2020
V. Mladenov; V. Chobanov; P. Sarigiannidis; P. I. Radoglou-Grammatikis; A. Hristov; P. Zlatev
Defense against cyber-attacks on the Hydro Power Plant connected in parallel with Energy System Conference
2020 12th Electrical Engineering Faculty Conference (BulEF), IEEE, 2020.
Περίληψη | BibTeX | Ετικέτες: Cyber security, Energy System, Grid infrastructure, Hydro Power Plant, Smart Grid | Σύνδεσμοι:
@conference{Mladenov2020,
title = {Defense against cyber-attacks on the Hydro Power Plant connected in parallel with Energy System},
author = { V. Mladenov and V. Chobanov and P. Sarigiannidis and P. I. Radoglou-Grammatikis and A. Hristov and P. Zlatev},
url = {https://www.researchgate.net/publication/348642791_Defense_against_cyber-attacks_on_the_Hydro_Power_Plant_connected_in_parallel_with_Energy_System},
doi = {10.1109/bulef51036.2020.9326016},
year = {2020},
date = {2020-09-01},
booktitle = {2020 12th Electrical Engineering Faculty Conference (BulEF)},
journal = {2020 12th Electrical Engineering Faculty Conference, BulEF 2020},
publisher = {IEEE},
abstract = {In today's modern energy sector, driven more and more towards decentralization, which includes many smaller energy producers rather than huge government projects, security against cyber-attacks is becoming more crucial for the energy grid. Since many small energy plants do not have the resources to finance very expensive existing cyber-security systems, they often have no security system in place at all. Although with small energy producers, the risks of being under attack are not as devastating as in a huge power plants, they still pose a serious threat to the energy system and to the supply of electricity to whole regions. Moreover, in the era of technology, such cyber-attacks could be carried out simultaneously at many locations, thus risking the lack of electricity to larger areas. Since there was a clearly identified need for such an instrument, the SPEAR consortium, started to develop tailor made solution for different types of actors in the energy sector, to prevent such occurrences and help secure the energy system. One of the use cases, investigated in the project, is a real operating hydro power plant in the mountain area of Bulgaria called Leshnitsa, which will be one of the four sites to first test the functionality of the finished product. The plant had no previous cyber-security system in place and had already experienced one attack, where one of the computers in the plant was hacked and a ransom was demanded from the attackers to unlock it. Exactly events like this one are proof, that the energy sector has a need to protect the growing number of small independent actors in the energy system.. © 2020 IEEE.},
keywords = {Cyber security, Energy System, Grid infrastructure, Hydro Power Plant, Smart Grid},
pubstate = {published},
tppubtype = {conference}
}
2019
G. Loukas; E. Karapistoli; E. Panaousis; P. Sarigiannidis; A. Bezemskij; T. Vuong
A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles Journal Article
In: Ad Hoc Networks, vol. 84, pp. 124-147, 2019.
Περίληψη | BibTeX | Ετικέτες: Aircraft, Automobiles, Cyber security, Cyber-physical systems, Driverless pods, Intrusion detection, Robotic land vehicles, unmanned aerial vehicles, VANET, Vehicles, Vehicular networks | Σύνδεσμοι:
@article{Loukas2019124,
title = {A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles},
author = { G. Loukas and E. Karapistoli and E. Panaousis and P. Sarigiannidis and A. Bezemskij and T. Vuong},
url = {https://www.researchgate.net/publication/328025147_A_taxonomy_and_survey_of_cyber-physical_intrusion_detection_approaches_for_vehicles},
doi = {10.1016/j.adhoc.2018.10.002},
year = {2019},
date = {2019-01-01},
journal = {Ad Hoc Networks},
volume = {84},
pages = {124-147},
abstract = {With the growing threat of cyber and cyber-physical attacks against automobiles, drones, ships, driverless pods and other vehicles, there is also a growing need for intrusion detection approaches that can facilitate defence against such threats. Vehicles tend to have limited processing resources and are energy-constrained. So, any security provision needs to abide by these limitations. At the same time, attacks against vehicles are very rare, often making knowledge-based intrusion detection systems less practical than behaviour-based ones, which is the reverse of what is seen in conventional computing systems. Furthermore, vehicle design and implementation can differ wildly between different types or different manufacturers, which can lead to intrusion detection designs that are vehicle-specific. Equally importantly, vehicles are practically defined by their ability to move, autonomously or not. Movement, as well as other physical manifestations of their operation may allow cyber security breaches to lead to physical damage, but can also be an opportunity for detection. For example, physical sensing can contribute to more accurate or more rapid intrusion detection through observation and analysis of physical manifestations of a security breach. This paper presents a classification and survey of intrusion detection systems designed and evaluated specifically on vehicles and networks of vehicles. Its aim is to help identify existing techniques that can be adopted in the industry, along with their advantages and disadvantages, as well as to identify gaps in the literature, which are attractive and highly meaningful areas of future research. © 2018 Elsevier B.V.},
keywords = {Aircraft, Automobiles, Cyber security, Cyber-physical systems, Driverless pods, Intrusion detection, Robotic land vehicles, unmanned aerial vehicles, VANET, Vehicles, Vehicular networks},
pubstate = {published},
tppubtype = {article}
}
Διεύθυνση
Internet of Things and Applications Lab
Department of Electrical and Computer Engineering
University of Western Macedonia Campus
ZEP Area, Kozani 50100
Greece
Πληροφορίες Επικοινωνίας
tel: +30 2461 056527
Email: ithaca@uowm.gr