2016
DOI: 10.1109/jiot.2015.2459049
|View full text |Cite
|
Sign up to set email alerts
|

BLITHE: Behavior Rule-Based Insider Threat Detection for Smart Grid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
33
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 44 publications
(33 citation statements)
references
References 34 publications
0
33
0
Order By: Relevance
“…Particularly, this technique is often adopted to detect those cyberattacks that interrupt, fabricate, intercept or modify communication messages between the HMI and PLC. H. Bao et al [10] proposed a behavior rule-based methodology monitoring devices in the smart grid for insider threat detection. Results showed that this approach could detect abnormal behaviors in pervasive smart grid applications.…”
Section: Related Workmentioning
confidence: 99%
“…Particularly, this technique is often adopted to detect those cyberattacks that interrupt, fabricate, intercept or modify communication messages between the HMI and PLC. H. Bao et al [10] proposed a behavior rule-based methodology monitoring devices in the smart grid for insider threat detection. Results showed that this approach could detect abnormal behaviors in pervasive smart grid applications.…”
Section: Related Workmentioning
confidence: 99%
“…Internetof-Things), ensuring the security of smart grids and other cyber-physical systems is crucial to the stability of a society [1], [3], [25], [26]. One current line of research is detecting and mitigating insider attacks in smart grids (see [1], [3], [11], [27]- [29]). Liu [29] is, probably, the first to study a new class of insider attacks, the false data injection (FDI) attacks.…”
Section: Related Workmentioning
confidence: 99%
“…To guarantee high reliability and robustness of the underlying critical infrastructure, real-time monitoring, data analytics, and control are highly critical. Empirically, data analytics is generally performed by the state estimator at the system control center (CC) [1]- [3]. However, with the increasing number of interconnections, nonlinearity, and dynamics, real-time data analytics will inevitably impose significant computational burden and complexity on CC [4].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations