IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Early Detection and Recovery Measures for Smart Grid Cyber-Resilience

Early Detection and Recovery Measures for Smart Grid Cyber-Resilience
View Sample PDF
Author(s): Ismail Butun (Chalmers University of Technology, Sweden & Konya Food and Agriculture University, Turkey & Royal University of Technology, Sweden)and Alparslan Sari (University of Delaware, USA)
Copyright: 2021
Pages: 20
Source title: Decision Support Systems and Industrial IoT in Smart Grid, Factories, and Cities
Source Author(s)/Editor(s): Ismail Butun (Chalmers University of Technology, Sweden & Konya Food and Agriculture University, Turkey & Royal University of Technology, Sweden)
DOI: 10.4018/978-1-7998-7468-3.ch005

Purchase

View Early Detection and Recovery Measures for Smart Grid Cyber-Resilience on the publisher's website for pricing and purchasing information.

Abstract

The internet of things (IoT) has recently brought major technological advances in many domains, including the smart grid. Despite the simplicity and efficiency that IoT brings, there are also underlying risks that are slowing down its adoption. These risks are caused by the presence of legacy systems inside existing infrastructures that were built with no security in mind. In this chapter, the authors propose a method for early-stage detection of cyber-security incidents and protection against them through applicable security measures. This chapter introduces security techniques such as anomaly detection, threat investigation through a highly automated decision support system (DSS), as well as incident response and recovery for smart grid systems. The introduced framework can be applied to industrial environments such as cyber-threats targeting the production generator as well as the electricity smart meters, etc. The chapter also illustrates the framework's cyber-resilience against zero-day threats and its ability to distinguish between operational failures as well as cyber-security incidents.

Related Content

Okure Udo Obot, Kingsley Friday Attai, Gregory O. Onwodi. © 2023. 28 pages.
Thomas M. Connolly, Mario Soflano, Petros Papadopoulos. © 2023. 29 pages.
Dmytro Dosyn. © 2023. 26 pages.
Jan Kalina. © 2023. 21 pages.
Avishek Choudhury, Mostaan Lotfalian Saremi, Estfania Urena. © 2023. 20 pages.
Yuanying Qu, Xingheng Wang, Limin Yu, Xu Zhu, Wenwu Wang, Zhi Wang. © 2023. 26 pages.
Yousra Kherabi, Damien Ming, Timothy Miles Rawson, Nathan Peiffer-Smadja. © 2023. 10 pages.
Body Bottom