An Intrusion and Defense Testbed in a Cyber-Power System Environment

Junho Hong, Shinn-Shyan Wu, Alexandru Stefanov, Ahmed Fshosha, Chen-Ching Liu, Pavel Gladyshev, Manimaran Govindarasu

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Abstract

The proposed testbed of the cyber‐power system consists of power system simulation, substation automation, and the SCADA system. Scenarios for substation cyber security intrusions and anomaly detection concepts have been proposed. An attack tree method can be used to identify vulnerable substations and intrusions through remote access points. Specific substation vulnerability scenarios have been tested. Temporal anomaly is determined by data and information acquired at different time points. This is a metric to determine the anomaly between two snapshots. In a distributed intrusion detection algorithm, distributed agents are trained with a large number of scenarios and intended for real‐time applications. In a distributed environment, if an anomaly is detected by one agent, it is able to distribute critical information to other agents in the network.
Original languageEnglish
Title of host publicationIEEE Power and Energy Society General Meeting
Place of PublicationDetroit, USA
PublisherIEEE
Pages1-5
ISBN (Electronic)978-1-4577-1001-8
ISBN (Print)978-1-4577-1000-1
DOIs
Publication statusPublished - Jul 2011
Externally publishedYes

Keywords

  • Computer Security
  • Cyber Security
  • SCADA
  • Power Grids
  • Power Systems

Fingerprint

Dive into the research topics of 'An Intrusion and Defense Testbed in a Cyber-Power System Environment'. Together they form a unique fingerprint.

Cite this