Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security 2020
DOI: 10.1145/3372297.3420016
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity Research and Training for Power Distribution Grids -- A Blueprint

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
2

Relationship

3
5

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 6 publications
0
6
0
Order By: Relevance
“…Notably, proper preparation for cybersecurity incidents also requires to regularly train the response to cybersecurity incidents, e.g., using a corresponding training simulator [ 132 , 133 ]. To be valuable for training employees of grid operators, such training environments need to closely model typical process control network as found in power grids [ 17 , 134 ].…”
Section: Providing Cybersecurity For Interconnected Power Gridsmentioning
confidence: 99%
“…Notably, proper preparation for cybersecurity incidents also requires to regularly train the response to cybersecurity incidents, e.g., using a corresponding training simulator [ 132 , 133 ]. To be valuable for training employees of grid operators, such training environments need to closely model typical process control network as found in power grids [ 17 , 134 ].…”
Section: Providing Cybersecurity For Interconnected Power Gridsmentioning
confidence: 99%
“…While a full reproducibility study is infeasible without the original dataset, we can still validate whether the original implementation and the version on top of IPAL produce identical results when presented with the same input. To this end, we generated our own IEC-104 network trace using a simulation framework for power distribution grids [54] and the attack tool by the authors to add equivalent attacks to this network trace [29]. We performed the same procedure as in the original paper [38], i.e., performing a 50/50 train/test split, applying the attack tool ten times for each attack type, and counting the number of state and transition violations compared to the trained DTMC.…”
Section: Dtmc (Communication)mentioning
confidence: 99%
“…Besides, a comprehensive integrated framework of modeling, simulation, and analysis of cyber-attacks is investigated in [15], which is finally reported various types of cyber-attack detection in power grids. In [16], a blueprint of reducing cyber security threats approach is introduced, trained technical personnel, evaluated the cyberattack impacts, and tested the proposed approach. Another cyber security approach for integration systems of electric power systems and renewable energy sources is proposed in [17], which is developed a new deep reinforcement learning method.…”
Section: Introductionmentioning
confidence: 99%