Our research presented in this article comprises of network based cyber-attacks in a laboratory setup consisting of a power grid substation implemented as a hardware-in-the-loop simulation with hardware (Intelligent Electronic Devices a.k.a. IEDs), and the analysis on how these cyber-attacks can be detected using network forensics. The investigated cyber-attacks exploit the IEC 61850 MMS and GOOSE protocols, and one of the attacks has been already implemented in an existing malware. Additionally we organized a cybersecurity themed workshop for energy sector companies in Finland. The workshop participants were given a task to search for the aforementioned cyber-attacks from network traffic captures. The key finding from the workshop is that ...
This paper proposes a rule-based Network Intrusion Detection System (NIDS) to detect a wide range of...
During the evolution of today's power grid to a Smart Grid it is expected that IP-based communicatio...
Attackers are able to enumerate all devices and computers within a compromised substation network. D...
Our research presented in this article comprises of network based cyber-attacks in a laboratory setu...
Cyber security plays a crucial role in ensuring the resilience of power systems. In this paper, we i...
Power systems automation and communication standards are crucial for the transition of the conventio...
Power system automation and communication standards are spearheading the power system transition tow...
Digitalization of power substations is mandatory to increase the efficiency, stability and reliabili...
Distributed Energy Resource Management System will enable interoperability in communication with all...
The availability of the data within the network communication remains one of the most critical requi...
The generation of the mix-based expansion of modern power grids has urged the utilization of digital...
Cybersecurity of the substations in a power system is a major issue as the substations become increa...
Industrial Control System (ICS) networks used in critical infrastructure networks like the power gri...
The regional electricity grid is a central and vital component in any national electricity distribut...
Thesis (Ph.D.), School of Electrical Engineering and Computer Science, Washington State UniversityCy...
This paper proposes a rule-based Network Intrusion Detection System (NIDS) to detect a wide range of...
During the evolution of today's power grid to a Smart Grid it is expected that IP-based communicatio...
Attackers are able to enumerate all devices and computers within a compromised substation network. D...
Our research presented in this article comprises of network based cyber-attacks in a laboratory setu...
Cyber security plays a crucial role in ensuring the resilience of power systems. In this paper, we i...
Power systems automation and communication standards are crucial for the transition of the conventio...
Power system automation and communication standards are spearheading the power system transition tow...
Digitalization of power substations is mandatory to increase the efficiency, stability and reliabili...
Distributed Energy Resource Management System will enable interoperability in communication with all...
The availability of the data within the network communication remains one of the most critical requi...
The generation of the mix-based expansion of modern power grids has urged the utilization of digital...
Cybersecurity of the substations in a power system is a major issue as the substations become increa...
Industrial Control System (ICS) networks used in critical infrastructure networks like the power gri...
The regional electricity grid is a central and vital component in any national electricity distribut...
Thesis (Ph.D.), School of Electrical Engineering and Computer Science, Washington State UniversityCy...
This paper proposes a rule-based Network Intrusion Detection System (NIDS) to detect a wide range of...
During the evolution of today's power grid to a Smart Grid it is expected that IP-based communicatio...
Attackers are able to enumerate all devices and computers within a compromised substation network. D...