期刊文献+
共找到23篇文章
< 1 2 >
每页显示 20 50 100
Deducing cascading failures caused by cyberattacks based on attack gains and cost principle in cyber-physical power systems 被引量:5
1
作者 Yufei WANG Yanli LIU Jun’e LI 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2019年第6期1450-1460,共11页
To warn the cascading failures caused by cyberattacks(CFCAs)in real time and reduce their damage on cyber-physical power systems(CPPSs),a novel early warning method based on attack gains and cost principle(AGCP)is pro... To warn the cascading failures caused by cyberattacks(CFCAs)in real time and reduce their damage on cyber-physical power systems(CPPSs),a novel early warning method based on attack gains and cost principle(AGCP)is proposed.Firstly,according to the CFCA characteristics,the leading role of attackers in the whole evolutionary process is discussed.The breaking out of a CFCA is deduced based on the AGCP from the view of attackers,and the priority order of all CFCAs is then provided.Then,the method to calculate the probability of CFCAs is proposed,and an early warning model for CFCA is designed.Finally,to verify the effectiveness of this method,a variety of CFCAs are simulated in a local CPPS model based on the IEEE 39-bus system.The experimental results demonstrate that this method can be used as a reliable assistant analysis technology to facilitate early warning of CFCAs. 展开更多
关键词 Cyber-physical power system CASCADING failure cyberattack Early WARNING Fault probability ATTACK GAINS and COST PRINCIPLE ATTACK route choice
原文传递
网电空间攻击研究与对抗技术分析 被引量:5
2
作者 成天桢 余继周 邢德奎 《现代防御技术》 北大核心 2016年第3期91-98,共8页
网电技术的发展,促成了全新的未来战争"第五个作战域"——网络电磁空间,制网电权变得与20世纪制空权一样重要。以战例为线索分析了网电攻击的发展历程,阐述了网电攻击的定义内涵与攻击类别,通过对网电攻击效果的预想和攻击机... 网电技术的发展,促成了全新的未来战争"第五个作战域"——网络电磁空间,制网电权变得与20世纪制空权一样重要。以战例为线索分析了网电攻击的发展历程,阐述了网电攻击的定义内涵与攻击类别,通过对网电攻击效果的预想和攻击机理的分析,提出了网电攻击和网电对抗的核心技术和发展趋势,能为后续我国网电攻防技术的发展提供支持。 展开更多
关键词 网电空间 网电攻击 网电攻击预想 网电攻击机理 网电对抗 网电技术
下载PDF
基于数据驱动的源网荷储协同控制系统网络攻击关联性分析 被引量:4
3
作者 许训炜 沈希澄 +2 位作者 周霞 解相朋 戴剑丰 《浙江电力》 2023年第2期76-82,共7页
源网荷储协同场景下,能源系统发展呈现多方数据交互频繁、多源数据融合的特点。随着安全防护大区外的终端接入不断增加,系统外部接口的多样化发展给传统以边界为核心的网络防护构架带来挑战。为保障源网荷储协同控制系统的安全,并对网... 源网荷储协同场景下,能源系统发展呈现多方数据交互频繁、多源数据融合的特点。随着安全防护大区外的终端接入不断增加,系统外部接口的多样化发展给传统以边界为核心的网络防护构架带来挑战。为保障源网荷储协同控制系统的安全,并对网络攻击进行有效识别,提出基于数据驱动的网络攻击异常事件关联规则分析方法。首先分析系统日志文件,建立异常事件序列;其次利用FP-Growth算法,生成源网荷储协同控制系统异常事件与网络攻击场景的关联规则;最后利用灰色关联分析算法,实现异常事件与攻击场景的在线匹配,建立源网荷储协同控制系统网络攻击关联分析框架,并验证了所提方法的可行性与有效性。 展开更多
关键词 源网荷储协同 关联规则分析 数据驱动 网络攻击
下载PDF
Study the Effectiveness of ISO 27001 to Mitigate the Cyber Security Threats in the Egyptian Downstream Oil and Gas Industry
4
作者 Mohamed Shohoud 《Journal of Information Security》 2023年第2期152-180,共29页
As Egyptian oil and gas downstream information technology has grown digitally over the past decade, security breaches against these digitally connected systems have also increased. These cyber security threats could h... As Egyptian oil and gas downstream information technology has grown digitally over the past decade, security breaches against these digitally connected systems have also increased. These cyber security threats could have devastating effects on the operations and reputation of these companies. Preventing such cyberattacks is crucial. Especially, with the significance of the Egyptian oil and gas downstream sector to the local economy and the fact that many of these connected systems are sometimes managed remotely. This paper examines the value of the ISO 27001 standard in mitigating the effect of cyber threat and seeks to inspire decision-makers to the importance of the proactive measures to strengthen their organization’s cybersecurity posture and protect information critical assets. The study stresses the importance of improving the local educational system to bridge the gap between supply and demand for cybersecurity specialists by implementing a structured approach that emphasizes behavior modification to get a high return on investment in cybersecurity awareness. 展开更多
关键词 DOWNSTREAM cyberattack Cyber Security Mitigate Decision-Makers Proac-tive Measure Critical Assets Behavior Modification
下载PDF
ResNeSt-biGRU: An Intrusion Detection Model Based on Internet of Things
5
作者 Yan Xiang Daofeng Li +2 位作者 Xinyi Meng Chengfeng Dong Guanglin Qin 《Computers, Materials & Continua》 SCIE EI 2024年第4期1005-1023,共19页
The rapid expansion of Internet of Things (IoT) devices across various sectors is driven by steadily increasingdemands for interconnected and smart technologies. Nevertheless, the surge in the number of IoT device has... The rapid expansion of Internet of Things (IoT) devices across various sectors is driven by steadily increasingdemands for interconnected and smart technologies. Nevertheless, the surge in the number of IoT device hascaught the attention of cyber hackers, as it provides them with expanded avenues to access valuable data. Thishas resulted in a myriad of security challenges, including information leakage, malware propagation, and financialloss, among others. Consequently, developing an intrusion detection system to identify both active and potentialintrusion traffic in IoT networks is of paramount importance. In this paper, we propose ResNeSt-biGRU, a practicalintrusion detection model that combines the strengths of ResNeSt, a variant of Residual Neural Network, andbidirectionalGated RecurrentUnitNetwork (biGRU).Our ResNeSt-biGRUframework diverges fromconventionalintrusion detection systems (IDS) by employing this dual-layeredmechanism that exploits the temporal continuityand spatial feature within network data streams, a methodological innovation that enhances detection accuracy.In conjunction with this, we introduce the PreIoT dataset, a compilation of prevalent IoT network behaviors, totrain and evaluate IDSmodels with a focus on identifying potential intrusion traffics. The effectiveness of proposedscheme is demonstrated through testing, wherein it achieved an average accuracy of 99.90% on theN-BaIoT datasetas well as on the PreIoT dataset and 94.45% on UNSW-NB15 dataset. The outcomes of this research reveal thepotential of ResNeSt-biGRU to bolster security measures, diminish intrusion-related vulnerabilities, and preservethe overall security of IoT ecosystems. 展开更多
关键词 Internet of Things cyberattack intrusion detection internet security
下载PDF
一种互联网办公资源安全风险在线评估方法设计(英文) 被引量:5
6
作者 郑红磊 郑重 《机床与液压》 北大核心 2018年第12期100-104,共5页
信息网络安全对于互联网办公来说具有十分重要的意义。实时网络安全风险评估作为信息安全的一个关键组成要素,能够对网络资源的安全状态进行有效检测。因此,为了提高互联网环境中办公资源的安全性,提出了一种基于预测模型的网络安全风... 信息网络安全对于互联网办公来说具有十分重要的意义。实时网络安全风险评估作为信息安全的一个关键组成要素,能够对网络资源的安全状态进行有效检测。因此,为了提高互联网环境中办公资源的安全性,提出了一种基于预测模型的网络安全风险在线评估方法。该方法使用期望最大化(expectation and maximization,EM)算法对传统连续时间隐Markov模型进行了改进,以便完成基于预测模型的风险评估。仿真实验结果显示:提出方法能够有效地完成网络安全在线预测。相比其它方法提出方法能够实现较高的准确率和实时性,能够满足互联网环境下的各种信息安全需求。 展开更多
关键词 安全预测 安全风险评估 隐马尔科夫模型 网络攻击
下载PDF
Ensemble Voting-Based Anomaly Detection for a Smart Grid Communication Infrastructure 被引量:1
7
作者 Hend Alshede Laila Nassef +1 位作者 Nahed Alowidi Etimad Fadel 《Intelligent Automation & Soft Computing》 SCIE 2023年第6期3257-3278,共22页
Advanced Metering Infrastructure(AMI)is the metering network of the smart grid that enables bidirectional communications between each consumer’s premises and the provider’s control center.The massive amount of data ... Advanced Metering Infrastructure(AMI)is the metering network of the smart grid that enables bidirectional communications between each consumer’s premises and the provider’s control center.The massive amount of data collected supports the real-time decision-making required for diverse applications.The communication infrastructure relies on different network types,including the Internet.This makes the infrastructure vulnerable to various attacks,which could compromise security or have devastating effects.However,traditional machine learning solutions cannot adapt to the increasing complexity and diversity of attacks.The objective of this paper is to develop an Anomaly Detection System(ADS)based on deep learning using the CIC-IDS2017 dataset.However,this dataset is highly imbalanced;thus,a two-step sampling technique:random under-sampling and the Synthetic Minority Oversampling Technique(SMOTE),is proposed to balance the dataset.The proposed system utilizes a multiple hidden layer Auto-encoder(AE)for feature extraction and dimensional reduction.In addition,an ensemble voting based on both Random Forest(RF)and Convolu-tional Neural Network(CNN)is developed to classify the multiclass attack cate-gories.The proposed system is evaluated and compared with six different state-of-the-art machine learning and deep learning algorithms:Random Forest(RF),Light Gradient Boosting Machine(LightGBM),eXtreme Gradient Boosting(XGboost),Convolutional Neural Network(CNN),Long Short-Term Memory(LSTM),and bidirectional LSTM(biLSTM).Experimental results show that the proposed model enhances the detection for each attack class compared with the other machine learning and deep learning models with overall accuracy(98.29%),precision(99%),recall(98%),F_(1) score(98%),and the UNDetection rate(UND)(8%). 展开更多
关键词 Advanced metering infrastructure smart grid cyberattack ensemble voting anomaly detection system CICIDS2017
下载PDF
Network Intrusion Detection Model Using Fused Machine Learning Technique 被引量:1
8
作者 Fahad Mazaed Alotaibi 《Computers, Materials & Continua》 SCIE EI 2023年第5期2479-2490,共12页
With the progress of advanced technology in the industrial revolution encompassing the Internet of Things(IoT)and cloud computing,cyberattacks have been increasing rapidly on a large scale.The rapid expansion of IoT a... With the progress of advanced technology in the industrial revolution encompassing the Internet of Things(IoT)and cloud computing,cyberattacks have been increasing rapidly on a large scale.The rapid expansion of IoT and networks in many forms generates massive volumes of data,which are vulnerable to security risks.As a result,cyberattacks have become a prevalent and danger to society,including its infrastructures,economy,and citizens’privacy,and pose a national security risk worldwide.Therefore,cyber security has become an increasingly important issue across all levels and sectors.Continuous progress is being made in developing more sophisticated and efficient intrusion detection and defensive methods.As the scale of complexity of the cyber-universe is increasing,advanced machine learning methods are the most appropriate solutions for predicting cyber threats.In this study,a fused machine learning-based intelligent model is proposed to detect intrusion in the early stage and thus secure networks from harmful attacks.Simulation results confirm the effectiveness of the proposed intrusion detection model,with 0.909 accuracy and a miss rate of 0.091. 展开更多
关键词 cyberattack machine learning PREDICTION SOLUTION intrusion detection
下载PDF
Sampled Value Attack Detection for Busbar Differential Protection Based on a Negative Selection Immune System 被引量:1
9
作者 Jun Mo Hui Yang 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2023年第2期421-433,共13页
Considering a variety of sampled value(SV)attacks on busbar differential protection(BDP)which poses challenges to conventional learning algorithms,an algorithm to detect SV attacks based on the immune system of negati... Considering a variety of sampled value(SV)attacks on busbar differential protection(BDP)which poses challenges to conventional learning algorithms,an algorithm to detect SV attacks based on the immune system of negative selection is developed in this paper.The healthy SV data of BDP are defined as self-data composed of spheres of the same size,whereas the SV attack data,i.e.,the nonself data,are preserved in the nonself space covered by spherical detectors of different sizes.To avoid the confusion between busbar faults and SV attacks,a self-shape optimization algorithm is introduced,and the improved self-data are verified through a power-frequency fault-component-based differential protection criterion to avoid false negatives.Based on the difficulty of boundary coverage in traditional negative selection algorithms,a self-data-driven detector generation algorithm is proposed to enhance the detector coverage.A testbed of differential protection for a 110 kV double busbar system is then established.Typical SV attacks of BDP such as amplitude and current phase tampering,fault replays,and the disconnection of the secondary circuits of current transformers are considered,and the delays of differential relay operation caused by detection algorithms are investigated. 展开更多
关键词 cyberattack busbar differential protection(BDP) negative selection self-data-driven detector sampled value attacks internal faults
原文传递
网络攻击对贸易的影响——基于网络安全公司数据的研究 被引量:4
10
作者 胡冠华 李兵 《产业经济评论》 2018年第5期50-63,共14页
本文利用互联网安全公司公布的网络攻击数据和双边贸易数据,使用拓展的引力模型,首次探究了网络攻击对双边贸易的影响。实证结果表明,无论是出口国还是进口国受到的网络攻击都对贸易具有阻碍作用。在分产品类别的研究中发现,网络攻击对... 本文利用互联网安全公司公布的网络攻击数据和双边贸易数据,使用拓展的引力模型,首次探究了网络攻击对双边贸易的影响。实证结果表明,无论是出口国还是进口国受到的网络攻击都对贸易具有阻碍作用。在分产品类别的研究中发现,网络攻击对资本品、中间产品的影响不显著,但是对消费品贸易有显著的阻碍作用;对出口国的网络攻击会使异质产品贸易受到显著的负面影响,对进口国的网络攻击对同质产品有显著负面影响。本文是目前第一篇研究网络攻击对贸易影响的文章,丰富了互联网对贸易的影响方面的研究内容,同时也为我国"互联网+贸易"战略的实施提供了有益的启示。 展开更多
关键词 互联网 国际贸易 网络攻击 网络安全
下载PDF
基于超图神经网络的恶意流量分类模型
11
作者 赵文博 马紫彤 杨哲 《网络与信息安全学报》 2023年第5期166-177,共12页
随着网络的普及和依赖程度的不断增加,恶意流量的泛滥已经成为网络安全领域的严重挑战。在这个数字时代,网络攻击者不断寻找新的方式来侵入系统、窃取数据和破坏网络服务。开发更有效的入侵检测系统,及时发现并应对恶意流量,可以应对网... 随着网络的普及和依赖程度的不断增加,恶意流量的泛滥已经成为网络安全领域的严重挑战。在这个数字时代,网络攻击者不断寻找新的方式来侵入系统、窃取数据和破坏网络服务。开发更有效的入侵检测系统,及时发现并应对恶意流量,可以应对网络攻击的持续威胁,极大地减少网络攻击带来的损失。然而现有的恶意流量分类方法存在一些限制,其中之一是过度依赖对数据特征的选择。为了提高恶意流量分类的效果,提出了一种创新的方法,即基于超图神经网络的恶意流量分类模型。这一模型的核心思想是将流量数据表示为超图结构,并利用超图神经网络(HGNN,hypergraph neural network)来捕获流量的空间特征。HGNN能够更全面地考虑流量数据之间的关系,从而更准确地表征恶意流量的特征。此外,为了处理流量数据的时间特征,引入了循环神经网络(RNN,recurrent neural network),进一步提高了分类模型的性能。最终,提取的时空特征被用于进行恶意流量分类,从而帮助检测网络中的潜在威胁。通过一系列消融实验,验证了HGNN+RNN模型的有效性,证明其能够高效提取流量的时空特征,从而改善了恶意流量的分类性能。在3个广泛使用的开源数据集,即NSL-KDD、UNSW-NB15和CIC-IDS-2017上,模型取得了卓越的分类准确率,分别达到了94%、95.6%和99.08%。这些结果表明,基于超图神经网络的恶意流量分类模型在提高网络安全水平方面具有潜在的重要意义,有望帮助网络安全领域更好地应对不断演变的网络威胁。 展开更多
关键词 恶意流量 网络攻击 超图神经网络 循环神经网络
下载PDF
Suppression strategies in different propagation periods of cyberattacks in merging area under connected environment
12
作者 Qiuling Wang Kailiang An +1 位作者 Zhizhen Liu Wenying Guan 《Journal of Traffic and Transportation Engineering(English Edition)》 EI CSCD 2023年第6期1148-1161,共14页
In order to ensure the safety of connected and automated vehicles(CAVs)threatened by cyberattack in the confluence area and mitigate the adverse impact of cyberattack propagation,a framework is built to depict the imp... In order to ensure the safety of connected and automated vehicles(CAVs)threatened by cyberattack in the confluence area and mitigate the adverse impact of cyberattack propagation,a framework is built to depict the impact of cyberattacks on traffic operation.Based on this framework,corresponding propagation suppression strategies are proposed for different types of cyberattacks in different periods.Under centralized control,game theory is used to solve the confluence sequence corresponding to the strategies.The results show that the proposed method can effectively inhibit the spread of cyberattacks on the premise of security.The initial control effect is the best.Compared with uncontrolled condition,in the 100 timesteps,11 susceptible vehicles are finally added,and the second is the immunity period,in which 10 susceptible vehicles were protected from cyberattack.Outbreak and latency control strategies also protect some vehicles.Under the control strategy of each stage,the peak value of infected vehicles and the duration of cyberattack are improved compared with the uncontrolled strategy.In addition,the traffic efficiency in the confluence area is also improved.This method can also be extended to such road types as diverging section,weaving section and intersection,so as to reduce the impact of cyberattacks on road network scale. 展开更多
关键词 Connected and automated vehicles cyberattack Propagation dynamics Game theory Vehicle control
原文传递
Intelligent Cybersecurity Classification Using Chaos Game Optimization with Deep Learning Model
13
作者 Eatedal Alabdulkreem Saud S.Alotaibi +5 位作者 Mohammad Alamgeer Radwa Marzouk Anwer Mustafa Hilal Abdelwahed Motwakel Abu Sarwar Zamani Mohammed Rizwanullah 《Computer Systems Science & Engineering》 SCIE EI 2023年第4期971-983,共13页
Cyberattack detection has become an important research domain owing to increasing number of cybercrimes in recent years.Both Machine Learning(ML)and Deep Learning(DL)classification models are useful in effective ident... Cyberattack detection has become an important research domain owing to increasing number of cybercrimes in recent years.Both Machine Learning(ML)and Deep Learning(DL)classification models are useful in effective identification and classification of cyberattacks.In addition,the involvement of hyper parameters in DL models has a significantly influence upon the overall performance of the classification models.In this background,the current study develops Intelligent Cybersecurity Classification using Chaos Game Optimization with Deep Learning(ICC-CGODL)Model.The goal of the proposed ICC-CGODL model is to recognize and categorize different kinds of attacks made upon data.Besides,ICC-CGODL model primarily performs min-max normalization process to normalize the data into uniform format.In addition,Bidirectional Gated Recurrent Unit(BiGRU)model is utilized for detection and classification of cyberattacks.Moreover,CGO algorithm is also exploited to adjust the hyper parameters involved in BiGRU model which is the novelty of current work.A wide-range of simulation analysis was conducted on benchmark dataset and the results obtained confirmed the significant performance of ICC-CGODL technique than the recent approaches. 展开更多
关键词 Deep learning chaos game optimization CYBERSECURITY chaos game optimization cyberattack
下载PDF
Blockchain Assisted Optimal Machine Learning Based Cyberattack Detection and Classification Scheme
14
作者 Manal Abdullah Alohali Muna Elsadig +3 位作者 Fahd N.Al-Wesabi Mesfer Al Duhayyim Anwer Mustafa Hilal Abdelwahed Motwakel 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3583-3598,共16页
With recent advancements in information and communication technology,a huge volume of corporate and sensitive user data was shared consistently across the network,making it vulnerable to an attack that may be brought ... With recent advancements in information and communication technology,a huge volume of corporate and sensitive user data was shared consistently across the network,making it vulnerable to an attack that may be brought some factors under risk:data availability,confidentiality,and integrity.Intrusion Detection Systems(IDS)were mostly exploited in various networks to help promptly recognize intrusions.Nowadays,blockchain(BC)technology has received much more interest as a means to share data without needing a trusted third person.Therefore,this study designs a new Blockchain Assisted Optimal Machine Learning based Cyberattack Detection and Classification(BAOML-CADC)technique.In the BAOML-CADC technique,the major focus lies in identifying cyberattacks.To do so,the presented BAOML-CADC technique applies a thermal equilibrium algorithm-based feature selection(TEA-FS)method for the optimal choice of features.The BAOML-CADC technique uses an extreme learning machine(ELM)model for cyberattack recognition.In addition,a BC-based integrity verification technique is developed to defend against the misrouting attack,showing the innovation of the work.The experimental validation of BAOML-CADC algorithm is tested on a benchmark cyberattack dataset.The obtained values implied the improved performance of the BAOML-CADC algorithm over other techniques. 展开更多
关键词 cyberattack machine learning blockchain thermal equilibrium algorithm feature selection
下载PDF
Enhanced Metaheuristics with Machine Learning Enabled Cyberattack Detection Model
15
作者 Ahmed S.Almasoud 《Intelligent Automation & Soft Computing》 SCIE 2023年第9期2849-2863,共15页
The Internet of Things(IoT)is considered the next-gen connection network and is ubiquitous since it is based on the Internet.Intrusion Detection System(IDS)determines the intrusion performance of terminal equipment an... The Internet of Things(IoT)is considered the next-gen connection network and is ubiquitous since it is based on the Internet.Intrusion Detection System(IDS)determines the intrusion performance of terminal equipment and IoT communication procedures from IoT environments after taking equivalent defence measures based on the identified behaviour.In this back-ground,the current study develops an Enhanced Metaheuristics with Machine Learning enabled Cyberattack Detection and Classification(EMML-CADC)model in an IoT environment.The aim of the presented EMML-CADC model is to detect cyberattacks in IoT environments with enhanced efficiency.To attain this,the EMML-CADC model primarily employs a data preprocessing stage to normalize the data into a uniform format.In addition,Enhanced Cat Swarm Optimization based Feature Selection(ECSO-FS)approach is followed to choose the optimal feature subsets.Besides,Mayfly Optimization(MFO)with Twin Support Vector Machine(TSVM),called the MFO-TSVM model,is utilized for the detection and classification of cyberattacks.Here,the MFO model has been exploited to fine-tune the TSVM variables for enhanced results.The performance of the proposed EMML-CADC model was validated using a benchmark dataset,and the results were inspected under several measures.The comparative study concluded that the EMML-CADC model is superior to other models under different measures. 展开更多
关键词 Metaheuristics cyberattack detection machine learning cat swarm optimization SECURITY
下载PDF
网络流量异常检测综述 被引量:2
16
作者 吴迪锋 孙昊翔 +1 位作者 曹浪 谭天 《信息安全与通信保密》 2022年第8期101-111,共11页
随着网络攻击的复杂化、自动化、智能化水平的不断提高,网络中不断涌现出新的攻击类型,这些未曾见过的新攻击给基于特征码的网络攻击检测和响应带来了极大挑战。网络流量异常检测通过对网络流量进行分析,可以检测出与正常流量明显不同... 随着网络攻击的复杂化、自动化、智能化水平的不断提高,网络中不断涌现出新的攻击类型,这些未曾见过的新攻击给基于特征码的网络攻击检测和响应带来了极大挑战。网络流量异常检测通过对网络流量进行分析,可以检测出与正常流量明显不同的流量,因其不依赖于静态特征码,被看作检测未知新攻击的有效手段。研究人员针对异常网络流量的检测提出了许多方案,包括基于统计学习法、基于无监督机器学习的方案、基于监督机器学习的方案,从流量特点、特征工程到检测模型,再到应用场景对这些方案进行了系统性综述。 展开更多
关键词 网络攻击 异常检测 机器学习 特征工程
下载PDF
Data-driven approaches for cyber defense of battery energy storage systems 被引量:2
17
作者 Nina Kharlamova Seyedmostafa Hashemi Chresten Træholt 《Energy and AI》 2021年第3期379-387,共9页
Battery energy storage system(BESS)is an important component of a modern power system since it allows seamless integration of renewable energy sources(RES)into the grid.A BESS is vulnerable to various cyber threats th... Battery energy storage system(BESS)is an important component of a modern power system since it allows seamless integration of renewable energy sources(RES)into the grid.A BESS is vulnerable to various cyber threats that may influence its proper operation,which in turn impacts negatively the BESS and the electric grid.The potential failure of a BESS can cause economic issues and physical damage to its components.To ensure cyber-secure and reliable BESS operation in grid-connected or islanded modes of the BESS operation,a cyber-defense strategy is needed.However,a comprehensive review on the requirements for the BESS design as well as the attack detection and mitigation methods is lacking.In this paper,we review state-of-the-art attack detection and mitigation methods for various BESS applications focusing on machine learning(ML)and artificial intelligence(AI)-based methods.In addition,the state-of-the-art methods for designing and operating a cyber-secure BESS are investigated.Based on the literature review,we identified gaps in the current research,defined the possible cyberattacks against the BESS that have not been considered before,and suggested the potential approaches to detect them. 展开更多
关键词 Cyber security Artificial intelligence Battery energy storage system False data injection attack cyberattack Machine learning
原文传递
Impact Analysis of Resilience Against Malicious Code Attacks via Emails
18
作者 Chulwon Lee Kyungho Lee 《Computers, Materials & Continua》 SCIE EI 2022年第9期4803-4816,共14页
The damage caused by malicious software is increasing owing to the COVID-19 pandemic,such as ransomware attacks on information technology and operational technology systems based on corporate networks and social infra... The damage caused by malicious software is increasing owing to the COVID-19 pandemic,such as ransomware attacks on information technology and operational technology systems based on corporate networks and social infrastructures and spear-phishing attacks on business or research institutes.Recently,several studies have been conducted to prevent further phishing emails in the workplace because malware attacks employ emails as the primary means of penetration.However,according to the latest research,there appears to be a limitation in blocking email spoofing through advanced blocking systems such as spam email filtering solutions and advanced persistent threat systems.Therefore,experts believe that it is more critical to restore services immediately through resilience than the advanced prevention program in the event of damage caused by malicious software.In accordance with this trend,we conducted a survey among 100 employees engaging in information security regarding the effective factors for countering malware attacks through email.Furthermore,we confirmed that resilience,backup,and restoration were effective factors in responding to phishing emails.In contrast,practical exercise and attack visualization were recognized as having little effect on malware attacks.In conclusion,our study reminds business and supervisory institutions to carefully examine their regular voluntary exercises or mandatory training programs and assists private corporations and public institutions to establish counter-strategies for dealing with malware attacks. 展开更多
关键词 cyberattack RESILIENCE malicious code spear-phishing
下载PDF
Three-stage Defensive Framework for Distributed Microgrid Control Against Cyberattacks
19
作者 Xuanyi Xiao Quan Zhou +1 位作者 Feng Wang Wen Huang 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2022年第6期1669-1678,共10页
With the wide integration of various distributed communication and control techniques,the cyber-physical microgrids face critical challenges raised by the emerging cyberattacks.This paper proposes a three-stage defens... With the wide integration of various distributed communication and control techniques,the cyber-physical microgrids face critical challenges raised by the emerging cyberattacks.This paper proposes a three-stage defensive framework for distributed microgrids against denial of service(DoS)and false data injection(FDI)attacks,including resilient control,communication network reconfiguration,and switching of local control.The resilient control in the first stage is capable of tackling simultaneous DoS and FDI attacks when the connectivity of communication network could be maintained under cyberattacks.The communication network reconfiguration method in the second stage and the subsequent switching of local control in the third stage based on the software-defined network(SDN)layer aim to cope with the network partitions caused by cyberattacks.The proposed defensive framework could effectively mitigate the impacts of a wide range of simultaneous DoS and FDI attacks in microgrids without requiring the specific assumptions of attacks and prompt detections,which would not incorporate additional cyberattack risks.Extensive case studies using a 13-bus microgrid system are conducted to validate the effectiveness of the proposed three-stage defensive framework against the simultaneous DoS and FDI attacks. 展开更多
关键词 MICROGRID cyber-physical systems cyberattack distributed control defensive framework
原文传递
The“Bitcoin Generator”Scam
20
作者 Emad Badawi Guy-Vincent Jourdan Iosif-Viorel Onut 《Blockchain(Research and Applications)》 2022年第3期70-88,共19页
The“Bitcoin Generator Scam”(BGS)is a cyberattack in which scammers promise to provide victims with free cryptocurrencies in exchange for a small mining fee.In this paper,we present a data-driven system to detect,tra... The“Bitcoin Generator Scam”(BGS)is a cyberattack in which scammers promise to provide victims with free cryptocurrencies in exchange for a small mining fee.In this paper,we present a data-driven system to detect,track,and analyze the BGS.It works as follows:we first formulate search queries related to BGS and use search engines to find potential instances of the scam.We then use a crawler to access these pages and a classifier to differentiate actual scam instances from benign pages.Last,we automatically monitor the BGS instances to extract the cryptocurrency addresses used in the scam.A unique feature of our system is that it proactively searches for and detects the scam pages.Thus,we can find addresses that have not yet received any transactions.Our data collection project spanned 16 months,from November 2019 to February 2021.We uncovered more than 8,000 cryptocurrency addresses directly associated with the scam,hosted on over 1,000 domains.Overall,these addresses have received around 8.7 million USD,with an average of 49.24 USD per transaction.Over 70%of the active addresses that we are capturing are detected before they receive any transactions,that is,before anyone is victimized.We also present some post-processing analysis of the dataset that we have captured to aggregate attacks that can be reasonably confidently linked to the same attacker or group.Our system is one of the first academic feeds to the APWG eCrime Exchange database.It has been actively and automatically feeding the database since November 2020. 展开更多
关键词 Cryptocurrency Scam analysis cyberattack Fraud detection Bitcoin Blockchain analysis Data mining
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部