Muutke küpsiste eelistusi

E-raamat: Security and Resiliency Analytics for Smart Grids: Static and Dynamic Approaches

Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 110,53 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book targets the key concern of protecting critical infrastructures such as smart grids. It explains various static and dynamic security analysis techniques that can automatically verify smart grid security and resiliency and identify potential attacks in a proactive manner. This book includes three main sections. The first presents the idea of formally verifying the compliance of smart grid configurations with the security and resiliency guidelines. It provides a formal framework that verifies the compliance of the advanced metering infrastructure (AMI) configurations with the security and resiliency requirements, and generates remediation plans for potential security violations. The second section covers the formal verification of the security and resiliency of smart grid control systems by using a formal model to analyze attack evasions on state estimation, a core control module of the supervisory control system in smart grids. The model identifies attack vectors that can

compromise state estimation. This section also covers risk mitigation techniques that synthesize proactive security plans that make such attacks infeasible. The last part of the book discusses the dynamic security analysis for smart grids. It shows that AMI behavior can be modeled using event logs collected at smart collectors, which in turn can be verified using the specification invariants generated from the configurations of the AMI devices. Although the focus of this book is smart grid security and resiliency, the included formal analytics are generic enough to be extended to other cyber-physical systems, especially those related to industrial control systems (ICS). Therefore, industry professionals and academic researchers will find this book an exceptional resource to learn theoretical and practical aspects of applying formal methods for the protection of critical infrastructures. 

Smart Grids and Security Challenges.- Analytics for Smart Grid Security and Resiliency.- Security Analytics for AMI and SCADA.- Security Analytics for EMSE Modules.- Intrusion Detection Systems for AMI.- Resiliency Threat Analysis for SCADA.
Part I Introduction
1 Smart Grids and Security Challenges
3(12)
1.1 Smart Grid Overview
4(1)
1.2 AMI
5(2)
1.3 SCADA
7(2)
1.4 Potential Threats
9(1)
1.5 Security Goals and Challenges
10(2)
1.5.1 Security Goals
11(1)
1.5.2 Challenges
11(1)
1.6 Summary
12(3)
References
12(3)
2 Analytics for Smart Grid Security and Resiliency
15(14)
2.1 Formal Analytics
15(2)
2.2 Technical Approach Overview
17(3)
2.2.1 Security Analytics for AMI and SCADA
17(1)
2.2.2 Security Analytics for EMS Modules
18(1)
2.2.3 Intrusion Detection Systems for AMI
19(1)
2.3 Overview of SMT and Probabilistic Model Checking
20(4)
2.3.1 Satisfiability Modulo Theories
20(1)
2.3.2 Probabilistic Model Checking
21(3)
2.4 Summary
24(5)
References
25(4)
Part II Formal Analytics for Secure and Resilient Smart Grids
3 Security Analytics for AMI and SCADA
29(32)
3.1 Overview of the Security Analysis Framework
30(1)
3.2 AMI Security Analysis
31(13)
3.2.1 Preliminary
31(1)
3.2.2 Formal Model of AMI Security Verification
32(7)
3.2.3 Implementation
39(5)
3.3 SCADA Security Analysis
44(11)
3.3.1 Preliminary
44(1)
3.3.2 Formal Model of SCADA Security Verification
45(8)
3.3.3 Implementation
53(2)
3.4 Scalability of the Security Analysis Framework
55(3)
3.4.1 Time Complexity Analysis
55(2)
3.4.2 Memory Complexity Analysis
57(1)
3.4.3 Time Complexity in Unsatisfied Cases
57(1)
3.5 Summary
58(3)
References
59(2)
4 Security Analytics for EMS Modules
61(44)
4.1 Preliminaries
62(4)
4.1.1 DC Power Flow Mode
62(1)
4.1.2 State Estimation
63(1)
4.1.3 Topology Processor
63(1)
4.1.4 Optimal Power Flow
64(1)
4.1.5 UFDI Attack
64(1)
4.1.6 Attack Attributes
65(1)
4.2 Stealthy Attack Verification
66(10)
4.2.1 Formalizations of Power Flow Equations
66(2)
4.2.2 Formalization of Change in State Estimation
68(1)
4.2.3 Formalization of Topology Change
68(2)
4.2.4 Formalization of False Data Injection to Measurements
70(1)
4.2.5 Formalization of Attack Attributes
70(2)
4.2.6 An Example Case Study
72(4)
4.3 Impact Analysis of Stealthy Attacks
76(6)
4.3.1 Impact Analysis Framework Design
76(2)
4.3.2 Formalization of Optimal Power Flow
78(1)
4.3.3 Formalization of Attack Impact on OPF
79(1)
4.3.4 An Example Case Study
80(2)
4.4 Security Hardening Against Stealthy Attacks
82(5)
4.4.1 Synthesis Design
82(2)
4.4.2 Formalization of Candidate Architecture Selection
84(1)
4.4.3 An Example Case Study
85(2)
4.5 Proactive Defense Against Persistent Attacks
87(8)
4.5.1 Moving Target Defense Strategy
87(2)
4.5.2 Formal Model for Strategy Selection
89(3)
4.5.3 An Example Case Study
92(3)
4.6 Evaluation
95(7)
4.6.1 Methodology
95(1)
4.6.2 Time Complexity of Verification Model
95(2)
4.6.3 Time Complexity of Impact Analysis
97(2)
4.6.4 Time Complexity of Synthesis Mechanism
99(2)
4.6.5 Time Complexity of MTD Strategy Selection Models
101(1)
4.6.6 Memory Complexity
101(1)
4.7 Summary
102(3)
References
103(2)
5 Intrusion Detection Systems for AMI
105(30)
5.1 Background
106(1)
5.2 Dataset
107(1)
5.3 Statistical Analysis and Motivation
108(5)
5.4 Technical Approach
113(7)
5.4.1 AMI Modeling
113(2)
5.4.2 Properties Specification for Model Checking
115(2)
5.4.3 Randomization Module
117(3)
5.5 Evaluation
120(12)
5.5.1 Attack Model
121(1)
5.5.2 Robustness Against Evasion and Mimicry Attacks
122(3)
5.5.3 Accuracy Evaluation
125(5)
5.5.4 Scalability
130(2)
5.5.5 Limitations
132(1)
5.6 Summary
132(3)
References
133(2)
A Resiliency Threat Analysis for SCADA
135(6)
A.1 k-Resilient Secured Observability Threat Model
135(3)
A.2 A Case Study
138(3)
Index 141