Network-based multidimensional moving target defense against false data injection attack in power system

[1]  Kan Chen,et al.  A Collaborative Intrusion Detection Mechanism Against False Data Injection Attack in Advanced Metering Infrastructure , 2015, IEEE Transactions on Smart Grid.

[2]  Xiangyu Niu,et al.  Dynamic Detection of False Data Injection Attack in Smart Grid using Deep Learning , 2018, 2019 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT).

[3]  D. Kewley,et al.  Dynamic approaches to thwart adversary intelligence gathering , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.

[4]  Ananthram Swami,et al.  A signaling game model for moving target defense , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[5]  A. Lodi,et al.  Solving Mixed-Integer Quadratic Programming problems with IBM-CPLEX : a progress report , 2014 .

[6]  Deepa Kundur,et al.  Reactance Perturbation for Detecting and Identifying FDI Attacks in Power System State Estimation , 2018, IEEE Journal of Selected Topics in Signal Processing.

[7]  Karen A. Scarfone,et al.  SP 800-82. Guide to Industrial Control Systems (ICS) Security: Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC) , 2011 .

[8]  Athanasios V. Vasilakos,et al.  False Data Injection on State Estimation in Power Systems—Attacks, Impacts, and Defense: A Survey , 2017, IEEE Transactions on Industrial Informatics.

[9]  Guohua Wang,et al.  Analysis of The Relationship between Electric Cyber-Physical Systems and Ubiquitous Electric Internet of Things , 2019, 2019 IEEE 3rd Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC).

[10]  Yong Wang,et al.  SRID: State Relation Based Intrusion Detection for False Data Injection Attacks in SCADA , 2014, ESORICS.

[11]  Hao Liang,et al.  False Data Injection Attacks With Limited Susceptance Information and New Countermeasures in Smart Grid , 2019, IEEE Transactions on Industrial Informatics.

[12]  Nick McKeown,et al.  OpenFlow: enabling innovation in campus networks , 2008, CCRV.

[13]  David K. Y. Yau,et al.  Cost-Benefit Analysis of Moving-Target Defense in Power Grids , 2018, 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

[14]  Evangelos P. Markatos,et al.  Defending against hitlist worms using network address space randomization , 2007, Comput. Networks.

[15]  Yilin Mo,et al.  False Data Injection Attacks in Control Systems , 2010 .

[16]  Thomas J. Overbye,et al.  Topology Perturbation for Detecting Malicious Data Injection , 2012, 2012 45th Hawaii International Conference on System Sciences.

[17]  Ravishankar K. Iyer,et al.  Runtime Semantic Security Analysis to Detect and Mitigate Control-Related Attacks in Power Grids , 2018, IEEE Transactions on Smart Grid.

[18]  Victor O. K. Li,et al.  Online False Data Injection Attack Detection With Wavelet Transform and Deep Neural Networks , 2018, IEEE Transactions on Industrial Informatics.

[19]  Raheem A. Beyah,et al.  An Empirical Study of TCP Vulnerabilities in Critical Power System Devices , 2014, SEGS@CCS.

[20]  Ralph Langner,et al.  Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.

[21]  Haoyu Song,et al.  Protocol-oblivious forwarding: unleash the power of SDN through a future-proof forwarding plane , 2013, HotSDN '13.

[22]  David K. Y. Yau,et al.  Analysis of Moving Target Defense Against False Data Injection Attacks on Power Grid , 2019, IEEE Transactions on Information Forensics and Security.

[23]  Mohamed Azab,et al.  Honeypot-like Moving-target Defense for secure IoT Operation , 2018, 2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON).

[24]  Narsingh Deo,et al.  Shortest-path algorithms: Taxonomy and annotation , 1984, Networks.

[25]  Mohamed Azab,et al.  Benign false-data injection as a moving-target defense to secure mobile wireless communications , 2020, Ad Hoc Networks.

[26]  George Varghese,et al.  P4: programming protocol-independent packet processors , 2013, CCRV.

[27]  Ehab Al-Shaer,et al.  Moving Target Defense for Hardening the Security of the Power System State Estimation , 2014, MTD '14.

[28]  R D Zimmerman,et al.  MATPOWER: Steady-State Operations, Planning, and Analysis Tools for Power Systems Research and Education , 2011, IEEE Transactions on Power Systems.

[29]  Ricardo M. Czekster,et al.  Modelling Load-Changing Attacks in Cyber-Physical Systems , 2019, PASM.

[30]  Soummya Kar,et al.  Distributed detection and isolation of topology attacks in power networks , 2012, HiCoNS '12.