Data‐Driven Anomaly Detection and Mitigation for FACTS‐Based Wide‐Area Voltage Control System
Figure 4 presents the schematic diagram of data‐driven attack‐resilient system for the wide‐area voltage controller that seamlessly integrates machine learning‐based anomaly detector with rules‐based attack mitigation system while supporting the normal operation of WAVCS in real‐time.
Vivek Kumar Singh +2 more
wiley +1 more source
ACCESS CONTROL IN A LOCAL NETWORK USING THE BASIC CONFIGURATION OF NETWORK DEVICES
The article focused on recommendations for the local network protection from unauthorized access of employees (insider attacks) on the basis of access control, using the basic settings of existing equipment.
S. N. Petrov +3 more
doaj +1 more source
Analysis and Demonstration of Selected Network Attacks [PDF]
Tato práce je zaměřená na problematiku síťových útoků, jejich popis a obranu proti nim. Kromě toho popisuje techniky, které může útočník použít při vytváření útoku.
Černeková, Alžbeta
core
Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid [PDF]
The BlackEnergy malware targeting critical infrastructures has a long history. It evolved over time from a simple DDoS platform to a quite sophisticated plug-in based malware. The plug-in architecture has a persistent malware core with easily installable
Khan, Rafiullah +4 more
core +1 more source
Modelling False Data Injection and Denial of Service Attacks in Cyber‐Physical Microgrids
This paper aims to analyse the impact of cyberattacks on data transmission in cyber‐physical microgrids and to develop appropriate updated models for these systems. It investigates the effects of cyberattacks on the numerical stream data in microgrids, drawing upon experimental results to construct cyberattack models that can facilitate the development
Abbas Ahmadi +2 more
wiley +1 more source
Wireless Networks Security Flaws and Hacking Avenues of Attacks
An access point offers wireless networking to several wireless client nodes in the shared medium when using IEEE 802.11 wireless local area networks in infrastructure mode. The related nodes could be at risk of security attacks.
Asmaa Akram Ghanim +1 more
doaj +1 more source
A Look Back at "Security Problems in the TCP/IP Protocol Suite" [PDF]
About fifteen years ago, I wrote a paper on security problems in the TCP/IP protocol suite. In particular, I focused on protocol-level issues, rather than implementation flaws.
Bellovin, Steven Michael
core +2 more sources
Real‐Time Cyberattack Detection for SCADA in Power System
ABSTRACT Supervisory Control and Data Acquisition (SCADA) systems monitor and control industrial processes, but their integration with information technology and network connectivity, including the internet, exposes them to potential cyber threats. As SCADA systems become essential infrastructure, their vulnerability to cyber‐attacks has increased ...
Botta Prudhvi +2 more
wiley +1 more source
Real-Time Detection and Identification of ARP Spoofing Attacks in Microgrids
The integration of smart devices and advanced communication infrastructure has turned power systems into cyber-physical systems (CPS), introducing cyber vulnerabilities. One such vulnerability arises from the use of the address resolution protocol (ARP),
Kalinath Katuri +2 more
doaj +1 more source
Seguridad en un data center en la nube a nivel de infraestructura [PDF]
Las organizaciones requieren acompañamiento por parte de profesionales y consultores que les permita determinar cómo implementar la seguridad que un data center en la nube, Teniendo en cuenta que los ataque de robo de información hoy en día se presentan ...
Jimenez Castro, Andres Fernando +1 more
core

