Cargando…

Security and Resiliency Analytics for Smart Grids Static and Dynamic Approaches /

This book targets the key concern of protecting critical infrastructures such as smart grids. It explains various static and dynamic security analysis techniques that can automatically verify smart grid security and resiliency and identify potential attacks in a proactive manner. This book includes...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Al-Shaer, Ehab (Autor), Rahman, Mohammad Ashiqur (Autor)
Autor Corporativo: SpringerLink (Online service)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Cham : Springer International Publishing : Imprint: Springer, 2016.
Edición:1st ed. 2016.
Colección:Advances in Information Security, 67
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-319-32871-3
003 DE-He213
005 20220112235220.0
007 cr nn 008mamaa
008 160609s2016 sz | s |||| 0|eng d
020 |a 9783319328713  |9 978-3-319-32871-3 
024 7 |a 10.1007/978-3-319-32871-3  |2 doi 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
082 0 4 |a 005.8  |2 23 
100 1 |a Al-Shaer, Ehab.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Security and Resiliency Analytics for Smart Grids  |h [electronic resource] :  |b Static and Dynamic Approaches /  |c by Ehab Al-Shaer, Mohammad Ashiqur Rahman. 
250 |a 1st ed. 2016. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2016. 
300 |a XVI, 144 p. 37 illus., 22 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Advances in Information Security,  |x 2512-2193 ;  |v 67 
505 0 |a Smart Grids and Security Challenges -- Analytics for Smart Grid Security and Resiliency -- Security Analytics for AMI and SCADA -- Security Analytics for EMSE Modules -- Intrusion Detection Systems for AMI -- Resiliency Threat Analysis for SCADA. . 
520 |a This book targets the key concern of protecting critical infrastructures such as smart grids. It explains various static and dynamic security analysis techniques that can automatically verify smart grid security and resiliency and identify potential attacks in a proactive manner. This book includes three main sections. The first presents the idea of formally verifying the compliance of smart grid configurations with the security and resiliency guidelines. It provides a formal framework that verifies the compliance of the advanced metering infrastructure (AMI) configurations with the security and resiliency requirements, and generates remediation plans for potential security violations. The second section covers the formal verification of the security and resiliency of smart grid control systems by using a formal model to analyze attack evasions on state estimation, a core control module of the supervisory control system in smart grids. The model identifies attack vectors that can compromise state estimation. This section also covers risk mitigation techniques that synthesize proactive security plans that make such attacks infeasible. The last part of the book discusses the dynamic security analysis for smart grids. It shows that AMI behavior can be modeled using event logs collected at smart collectors, which in turn can be verified using the specification invariants generated from the configurations of the AMI devices. Although the focus of this book is smart grid security and resiliency, the included formal analytics are generic enough to be extended to other cyber-physical systems, especially those related to industrial control systems (ICS). Therefore, industry professionals and academic researchers will find this book an exceptional resource to learn theoretical and practical aspects of applying formal methods for the protection of critical infrastructures. 
650 0 |a Data protection. 
650 0 |a Computer networks . 
650 0 |a Application software. 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 1 4 |a Data and Information Security. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Computer and Information Systems Applications. 
650 2 4 |a Cryptology. 
700 1 |a Rahman, Mohammad Ashiqur.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783319328706 
776 0 8 |i Printed edition:  |z 9783319328720 
776 0 8 |i Printed edition:  |z 9783319813899 
830 0 |a Advances in Information Security,  |x 2512-2193 ;  |v 67 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-319-32871-3  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)