Effective Measurement Design for Cyber Security

被引:0
|
作者
Gol, Murat [1 ]
Abur, Ali [1 ]
机构
[1] Northeastern Univ, Elect & Comp Engn Dept, Boston, MA 02115 USA
关键词
State Estimation; cyber security; critical measurements; leverage measurements; PMU; BAD DATA;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cyber-attacks against power systems have been widely researched in recent years. Several studies have so far focused on ways of deceiving the state estimator so that the resulting estimates would be wrong. On the other hand, the role of network topology and measurement design on detectability of cyber-attacks has not been widely investigated. This work examines the measurements and network topology to identify vulnerabilities against targeted cyber-attacks. Specifically, it considers the leverage measurements, whose errors are typically not easily detected and therefore they may bias estimators when they carry gross errors. The paper also illustrates that this vulnerability can be addressed by strategic replacement of few of these measurements by phasor measurement units (PMUs).
引用
收藏
页数:8
相关论文
共 50 条
  • [21] Design of Cyber Security for Critical Infrastructures: A Case for a Schizoid Design Approach
    Dayal, Avik
    Deng, Yi
    Shukla, Sandeep K.
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING (SPACE 2015), 2015, 9354 : 41 - 54
  • [22] Axiomatic Design/Design Patterns Mashup: Part 2 (Cyber Security)
    Thomas, John
    Mantri, Pam
    9TH INTERNATIONAL CONFERENCE ON AXIOMATIC DESIGN (ICAD 2015), 2015, 34 : 275 - 282
  • [23] A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security
    Pour, Morteza Safaei
    Naderb, Christelle
    Friday, Kurt
    Bou-Harb, Elias
    COMPUTERS & SECURITY, 2023, 128
  • [24] Measurement of Situation Awareness Among Diverse Agents in Cyber Security
    Cain, Ashley A.
    Schuster, David
    2014 IEEE INTERNATIONAL INTER-DISCIPLINARY CONFERENCE ON COGNITIVE METHODS IN SITUATION AWARENESS AND DECISION SUPPORT (COGSIMA), 2014, : 124 - 129
  • [25] Security of Cyber-Physical Systems: Design of a Security Supervisor to Thwart Attacks
    Lima, Publio M.
    Alves, Marcos V. S.
    Carvalho, Lilian Kawakami
    Moreira, Marcos V.
    IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2022, 19 (03) : 2030 - 2041
  • [26] DESIGN AND IMPLEMENTATION OF A DEVS- BASED CYBER-ATTACK SIMULATOR FOR CYBER SECURITY
    Kara, S.
    Hizal, S.
    Zengin, A.
    INTERNATIONAL JOURNAL OF SIMULATION MODELLING, 2022, 21 (01) : 53 - 64
  • [27] An Effective Security Requirements Engineering Framework for Cyber-Physical Systems
    Rehman, Shafiq Ur
    Gruhn, Volker
    TECHNOLOGIES, 2018, 6 (03):
  • [28] A Study of Effective Defense-In-Depth Strategy of Cyber Security on ICS
    Choi, Seong-Muk
    Kim, Rae-Hyung
    Kim, Ga-Ye
    Lee, Hyeon-Kyung
    Gim, GwangYong
    Kim, Jong-Bae
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (05): : 235 - 242
  • [29] Shame in Cyber Security: Effective Behavior Modification Tool or Counterproductive Foil?
    Renaud, Karen
    Searle, Rosalind
    Dupuis, Marc
    NEW SECURITY PARADIGMS WORKSHOP, NSPW 2021, 2021, : 70 - 87
  • [30] Optimisation of cyber insurance coverage with selection of cost effective security controls
    Uuganbayar, Ganbayar
    Yautsiukhin, Artsiom
    Martinelli, Fabio
    Massacci, Fabio
    COMPUTERS & SECURITY, 2021, 101