Coverart for item
The Resource Security and Resiliency Analytics for Smart Grids : Static and Dynamic Approaches

Security and Resiliency Analytics for Smart Grids : Static and Dynamic Approaches

Label
Security and Resiliency Analytics for Smart Grids : Static and Dynamic Approaches
Title
Security and Resiliency Analytics for Smart Grids
Title remainder
Static and Dynamic Approaches
Creator
Contributor
Subject
Language
eng
Member of
Cataloging source
MiAaPQ
Literary form
non fiction
Nature of contents
dictionaries
Series statement
Advances in Information Security
Series volume
v.67
Security and Resiliency Analytics for Smart Grids : Static and Dynamic Approaches
Label
Security and Resiliency Analytics for Smart Grids : Static and Dynamic Approaches
Link
http://libproxy.rpi.edu/login?url=https://ebookcentral.proquest.com/lib/rpi/detail.action?docID=4550056
Publication
Copyright
Related Contributor
Related Location
Related Agents
Related Authorities
Related Subjects
Related Items
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Preface -- Acknowledgements -- Contents -- Acronyms -- Part I Introduction -- 1 Smart Grids and Security Challenges -- 1.1 Smart Grid Overview -- 1.2 AMI -- 1.3 SCADA -- 1.4 Potential Threats -- 1.5 Security Goals and Challenges -- 1.5.1 Security Goals -- 1.5.2 Challenges -- 1.6 Summary -- References -- 2 Analytics for Smart Grid Security and Resiliency -- 2.1 Formal Analytics -- 2.2 Technical Approach Overview -- 2.2.1 Security Analytics for AMI and SCADA -- 2.2.2 Security Analytics for EMS Modules -- 2.2.3 Intrusion Detection Systems for AMI -- 2.3 Overview of SMT and Probabilistic Model Checking -- 2.3.1 Satisfiability Modulo Theories -- 2.3.1.1 Z3 -- 2.3.2 Probabilistic Model Checking -- 2.3.2.1 PRISM -- 2.4 Summary -- References -- Part II Formal Analytics for Secure and Resilient Smart Grids -- 3 Security Analytics for AMI and SCADA -- 3.1 Overview of the Security Analysis Framework -- 3.2 AMI Security Analysis -- 3.2.1 Preliminary -- 3.2.2 Formal Model of AMI Security Verification -- 3.2.2.1 AMI Configuration Model -- 3.2.2.2 AMI Threat Verification Model -- 3.2.3 Implementation -- 3.2.3.1 SMT Encoding and Constraint Verification -- 3.2.3.2 Methodology of Unsatisfied-Core Generation -- 3.2.3.3 Methodology of Remediation Plan Synthesis -- 3.2.3.4 Verification Trace Analysis: An Example -- 3.3 SCADA Security Analysis -- 3.3.1 Preliminary -- 3.3.2 Formal Model of SCADA Security Verification -- 3.3.2.1 SCADA Configuration Model -- 3.3.2.2 SCADA Threat Verification Model -- 3.3.3 Implementation -- 3.3.3.1 SMT Encoding -- 3.3.3.2 An Example -- 3.4 Scalability of the Security Analysis Framework -- 3.4.1 Time Complexity Analysis -- 3.4.2 Memory Complexity Analysis -- 3.4.3 Time Complexity in Unsatisfied Cases -- 3.5 Summary -- References -- 4 Security Analytics for EMS Modules -- 4.1 Preliminaries -- 4.1.1 DC Power Flow Mode
  • 4.1.2 State Estimation -- 4.1.3 Topology Processor -- 4.1.4 Optimal Power Flow -- 4.1.5 UFDI Attack -- 4.1.6 Attack Attributes -- 4.2 Stealthy Attack Verification -- 4.2.1 Formalizations of Power Flow Equations -- 4.2.2 Formalization of Change in State Estimation -- 4.2.3 Formalization of Topology Change -- 4.2.4 Formalization of False Data Injection to Measurements -- 4.2.5 Formalization of Attack Attributes -- 4.2.5.1 Attacker's Knowledge -- 4.2.5.2 Attacker's Accessibility -- 4.2.5.3 Attacker's Resource -- 4.2.5.4 Attack Target -- 4.2.6 An Example Case Study -- 4.2.6.1 Implementation -- 4.2.6.2 Example -- 4.3 Impact Analysis of Stealthy Attacks -- 4.3.1 Impact Analysis Framework Design -- 4.3.2 Formalization of Optimal Power Flow -- 4.3.3 Formalization of Attack Impact on OPF -- 4.3.3.1 Change in Loads Due to Stealthy Attacks -- 4.3.3.2 Impact on OPF -- 4.3.4 An Example Case Study -- 4.4 Security Hardening Against Stealthy Attacks -- 4.4.1 Synthesis Design -- 4.4.2 Formalization of Candidate Architecture Selection -- 4.4.3 An Example Case Study -- 4.5 Proactive Defense Against Persistent Attacks -- 4.5.1 Moving Target Defense Strategy -- 4.5.1.1 Randomization of the Set of Measurements -- 4.5.1.2 Perturbation of Line Admittances -- 4.5.2 Formal Model for Strategy Selection -- 4.5.2.1 Selection of a Measurement Set -- 4.5.2.2 Selection of Lines and Admittance Perturbations -- 4.5.2.3 Impact of MTD on Attack Attributes -- 4.5.3 An Example Case Study -- 4.5.3.1 Implementation -- 4.5.3.2 Case Analysis Results -- 4.6 Evaluation -- 4.6.1 Methodology -- 4.6.2 Time Complexity of Verification Model -- 4.6.2.1 Impact of the Problem Size -- 4.6.2.2 Impact of the Constraints -- 4.6.2.3 Performance in Unsatisfiable Cases -- 4.6.3 Time Complexity of Impact Analysis -- 4.6.3.1 Impact of the Problem Size -- 4.6.3.2 Performance in Unsatisfiable Cases
  • 4.6.4 Time Complexity of Synthesis Mechanism -- 4.6.4.1 Impact of the Problem Size -- 4.6.4.2 Impact of the Constraints -- 4.6.4.3 Performance in Unsatisfied Cases -- 4.6.5 Time Complexity of MTD Strategy Selection Models -- 4.6.6 Memory Complexity -- 4.7 Summary -- References -- 5 Intrusion Detection Systems for AMI -- 5.1 Background -- 5.2 Dataset -- 5.3 Statistical Analysis and Motivation -- 5.4 Technical Approach -- 5.4.1 AMI Modeling -- 5.4.2 Properties Specification for Model Checking -- 5.4.3 Randomization Module -- 5.4.3.1 Mutation Algorithm -- 5.5 Evaluation -- 5.5.1 Attack Model -- 5.5.2 Robustness Against Evasion and Mimicry Attacks -- 5.5.3 Accuracy Evaluation -- 5.5.3.1 Temporal Behavior of the Model -- 5.5.3.2 Model Accuracy -- 5.5.3.3 Detection Accuracy -- 5.5.4 Scalability -- 5.5.5 Limitations -- 5.6 Summary -- References -- A Resiliency Threat Analysis for SCADA -- A.1 k-Resilient Secured Observability Threat Model -- A.2 A Case Study -- Index
http://library.link/vocab/cover_art
https://contentcafe2.btol.com/ContentCafe/Jacket.aspx?Return=1&Type=S&Value=9783319328713&userID=ebsco-test&password=ebsco-test
Dimensions
unknown
http://library.link/vocab/discovery_link
{'f': 'http://opac.lib.rpi.edu/record=b4385491'}
Extent
1 online resource (156 pages)
Form of item
online
Isbn
9783319328713
Media category
computer
Media MARC source
rdamedia
Media type code
c
Sound
unknown sound
Specific material designation
remote

Library Locations

    • Folsom LibraryBorrow it
      110 8th St, Troy, NY, 12180, US
      42.729766 -73.682577
Processing Feedback ...