From Static to Dynamic Anomaly Detection With Application to Power System Cyber Security
نویسندگان
چکیده
منابع مشابه
Cyber Security Network Anomaly Detection and Visualization
In this Major Qualifying Project, we present a novel anomaly detection system for computer networks and a visualization system to help users explore network captures. The detection algorithm uses Robust Principal Component Analysis to produce a lower dimensional subspace of the original data for which a sparse matrix of outliers occurs. This low dimensional data subspace is determined by a nove...
متن کاملApplication of TCSC and SVC to Enhance the Power System Static Voltage Stability
In this paper, the performance of two types of FACTS devices in order to enhance the power system static voltage stability has been investigated. These devices include Static Var Compensator (SVC) and Thyristor Controlled Series Capacitor (TCSC). The modeling of the Single Machine Infinite Bus (SMIB) and aforesaid devices has been made up in steady state mode with disregarding of the generator ...
متن کاملApplication of Dynamic System Models and State Estimation Technology to the Cyber Security of Physical Systems
As advances in technology permit automatic control of more and more of the functions of physical systems, the opportunity for cyber attacks that include exploitation of such automation capabilities becomes a greater risk. For example, in the 2010 Stuxnet attack an embedded infection in control systems was used to successfully damage a large number of nuclear power related centrifuges in Iran. W...
متن کاملFrom information security to cyber security
The term cyber security is often used interchangeably with the term information security. This paper argues that, although there is a substantial overlap between cyber security and information security, these two concepts are not totally analogous. Moreover, the paper posits that cyber security goes beyond the boundaries of traditional information security to include not only the protection of ...
متن کاملAnomaly Detection in Computer Security and an Application to File System Accesses
We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file systems to detect abnormal accesses. The File Wrapper Anomaly Detector (FWRAP) has two parts, a sensor that audits file systems, and an unsupervised machine learning system that computes normal models of those accesses. FWRAP employs...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Power Systems
سال: 2020
ISSN: 0885-8950,1558-0679
DOI: 10.1109/tpwrs.2019.2943304