2020 Resilience Week (RWS) 2020
DOI: 10.1109/rws50334.2020.9241259
|View full text |Cite
|
Sign up to set email alerts
|

D-IDS for Cyber-Physical DER Modbus System - Architecture, Modeling, Testbed-based Evaluation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 16 publications
(5 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…Ravikumar et al [82] build on the work of Rakas by proposing a distributed IDS for federated CPS environments such as interconnected smart power grids. The proposed distributed IDS uses Ethernet switch port mirroring to capture network traffic flow data and consolidate that data in a centralized or cloud-based IDS environment for enhanced situational awareness of activity in a distributed and/or loosely coupled CPS.…”
Section: Using Ids/ips For Anomaly Detectionmentioning
confidence: 99%
“…Ravikumar et al [82] build on the work of Rakas by proposing a distributed IDS for federated CPS environments such as interconnected smart power grids. The proposed distributed IDS uses Ethernet switch port mirroring to capture network traffic flow data and consolidate that data in a centralized or cloud-based IDS environment for enhanced situational awareness of activity in a distributed and/or loosely coupled CPS.…”
Section: Using Ids/ips For Anomaly Detectionmentioning
confidence: 99%
“…Here, the considerable power quality is achieved by using the reconfigurable emulators. In [23][24] authors developed various types of real time controllers such as distributed-IDS, IGBT based controlling system, and MCU-MIPS based environment. In [25], the authors developed distributed power generation system by maintaining the economic operation with respect to both the input and profit; in [26], hybrid Gaussian mutation with PSO was used to get the maximum profit in microgrids, respectively.…”
Section: ░ 2 Related Workmentioning
confidence: 99%
“…Most IDSs classify attacks by analyzing network traffic generated from specialized environments [ 50 , 51 , 52 , 53 , 54 , 55 ]. Nevertheless, in reality, network traffic may originate from a broad range of traffic and include excessive data.…”
Section: Related Workmentioning
confidence: 99%