Analysis of cyber-attacks on smart grid applications
Cyber-security is the whole process of preventing damage to the confidentiality, integrity, and availability of information assets as a result of the use of vulnerabilities in information assets by threats. So, confidentiality, integrity, and availability (CIA) which are the key elements of the cybe...
Saved in:
Published in | 2018 International Conference on Artificial Intelligence and Data Processing (IDAP) pp. 1 - 5 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.09.2018
|
Subjects | |
Online Access | Get full text |
DOI | 10.1109/IDAP.2018.8620728 |
Cover
Loading…
Abstract | Cyber-security is the whole process of preventing damage to the confidentiality, integrity, and availability of information assets as a result of the use of vulnerabilities in information assets by threats. So, confidentiality, integrity, and availability (CIA) which are the key elements of the cyber-security must be provided properly. One of the biggest problems in implementing today's critical infrastructures is the cyber security threats and cyber-attacks. Smart grids stand out in terms of providing efficiency in the generation, transmission, and distribution of electrical energy which is the main element of critical infrastructures. The widespread use of the smart grids requires to identify and classify the threats also precautions to be taken against them. Affected of smart grids at the minimum level by cyber attacks requires that the essential elements of information security must be provided at the maximum level. In this context, in the study; Attacker types, attack types in smart grids and huge cyber-attacks on power systems are introduced. Furthermore, the key objectives and requirements of cyber-security in smart grids are presented. Also, attack types that can be performed in smart grids are classified according to confidentiality, integrity and availability principles. Lastly, the study is evaluated. |
---|---|
AbstractList | Cyber-security is the whole process of preventing damage to the confidentiality, integrity, and availability of information assets as a result of the use of vulnerabilities in information assets by threats. So, confidentiality, integrity, and availability (CIA) which are the key elements of the cyber-security must be provided properly. One of the biggest problems in implementing today's critical infrastructures is the cyber security threats and cyber-attacks. Smart grids stand out in terms of providing efficiency in the generation, transmission, and distribution of electrical energy which is the main element of critical infrastructures. The widespread use of the smart grids requires to identify and classify the threats also precautions to be taken against them. Affected of smart grids at the minimum level by cyber attacks requires that the essential elements of information security must be provided at the maximum level. In this context, in the study; Attacker types, attack types in smart grids and huge cyber-attacks on power systems are introduced. Furthermore, the key objectives and requirements of cyber-security in smart grids are presented. Also, attack types that can be performed in smart grids are classified according to confidentiality, integrity and availability principles. Lastly, the study is evaluated. |
Author | Das, Resul Gunduz, M. Zekeriya |
Author_xml | – sequence: 1 givenname: M. Zekeriya surname: Gunduz fullname: Gunduz, M. Zekeriya organization: Department of Computer Science and Technology, Bingol University, Bingol, Turkey – sequence: 2 givenname: Resul surname: Das fullname: Das, Resul organization: Department of Software Engineering, Firat University, 23119 Elazig, Turkey |
BookMark | eNotj7lqw0AURScQF7GTDzBp5gekzKZZSuEsNhiSwr15fnoOQ5SR0Eyjv48gri6c4nDumt2nIRFjWylqKUV4Oby2X7US0tfeKuGUv2Nr2WhvrXe-eWCmTdDPOWY-XDnOF5oqKAXwZwGJ51-YCv-eYsdhHPuIUOKQ8iNbXaHP9HTbDTu9v512--r4-XHYtccqBlEqNKEjK0h2jlyDqLRuyGgCD1IFZ11QxpAF9AIuqBSEzjthFVqJHpfIDXv-10YiOo9TXGrm8-2H_gNSFkE9 |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/IDAP.2018.8620728 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 1538668785 9781538668788 |
EndPage | 5 |
ExternalDocumentID | 8620728 |
Genre | orig-research |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-i90t-c49de60e1d7e75cc2335e43ea8a1297679244e6ac80abc22a9d87062c61c8c153 |
IEDL.DBID | RIE |
IngestDate | Thu Jun 29 18:39:30 EDT 2023 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i90t-c49de60e1d7e75cc2335e43ea8a1297679244e6ac80abc22a9d87062c61c8c153 |
PageCount | 5 |
ParticipantIDs | ieee_primary_8620728 |
PublicationCentury | 2000 |
PublicationDate | 2018-Sept. |
PublicationDateYYYYMMDD | 2018-09-01 |
PublicationDate_xml | – month: 09 year: 2018 text: 2018-Sept. |
PublicationDecade | 2010 |
PublicationTitle | 2018 International Conference on Artificial Intelligence and Data Processing (IDAP) |
PublicationTitleAbbrev | IDAP |
PublicationYear | 2018 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
Score | 1.7487817 |
Snippet | Cyber-security is the whole process of preventing damage to the confidentiality, integrity, and availability of information assets as a result of the use of... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1 |
SubjectTerms | Computer security Computer worms Critical infrastructure cyber-attacks cyber-security IoT security smart grid security Smart grids Terrorism |
Title | Analysis of cyber-attacks on smart grid applications |
URI | https://ieeexplore.ieee.org/document/8620728 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8MwDI62nTgB2hBv5cCRdGmXPnJEwDSQhnYY0m5T4jhoQrRotAf49SRtNx7iwC2KIiWOrTi2P9uEXFgA7eRGMy1FwoSNYqatNswIaa01GlTtupg-JJNHcb-IFx1yuc2FQcQafIaBH9axfFNA5V1lQ_f75mmUdUnXiVmTq9UGKkMuh3c3VzOP1cqCdt2Phim1vhjvkulmpwYm8hxUpQ7g41cRxv8eZY8MvjLz6Gyrc_ZJB_M-EZvKIrSwFN41rpkqS588T4ucvr046aBP65Wh36PVAzIf386vJ6zthsBWkpcMhDSYcAxNimkMEI1GMYoRqkw5lZ0mqTOkBCYKMq40RJGSxocwI0hCyMC9aweklxc5HhKacKO5RpF5-0iDzMAoETpmiVTJiIsj0vcEL1-behfLltbjv6dPyI6_9AZ3dUp65brCM6eoS31ec-gTQAiV7A |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwELZKGWAC1CLeeGDEqZM6D48IqFpoqw5F6lbZ5wuqEAkq6QC_HjtJeYmBzbIs2ac7-fM9vjMhFymAtnajmZYiYiINQqZTbZgRMk1To0GVoYvROOo_iLtZOGuQy08uDCKWxWfouWGZyzc5rFyorGNf3zwOkg2yaXFfhBVbq05V-lx2BjdXE1etlXj1yh9fppSI0dsho_VeVaHIk7cqtAfvv9ow_vcwu6T9xc2jk0_U2SMNzFpErHuL0Dyl8KZxyVRROPo8zTP6-mztgz4uF4Z-z1e3ybR3O73us_o_BLaQvGAgpMGIo29ijEOAoNsNUXRRJcqCdhzF1pUSGClIuNIQBEoal8QMIPIhAXuz7ZNmlmd4QGjEjeYaReI8JA0yAaOEb9UlYiUDLg5Jywk8f6k6XsxrWY_-nj4nW_3paDgfDsb3x2TbKaCqwjohzWK5wlML24U-K7X1AU0vmTk |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2018+International+Conference+on+Artificial+Intelligence+and+Data+Processing+%28IDAP%29&rft.atitle=Analysis+of+cyber-attacks+on+smart+grid+applications&rft.au=Gunduz%2C+M.+Zekeriya&rft.au=Das%2C+Resul&rft.date=2018-09-01&rft.pub=IEEE&rft.spage=1&rft.epage=5&rft_id=info:doi/10.1109%2FIDAP.2018.8620728&rft.externalDocID=8620728 |