTACKS; INTRUSION DETECTION SYSTEM; STATE ESTIMATION;
D O I
暂无
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
The power SCADA systems have been undergoing several upgrades over the years. At first, these systems were based only on isolated processes, without the need to connect in a global network, such as the Internet. In recent years, the access to such an open network has been critical for the SCADA systems, due to the need for data exchange across large areas, between geographically remote industrial plants, or even because of the demand for remote applications. Despite the SCADA systems have advantages by being now connected to a network such as the Internet, several problems can arise due to that. For example, such a connection makes it possible for an intruder to compromise the whole system. SCADA systems are essential in the new concept of smart grids and are widely used in the monitoring and control of Distributed Energy Resources (DER) based on photovoltaics. In that context, this paper presents an overview of the main attacks found and documented in the literature, as well as possible techniques to detect such attacks.
引用
收藏
页数:6
相关论文
共 57 条
[1]   A Multi-Level Intrusion Detection System for Wireless Sensor Networks Based on Immune Theory [J].
Alaparthy, Vishwa Teja ;
Morgera, Salvatore Domenic .
IEEE ACCESS, 2018, 6 :47364-47373
[2]   An Efficient Data-Driven Clustering Technique to Detect Attacks in SCADA Systems [J].
Almalawi, Abdulmohsen ;
Fahad, Adil ;
Tari, Zahir ;
Alamri, Abdullah ;
AlGhamdi, Rayed ;
Zomaya, Albert Y. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (05) :893-906
[3]  
Alomari E., 2012, INT J COMPUTER APPL
[4]   Performance, Analysis, and Comparison of MrDR Method to Detect DoS Attacks in MANET [J].
Alsumayt, Albandari ;
Haggerty, John ;
Lotfi, Ahmad .
2015 EUROPEAN INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (EISIC), 2015, :121-124
[5]  
[Anonymous], 2001, IPSEC SECURING VPNS
[6]  
[Anonymous], 2010, 2010 ECRIME RES SUMM, DOI DOI 10.1109/ECRIME.2010.5706699
[7]  
Ashrafuzzaman M, 2018, INT WIREL COMMUN, P219, DOI 10.1109/IWCMC.2018.8450487
[8]   Origin-Destination Matrix Generation from Boarding-Alighting and Household Survey Data [J].
Blum, Jeremy J. ;
Sridhar, Anoop ;
Mathew, Tom V. .
TRANSPORTATION RESEARCH RECORD, 2010, (2183) :1-8
[9]  
Case D.U., 2016, ELECTRICITY INFORM S
[10]  
CHALAMASETTY G.K., 2016, Power Systems Conference (PSC), 2016 Clemson University, P1