Analysis of cyber-attacks on smart grid applications

Cyber-security is the whole process of preventing damage to the confidentiality, integrity, and availability of information assets as a result of the use of vulnerabilities in information assets by threats. So, confidentiality, integrity, and availability (CIA) which are the key elements of the cybe...

Full description

Saved in:
Bibliographic Details
Published in2018 International Conference on Artificial Intelligence and Data Processing (IDAP) pp. 1 - 5
Main Authors Gunduz, M. Zekeriya, Das, Resul
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.09.2018
Subjects
Online AccessGet full text
DOI10.1109/IDAP.2018.8620728

Cover

Loading…
Abstract Cyber-security is the whole process of preventing damage to the confidentiality, integrity, and availability of information assets as a result of the use of vulnerabilities in information assets by threats. So, confidentiality, integrity, and availability (CIA) which are the key elements of the cyber-security must be provided properly. One of the biggest problems in implementing today's critical infrastructures is the cyber security threats and cyber-attacks. Smart grids stand out in terms of providing efficiency in the generation, transmission, and distribution of electrical energy which is the main element of critical infrastructures. The widespread use of the smart grids requires to identify and classify the threats also precautions to be taken against them. Affected of smart grids at the minimum level by cyber attacks requires that the essential elements of information security must be provided at the maximum level. In this context, in the study; Attacker types, attack types in smart grids and huge cyber-attacks on power systems are introduced. Furthermore, the key objectives and requirements of cyber-security in smart grids are presented. Also, attack types that can be performed in smart grids are classified according to confidentiality, integrity and availability principles. Lastly, the study is evaluated.
AbstractList Cyber-security is the whole process of preventing damage to the confidentiality, integrity, and availability of information assets as a result of the use of vulnerabilities in information assets by threats. So, confidentiality, integrity, and availability (CIA) which are the key elements of the cyber-security must be provided properly. One of the biggest problems in implementing today's critical infrastructures is the cyber security threats and cyber-attacks. Smart grids stand out in terms of providing efficiency in the generation, transmission, and distribution of electrical energy which is the main element of critical infrastructures. The widespread use of the smart grids requires to identify and classify the threats also precautions to be taken against them. Affected of smart grids at the minimum level by cyber attacks requires that the essential elements of information security must be provided at the maximum level. In this context, in the study; Attacker types, attack types in smart grids and huge cyber-attacks on power systems are introduced. Furthermore, the key objectives and requirements of cyber-security in smart grids are presented. Also, attack types that can be performed in smart grids are classified according to confidentiality, integrity and availability principles. Lastly, the study is evaluated.
Author Das, Resul
Gunduz, M. Zekeriya
Author_xml – sequence: 1
  givenname: M. Zekeriya
  surname: Gunduz
  fullname: Gunduz, M. Zekeriya
  organization: Department of Computer Science and Technology, Bingol University, Bingol, Turkey
– sequence: 2
  givenname: Resul
  surname: Das
  fullname: Das, Resul
  organization: Department of Software Engineering, Firat University, 23119 Elazig, Turkey
BookMark eNotj7lqw0AURScQF7GTDzBp5gekzKZZSuEsNhiSwr15fnoOQ5SR0Eyjv48gri6c4nDumt2nIRFjWylqKUV4Oby2X7US0tfeKuGUv2Nr2WhvrXe-eWCmTdDPOWY-XDnOF5oqKAXwZwGJ51-YCv-eYsdhHPuIUOKQ8iNbXaHP9HTbDTu9v512--r4-XHYtccqBlEqNKEjK0h2jlyDqLRuyGgCD1IFZ11QxpAF9AIuqBSEzjthFVqJHpfIDXv-10YiOo9TXGrm8-2H_gNSFkE9
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/IDAP.2018.8620728
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 1538668785
9781538668788
EndPage 5
ExternalDocumentID 8620728
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i90t-c49de60e1d7e75cc2335e43ea8a1297679244e6ac80abc22a9d87062c61c8c153
IEDL.DBID RIE
IngestDate Thu Jun 29 18:39:30 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-c49de60e1d7e75cc2335e43ea8a1297679244e6ac80abc22a9d87062c61c8c153
PageCount 5
ParticipantIDs ieee_primary_8620728
PublicationCentury 2000
PublicationDate 2018-Sept.
PublicationDateYYYYMMDD 2018-09-01
PublicationDate_xml – month: 09
  year: 2018
  text: 2018-Sept.
PublicationDecade 2010
PublicationTitle 2018 International Conference on Artificial Intelligence and Data Processing (IDAP)
PublicationTitleAbbrev IDAP
PublicationYear 2018
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.7487817
Snippet Cyber-security is the whole process of preventing damage to the confidentiality, integrity, and availability of information assets as a result of the use of...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Computer security
Computer worms
Critical infrastructure
cyber-attacks
cyber-security
IoT security
smart grid security
Smart grids
Terrorism
Title Analysis of cyber-attacks on smart grid applications
URI https://ieeexplore.ieee.org/document/8620728
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8MwDI62nTgB2hBv5cCRdGmXPnJEwDSQhnYY0m5T4jhoQrRotAf49SRtNx7iwC2KIiWOrTi2P9uEXFgA7eRGMy1FwoSNYqatNswIaa01GlTtupg-JJNHcb-IFx1yuc2FQcQafIaBH9axfFNA5V1lQ_f75mmUdUnXiVmTq9UGKkMuh3c3VzOP1cqCdt2Phim1vhjvkulmpwYm8hxUpQ7g41cRxv8eZY8MvjLz6Gyrc_ZJB_M-EZvKIrSwFN41rpkqS588T4ucvr046aBP65Wh36PVAzIf386vJ6zthsBWkpcMhDSYcAxNimkMEI1GMYoRqkw5lZ0mqTOkBCYKMq40RJGSxocwI0hCyMC9aweklxc5HhKacKO5RpF5-0iDzMAoETpmiVTJiIsj0vcEL1-behfLltbjv6dPyI6_9AZ3dUp65brCM6eoS31ec-gTQAiV7A
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwELZKGWAC1CLeeGDEqZM6D48IqFpoqw5F6lbZ5wuqEAkq6QC_HjtJeYmBzbIs2ac7-fM9vjMhFymAtnajmZYiYiINQqZTbZgRMk1To0GVoYvROOo_iLtZOGuQy08uDCKWxWfouWGZyzc5rFyorGNf3zwOkg2yaXFfhBVbq05V-lx2BjdXE1etlXj1yh9fppSI0dsho_VeVaHIk7cqtAfvv9ow_vcwu6T9xc2jk0_U2SMNzFpErHuL0Dyl8KZxyVRROPo8zTP6-mztgz4uF4Z-z1e3ybR3O73us_o_BLaQvGAgpMGIo29ijEOAoNsNUXRRJcqCdhzF1pUSGClIuNIQBEoal8QMIPIhAXuz7ZNmlmd4QGjEjeYaReI8JA0yAaOEb9UlYiUDLg5Jywk8f6k6XsxrWY_-nj4nW_3paDgfDsb3x2TbKaCqwjohzWK5wlML24U-K7X1AU0vmTk
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2018+International+Conference+on+Artificial+Intelligence+and+Data+Processing+%28IDAP%29&rft.atitle=Analysis+of+cyber-attacks+on+smart+grid+applications&rft.au=Gunduz%2C+M.+Zekeriya&rft.au=Das%2C+Resul&rft.date=2018-09-01&rft.pub=IEEE&rft.spage=1&rft.epage=5&rft_id=info:doi/10.1109%2FIDAP.2018.8620728&rft.externalDocID=8620728