IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Early Detection and Recovery Measures for Smart Grid Cyber-Resilience

Early Detection and Recovery Measures for Smart Grid Cyber-Resilience
View Sample PDF
Author(s): Ismail Butun (Chalmers University of Technology, Sweden & Konya Food and Agriculture University, Turkey & Royal University of Technology, Sweden)and Alparslan Sari (University of Delaware, USA)
Copyright: 2021
Pages: 20
Source title: Decision Support Systems and Industrial IoT in Smart Grid, Factories, and Cities
Source Author(s)/Editor(s): Ismail Butun (Chalmers University of Technology, Sweden & Konya Food and Agriculture University, Turkey & Royal University of Technology, Sweden)
DOI: 10.4018/978-1-7998-7468-3.ch005

Purchase

View Early Detection and Recovery Measures for Smart Grid Cyber-Resilience on the publisher's website for pricing and purchasing information.

Abstract

The internet of things (IoT) has recently brought major technological advances in many domains, including the smart grid. Despite the simplicity and efficiency that IoT brings, there are also underlying risks that are slowing down its adoption. These risks are caused by the presence of legacy systems inside existing infrastructures that were built with no security in mind. In this chapter, the authors propose a method for early-stage detection of cyber-security incidents and protection against them through applicable security measures. This chapter introduces security techniques such as anomaly detection, threat investigation through a highly automated decision support system (DSS), as well as incident response and recovery for smart grid systems. The introduced framework can be applied to industrial environments such as cyber-threats targeting the production generator as well as the electricity smart meters, etc. The chapter also illustrates the framework's cyber-resilience against zero-day threats and its ability to distinguish between operational failures as well as cyber-security incidents.

Related Content

Yu Bin, Xiao Zeyu, Dai Yinglong. © 2024. 34 pages.
Liyin Wang, Yuting Cheng, Xueqing Fan, Anna Wang, Hansen Zhao. © 2024. 21 pages.
Tao Zhang, Zaifa Xue, Zesheng Huo. © 2024. 32 pages.
Dharmesh Dhabliya, Vivek Veeraiah, Sukhvinder Singh Dari, Jambi Ratna Raja Kumar, Ritika Dhabliya, Sabyasachi Pramanik, Ankur Gupta. © 2024. 22 pages.
Yi Xu. © 2024. 37 pages.
Chunmao Jiang. © 2024. 22 pages.
Hatice Kübra Özensel, Burak Efe. © 2024. 23 pages.
Body Bottom