An Overview of Cybersecurity for Natural Gas Networks: Attacks, Attack Assessment, and Attack Detection

[1]  Nathan Leonard,et al.  Analysis of pipeline accidents in the United States from 1968 to 2009 , 2014, Int. J. Crit. Infrastructure Prot..

[2]  Stavros Ntalampiras,et al.  Detection of Integrity Attacks in Cyber-Physical Critical Infrastructures Using Ensemble Modeling , 2015, IEEE Transactions on Industrial Informatics.

[3]  H Vincent Poor,et al.  Wireless physical layer security , 2016, Proceedings of the National Academy of Sciences.

[4]  Sakir Sezer,et al.  Impact of cyber-security issues on Smart Grid , 2011, 2011 2nd IEEE PES International Conference and Exhibition on Innovative Smart Grid Technologies.

[5]  M. Shahidehpour,et al.  Interdependency of Natural Gas Network and Power System Security , 2008, IEEE Transactions on Power Systems.

[6]  Malek Ben Salem,et al.  A Survey of Insider Attack Detection Research , 2008, Insider Attack and Cyber Security.

[7]  A. Conejo,et al.  Using Electrical Energy Storage to Mitigate Natural Gas-Supply Shortages , 2018, IEEE Transactions on Power Systems.

[8]  Lei Wu,et al.  Robust Network Hardening Strategy for Enhancing Resilience of Integrated Electricity and Natural Gas Distribution Systems Against Natural Disasters , 2018, IEEE Transactions on Power Systems.

[9]  Tudorica Daniela Communication security in SCADA pipeline monitoring systems , 2011, 2011 RoEduNet International Conference 10th Edition: Networking in Education and Research.

[10]  Siuming Lo,et al.  Jet Fire Consequence Evaluation on the Natural Gas Transported by Pipelines , 2013 .

[11]  Paul Honeine,et al.  ${l_p}$-norms in One-Class Classification for Intrusion Detection in SCADA Systems , 2014, IEEE Transactions on Industrial Informatics.

[12]  Aleksandr Rudkevich,et al.  Adaptive convex relaxations for Gas Pipeline Network Optimization , 2017, 2017 American Control Conference (ACC).

[13]  Lang Tong,et al.  Malicious data attack on real-time electricity market , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[14]  Zuyi Li,et al.  Local Topology Attacks in Smart Grids , 2017, IEEE Transactions on Smart Grid.

[15]  Paul Honeine,et al.  One-Class Classification Framework Based on Shrinkage Methods , 2018, J. Signal Process. Syst..

[16]  Antonio J. Conejo,et al.  Coordinated Expansion Planning of Natural Gas and Electric Power Systems , 2018, IEEE Transactions on Power Systems.

[17]  Richard Brooks,et al.  A survey of electric power synchrophasor network cyber security , 2014, IEEE PES Innovative Smart Grid Technologies, Europe.

[18]  Donghua Zhou,et al.  FAST LEAK DETECTION AND LOCATION OF GAS PIPELINES BASED ON AN ADAPTIVE PARTICLE FILTER , 2005 .

[19]  Yang Liu,et al.  A survey on bad data injection attack in smart grid , 2013, 2013 IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC).

[20]  Yang Xiang,et al.  A survey on security control and attack detection for industrial cyber-physical systems , 2018, Neurocomputing.

[21]  David Hutchison,et al.  Evaluation of Anomaly Detection techniques for SCADA communication resilience , 2016, 2016 Resilience Week (RWS).

[22]  Piroska Haller,et al.  Data clustering-based anomaly detection in industrial control systems , 2014, 2014 IEEE 10th International Conference on Intelligent Computer Communication and Processing (ICCP).

[23]  Alvaro A. Cárdenas,et al.  Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.

[24]  H. Vincent Poor,et al.  An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.

[25]  Rick S. Blum,et al.  Topology Attack Detection in Natural Gas Delivery Networks , 2019, 2019 53rd Annual Conference on Information Sciences and Systems (CISS).

[26]  M. Spivak Calculus On Manifolds: A Modern Approach To Classical Theorems Of Advanced Calculus , 2019 .

[27]  Tanya L. Brewer,et al.  Guidelines for Smart Grid Cybersecurity , 2014 .

[28]  Tingting Li,et al.  Multi-level Anomaly Detection in Industrial Control Systems via Package Signatures and LSTM Networks , 2017, 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

[29]  Mashor Housh,et al.  Model-based approach for cyber-physical attack detection in water distribution systems. , 2018, Water research.

[30]  Wei Gao,et al.  On SCADA control system command and response injection and intrusion detection , 2010, 2010 eCrime Researchers Summit.

[31]  Igor V. Nikiforov,et al.  A statistical method for detecting cyber/physical attacks on SCADA systems , 2014, 2014 IEEE Conference on Control Applications (CCA).

[32]  Fei He,et al.  Gas pipeline recovery from disruption using multi-objective optimization , 2017, 2017 IEEE International Symposium on Technologies for Homeland Security (HST).

[33]  Zhao Yang Dong,et al.  A Review of False Data Injection Attacks Against Modern Power Systems , 2017, IEEE Transactions on Smart Grid.

[34]  Andrzej J. Osiadacz Osiadacz,et al.  Simulation and Analysis of Gas Networks , 1987 .

[35]  Cheng Wang,et al.  Robust Defense Strategy for Gas–Electric Systems Against Malicious Attacks , 2016, IEEE Transactions on Power Systems.

[36]  Rick S. Blum,et al.  A Statistical Learning-Based Algorithm for Topology Verification in Natural Gas Networks Based on Noisy Sensor Measurements , 2020, IEEE Transactions on Information Forensics and Security.

[37]  Rick S. Blum,et al.  A PMU Scheduling Scheme for Transmission of Synchrophasor Data in Electric Power Systems , 2014, IEEE Transactions on Smart Grid.

[38]  Ross Baldick,et al.  Solving the natural gas flow problem using semidefinite program relaxation , 2017, 2017 IEEE Power & Energy Society General Meeting.

[39]  Peter Willett,et al.  Feature article: security of SCADA systems against cyber–physical attacks , 2017, IEEE Aerospace and Electronic Systems Magazine.

[40]  Xifan Wang,et al.  An MILP-Based Optimal Power Flow in Multicarrier Energy Systems , 2017, IEEE Transactions on Sustainable Energy.

[41]  Juan Lopez,et al.  Firmware modification attacks on programmable logic controllers , 2013, Int. J. Crit. Infrastructure Prot..

[42]  Haibo He,et al.  Cyber-physical attacks and defences in the smart grid: a survey , 2016, IET Cyper-Phys. Syst.: Theory & Appl..

[43]  Igor Nikiforov,et al.  Sequential monitoring of SCADA systems against cyber/physical attacks , 2015 .

[44]  Scott F. Midkiff,et al.  Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.

[45]  Dilip Patel,et al.  Assessing and augmenting SCADA cyber security: A survey of techniques , 2017, Comput. Secur..

[46]  Yatin Wadhawan,et al.  Evaluating Resilience of Gas Pipeline Systems Under Cyber-Physical Attacks: A Function-Based Methodology , 2016, CPS-SPC '16.

[47]  Chau Yuen,et al.  Local Cyber-Physical Attack for Masking Line Outage and Topology Attack in Smart Grid , 2018, IEEE Transactions on Smart Grid.

[48]  H. Vincent Poor,et al.  Approaches to Secure Inference in the Internet of Things: Performance Bounds, Algorithms, and Effective Attacks on IoT Sensor Networks , 2018, IEEE Signal Processing Magazine.

[49]  Lang Tong,et al.  On phasor measurement unit placement against state and topology attacks , 2013, 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[50]  Krishnaprasad Thirunarayan,et al.  Detecting Integrity Attacks on Industrial Control Systems , 2014, Critical Infrastructure Protection.

[51]  Pramod K. Varshney,et al.  Distributed inference in the presence of eavesdroppers: a survey , 2015, IEEE Communications Magazine.

[52]  Tao Ding,et al.  Multi-Stage Stochastic Programming With Nonanticipativity Constraints for Expansion of Combined Power and Natural Gas Systems , 2018, IEEE Transactions on Power Systems.

[53]  Ramteen Sioshansi,et al.  Unit commitment under gas-supply uncertainty and gas-price variability , 2017, 2017 IEEE Power & Energy Society General Meeting.

[54]  Srikanth V. Krishnamurthy,et al.  Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.

[55]  Ridha Soua,et al.  Machine Learning for Reliable Network Attack Detection in SCADA Systems , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).

[56]  Qaisar Shafi,et al.  Cyber Physical Systems Security: A Brief Survey , 2012, 2012 12th International Conference on Computational Science and Its Applications.

[57]  Salvatore Belsito,et al.  Leak detection in liquefied gas pipelines by artificial neural networks , 1998 .

[58]  Xavier Litrico,et al.  Cyber Security of Water SCADA Systems—Part II: Attack Detection Using Enhanced Hydrodynamic Models , 2013, IEEE Transactions on Control Systems Technology.

[59]  Zhuo Lu,et al.  Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.

[60]  Lei Wu,et al.  Robust Co-Optimization Planning of Interdependent Electricity and Natural Gas Systems With a Joint N-1 and Probabilistic Reliability Criterion , 2018, IEEE Transactions on Power Systems.

[61]  J. P. Gupta,et al.  Securing oil and gas infrastructure , 2007 .

[62]  Nicholas Judson,et al.  Interdependence of the Electricity Generation System and the Natural Gas System and Implications for Energy Security , 2013 .

[63]  Xiaohua Ge,et al.  Distributed Attack Detection and Secure Estimation of Networked Cyber-Physical Systems Against False Data Injection Attacks and Jamming Attacks , 2018, IEEE Transactions on Signal and Information Processing over Networks.

[64]  Mark A. Buckner,et al.  An Evaluation of Machine Learning Methods to Detect Malicious SCADA Communications , 2013, 2013 12th International Conference on Machine Learning and Applications.

[65]  Xian-Da Zhang,et al.  Matrix Analysis and Applications , 2017 .

[66]  Antonio J. Conejo,et al.  Shadow Price-Based Co-Ordination of Natural Gas and Electric Power Systems , 2019, IEEE Transactions on Power Systems.

[67]  Emil Pricop,et al.  Assessing the security risks of a wireless sensor network from a gas compressor station , 2014, Proceedings of the 2014 6th International Conference on Electronics, Computers and Artificial Intelligence (ECAI).

[68]  Alex Talevski,et al.  Taxonomy of Wireless Sensor Network Cyber Security Attacks in the Oil and Gas Industries , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.