Trust-Based Detection and Mitigation of Cyber Attacks in Distributed Cooperative Control of Islanded AC Microgrids
Electronics,
Год журнала:
2024,
Номер
13(18), С. 3692 - 3692
Опубликована: Сен. 18, 2024
In
this
study,
we
address
the
challenge
of
detecting
and
mitigating
cyber
attacks
in
distributed
cooperative
control
islanded
AC
microgrids,
with
a
particular
focus
on
False
Data
Injection
Attacks
(FDIAs),
significant
threat
to
Smart
Grid
(SG).
The
SG
integrates
traditional
power
systems
communication
networks,
creating
complex
system
numerous
vulnerable
links,
making
it
prime
target
for
attacks.
These
can
lead
disclosure
private
data,
network
failures,
even
blackouts.
Unlike
machine
learning-based
approaches
that
require
extensive
datasets
mathematical
models
dependent
accurate
modeling,
our
method
is
free
from
such
dependencies.
To
enhance
microgrid’s
resilience
against
these
threats,
propose
resilient
algorithm
by
introducing
novel
trustworthiness
parameter
into
algorithm.
Our
evaluates
energy
resources
(DERs)
based
their
voltage
measurements
exchanged
information,
using
Kullback-Leibler
(KL)
divergence
dynamically
adjust
actions.
We
validated
approach
through
simulations
both
IEEE-34
bus
feeder
eight
DERs
larger
microgrid
twenty-two
DERs.
results
demonstrated
detection
accuracy
around
100%,
millisecond
range
mitigation
time,
ensuring
rapid
recovery.
Additionally,
improved
stability
up
almost
100%
under
attack
scenarios,
showcasing
its
effectiveness
promptly
maintaining
resilience.
findings
highlight
potential
security
face
threats.
Язык: Английский
Clop Ransomware in Action: A Comprehensive Analysis of Its Multi-Stage Tactics
Electronics,
Год журнала:
2024,
Номер
13(18), С. 3689 - 3689
Опубликована: Сен. 17, 2024
Recently,
Clop
ransomware
attacks
targeting
non-IT
fields
such
as
distribution,
logistics,
and
manufacturing
have
been
rapidly
increasing.
These
advanced
are
particularly
concentrated
on
Active
Directory
(AD)
servers,
causing
significant
operational
financial
disruption
to
the
affected
organizations.
In
this
study,
multi-step
behavior
of
was
deeply
investigated
decipher
sequential
techniques
strategies
attackers.
One
key
insights
uncovered
is
vulnerability
in
AD
administrator
accounts,
which
often
used
a
primary
point
exploitation.
This
study
aims
provide
comprehensive
analysis
that
enables
organizations
develop
deeper
understanding
multifaceted
threats
posed
by
build
more
strategic
robust
defenses
against
them.
Язык: Английский
Industrial Cyber-Physical Security Attacks on Infrastructure Control Systems using Microsoft’s ICSpector Open-Source Framework
Опубликована: Авг. 9, 2024
Язык: Английский
Enhancing Cybersecurity in Energy IT Infrastructure Through a Layered Defense Approach to Major Malware Threats
Applied Sciences,
Год журнала:
2024,
Номер
14(22), С. 10342 - 10342
Опубликована: Ноя. 11, 2024
This
study
examines
the
cybersecurity
vulnerabilities
of
energy
IT
infrastructure
in
context
rapid
digital
transformation
and
network
expansion.
While
these
advancements
have
improved
efficiency,
they
also
increased
susceptibility
to
cyber
threats,
particularly
from
malware
such
as
Industroyer,
Triton,
NotPetya,
BlackEnergy3.
By
analyzing
this
research
identifies
key
weaknesses
systems
highlights
need
for
enhanced
anomaly
detection,
segmentation,
system
integrity
checks.
To
address
vulnerabilities,
proposes
a
layered
security
architecture
which
each
layer—physical,
control,
network,
application,
security—provides
independent
protection
while
integrating
into
unified
defense
strategy.
emphasizes
necessity
combining
technical-,
organizational-,
policy-based
responses
bolster
across
all
levels
infrastructure.
Key
recommendations
include
immediate
vulnerability
patching,
international
cooperation,
stronger
legal
frameworks,
education,
establishment
command
structure.
provides
practical
insights
strategies
strengthening
through
comprehensive,
integrated
approach.
Язык: Английский