2019
DOI: 10.1109/tsg.2018.2881672
|View full text |Cite
|
Sign up to set email alerts
|

A Diversity-Based Substation Cyber Defense Strategy Utilizing Coloring Games

Abstract: Growing cybersecurity risks in the power grid require that utilities implement a variety of security mechanism (SM ) composed mostly of VPNs, firewalls, or other custom security components. While they provide some protection, they might contain software vulnerabilities which can lead to a cyber-attack. In this paper, the severity of a cyber-attack has been decreased by employing a diverse set of SM that reduce repetition of a single vulnerability. This paper focuses on the allocation of diverse SM and tries to… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 35 publications
(13 citation statements)
references
References 27 publications
(30 reference statements)
0
13
0
Order By: Relevance
“…Another two different applications of network diversity for increasing network survivability and reliability were introduced in the contexts of cyber-security [34][35][36][37] and virus contention [38][39][40][41]. In [34,35] attack graphs and attack paths are defined as the ways an attacker can get access to a network asset.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Another two different applications of network diversity for increasing network survivability and reliability were introduced in the contexts of cyber-security [34][35][36][37] and virus contention [38][39][40][41]. In [34,35] attack graphs and attack paths are defined as the ways an attacker can get access to a network asset.…”
Section: Related Workmentioning
confidence: 99%
“…Consequently, the more diverse the types of nodes the more resilient the network in the face of 0-day attacks. In [37], the authors aimed to allocate heterogeneous security mechanisms at the network nodes, thereby making difficult the access of an attacker to a target asset of interest. Their main research idea relied on allocating nodes in such a way that neighbors should not share the same vulnerabilities.…”
Section: Related Workmentioning
confidence: 99%
“…Fourth, we propose a new technique to tackle this problem and compare it with the proposal made in [44], showing that the new proposal is much more efficient. Finally, the performance evaluation conducted in this paper is more comprehensive, including an analysis of the effect that network metrics have on the achievable risk reduction, and an experimental comparison which the aforementioned work [45], which shows significant advantages for our approaches in terms of risk reduction.…”
Section: Distributed Approximations To Security and Critical Infrastrmentioning
confidence: 99%
“…We did a preliminary exploration of this line of work in the conference paper [44]. After the publication of that work, other authors have recently taken a similar approach [45], although with some key differences. First of all, they study the "resilience-by-design" problem, in the sense that they try to optimize the a priori network diversity so that the overall vulnerability of the network is mitigated.…”
Section: Distributed Approximations To Security and Critical Infrastrmentioning
confidence: 99%
See 1 more Smart Citation