Skip to main content

Faults and Cyber Attacks Detection in Critical Infrastructures

  • Conference paper
  • First Online:
Critical Information Infrastructures Security (CRITIS 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8985))

Abstract

In this paper we study the case of Critical Infrastructures (CIs), and especially power grid systems, which nowadays rely on computers and the Internet for their operation. We propose a combinatorial method for automatic detection and classification of faults and cyber-attacks, when there is limited data from the power grid nodes due to cyber implications. We design an experimental platform consisting of a power grid simulator and a cyber network emulator in order to demonstrate the efficiency of the proposed method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ten, C.W., Liu, C.C., Manimaran, G.: Vulnerability assessment of cybersecurity for scada systems. Power Syst. IEEE Trans. 23(4), 1836–1846 (2008)

    Article  Google Scholar 

  2. Zio, E., Sansavini, G.: Modeling interdependent network systems for identifying cascade-safe operating margins. Reliab. IEEE Trans. 60(1), 94–101 (2011)

    Article  Google Scholar 

  3. Kotzanikolaou, P., Theoharidou, M., Gritzalis, D.: Accessing n-order dependencies between critical infrastructures. Int. J. Crit. Infrastruct. 9(1–2), 93–110 (2013)

    Article  Google Scholar 

  4. Mo, Y., Kim, T.-H., Brancik, K., Dickinson, D., Lee, H., Perrig, A., Sinopoli, B.: Cyber - physical security of a smart grid infrastructure. In: Proceedings of the IEEE, vol. 100, no. 1, pp. 195–209, January 2012

    Google Scholar 

  5. Sridhar, S., Hahn, A., Govindarasu, M.: Cyber - physical system security for the electric power grid. Proc. IEEE 100(1), 210–224 (2012)

    Article  Google Scholar 

  6. Goebel, K., Yan, W.: Correcting sensor drift and intermittency faults with data fusion and automated learning. IEEE Syst. 2(2), 189–197 (2008)

    Article  Google Scholar 

  7. Napolitano, M.R., Windon, D.A., Casanova, J.L., Innocenti, M., Silvestri, G.: Kalman filters and neural network schemes for sensor validation in flight control systems. IEEE Trans. Control Syst. Technol. 6(5), 596–611 (1998)

    Article  Google Scholar 

  8. Genge, B., Siaterlis, C., Hohenadel, M.: AMICI: An assessment platform for multi-domain security experimentation on critical infrastructures. In: Hämmerli, B.M., Kalstad Svendsen, N., Lopez, J. (eds.) CRITIS 2012. LNCS, vol. 7722, pp. 228–239. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  9. Siaterlis, C., Garcia, A., Genge, B.: On the use of Emulab testbeds for scientifically rigorous experiments. IEEE Commun. Surveys Tuts. 15(2), 929–942 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yannis Soupionis .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Soupionis, Y., Ntalampiras, S., Giannopoulos, G. (2016). Faults and Cyber Attacks Detection in Critical Infrastructures. In: Panayiotou, C., Ellinas, G., Kyriakides, E., Polycarpou, M. (eds) Critical Information Infrastructures Security. CRITIS 2014. Lecture Notes in Computer Science(), vol 8985. Springer, Cham. https://doi.org/10.1007/978-3-319-31664-2_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-31664-2_29

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-31663-5

  • Online ISBN: 978-3-319-31664-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics