2019 15th European Dependable Computing Conference (EDCC) 2019
DOI: 10.1109/edcc.2019.00032
|View full text |Cite
|
Sign up to set email alerts
|

Leveraging Physical Access Logs to Identify Tailgating: Limitations and Solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…More sophisticated physical security may not only deter attackers but also act as a part of a general IDS. For example, if a physical security violation is detected at a substation [ 125 ], subsequent malicious activities in the PCN could be correlated with the physical security violation, helping in attack response. A major challenge will be integrating (automatically) detected physical security violations [ 125 ] into an overall security solution involving IDS on the network side.…”
Section: Providing Cybersecurity For Interconnected Power Gridsmentioning
confidence: 99%
See 1 more Smart Citation
“…More sophisticated physical security may not only deter attackers but also act as a part of a general IDS. For example, if a physical security violation is detected at a substation [ 125 ], subsequent malicious activities in the PCN could be correlated with the physical security violation, helping in attack response. A major challenge will be integrating (automatically) detected physical security violations [ 125 ] into an overall security solution involving IDS on the network side.…”
Section: Providing Cybersecurity For Interconnected Power Gridsmentioning
confidence: 99%
“…For example, if a physical security violation is detected at a substation [ 125 ], subsequent malicious activities in the PCN could be correlated with the physical security violation, helping in attack response. A major challenge will be integrating (automatically) detected physical security violations [ 125 ] into an overall security solution involving IDS on the network side. With an increasing integration of novel, easily-accessible assets, such as smart meters [ 16 ] and charging infrastructure for electronic vehicles [ 78 , 126 ], into the communication infrastructure of smart grids, the challenge of physical security is further exaggerated.…”
Section: Providing Cybersecurity For Interconnected Power Gridsmentioning
confidence: 99%
“…More sophisticated physical security may not only deter attackers but also act as a part of a general IDS. For example, if a physical security violation is detected at a substation [106], subsequent malicious activities in the PCN could be correlated with this violation, helping in attack response. A major challenge will be integrating (automatically) detected physical security violations [106] into an overall security solution involving intrusion detection on the network side.…”
Section: Physical Securitymentioning
confidence: 99%
“…For example, if a physical security violation is detected at a substation [106], subsequent malicious activities in the PCN could be correlated with this violation, helping in attack response. A major challenge will be integrating (automatically) detected physical security violations [106] into an overall security solution involving intrusion detection on the network side. With an increasing integration of novel, easily-accessible assets such as smart meters [107] and charging infrastructure for electronic vehicles [70,108] into the communication infrastructure of smart grids, the challenge of physical security further exaggerates.…”
Section: Physical Securitymentioning
confidence: 99%