Effective Measurement Design for Cyber Security

被引:0
|
作者
Gol, Murat [1 ]
Abur, Ali [1 ]
机构
[1] Northeastern Univ, Elect & Comp Engn Dept, Boston, MA 02115 USA
关键词
State Estimation; cyber security; critical measurements; leverage measurements; PMU; BAD DATA;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cyber-attacks against power systems have been widely researched in recent years. Several studies have so far focused on ways of deceiving the state estimator so that the resulting estimates would be wrong. On the other hand, the role of network topology and measurement design on detectability of cyber-attacks has not been widely investigated. This work examines the measurements and network topology to identify vulnerabilities against targeted cyber-attacks. Specifically, it considers the leverage measurements, whose errors are typically not easily detected and therefore they may bias estimators when they carry gross errors. The paper also illustrates that this vulnerability can be addressed by strategic replacement of few of these measurements by phasor measurement units (PMUs).
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Recommendations for Effective Cyber Security Execution
    Kumar, Shipra Ravi
    Yadav, Suman Avdhesh
    Sharma, Smita
    Singh, Akansha
    2016 1ST INTERNATIONAL CONFERENCE ON INNOVATION AND CHALLENGES IN CYBER SECURITY (ICICCS 2016), 2016, : 342 - 346
  • [2] Effective Belief Network for Cyber Security Frameworks
    Atoum, Issa
    Otoom, Ahmed
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (04): : 221 - 227
  • [3] Cyber Security Assistant:Design Overview
    Sayan, Carla
    Hariri, Salim
    Ball, George
    2017 IEEE 2ND INTERNATIONAL WORKSHOPS ON FOUNDATIONS AND APPLICATIONS OF SELF* SYSTEMS (FAS*W), 2017, : 313 - 317
  • [4] Design Considerations for Cyber Security Testbeds: A Case Study on a Cyber Security Testbed for Education
    Frank, Maximilian
    Leitner, Maria
    Pahi, Timea
    2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI, 2017, : 38 - 46
  • [5] Cyber range design framework for cyber security education and training
    M. N. Katsantonis
    A. Manikas
    I. Mavridis
    D. Gritzalis
    International Journal of Information Security, 2023, 22 : 1005 - 1027
  • [6] Cyber range design framework for cyber security education and training
    Katsantonis, M. N.
    Manikas, A.
    Mavridis, I.
    Gritzalis, D.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (04) : 1005 - 1027
  • [7] The Design and Application of a Unified Ontology for Cyber Security
    Akbar, Khandakar Ashrafi
    Rahman, Fariha Ishrat
    Singhal, Anoop
    Khan, Latifur
    Thuraisingham, Bhavani
    INFORMATION SYSTEMS SECURITY, ICISS 2023, 2023, 14424 : 23 - 41
  • [8] Application of HAZOP to the Design of Cyber Security Experiments
    Mansoori, Masood
    Welch, Ian
    Choo, Kim-Kwang Raymond
    Maxion, Roy A.
    IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS IEEE AINA 2016, 2016, : 790 - 799
  • [9] Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense
    Spafford, Eugene H.
    PROTECTING PERSONS WHILE PROTECTING THE PEOPLE, 2009, 5661 : 20 - 33
  • [10] EXPLORING THE EFFECT OF TRAINING ON REALIZING EFFECTIVE CYBER-SECURITY
    Saravanos, A.
    Curinga, M.
    Auchter, K.
    INTED2017: 11TH INTERNATIONAL TECHNOLOGY, EDUCATION AND DEVELOPMENT CONFERENCE, 2017, : 9762 - 9762