000 04025nam a22005295i 4500
001 978-3-319-32871-3
003 DE-He213
005 20200420221252.0
007 cr nn 008mamaa
008 160609s2016 gw | s |||| 0|eng d
020 _a9783319328713
_9978-3-319-32871-3
024 7 _a10.1007/978-3-319-32871-3
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.8
_223
100 1 _aAl-Shaer, Ehab.
_eauthor.
245 1 0 _aSecurity and Resiliency Analytics for Smart Grids
_h[electronic resource] :
_bStatic and Dynamic Approaches /
_cby Ehab Al-Shaer, Mohammad Ashiqur Rahman.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2016.
300 _aXVI, 144 p. 37 illus., 22 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aAdvances in Information Security,
_x1568-2633 ;
_v67
505 0 _aSmart Grids and Security Challenges -- Analytics for Smart Grid Security and Resiliency -- Security Analytics for AMI and SCADA -- Security Analytics for EMSE Modules -- Intrusion Detection Systems for AMI -- Resiliency Threat Analysis for SCADA. .
520 _aThis book targets the key concern of protecting critical infrastructures such as smart grids. It explains various static and dynamic security analysis techniques that can automatically verify smart grid security and resiliency and identify potential attacks in a proactive manner. This book includes three main sections. The first presents the idea of formally verifying the compliance of smart grid configurations with the security and resiliency guidelines. It provides a formal framework that verifies the compliance of the advanced metering infrastructure (AMI) configurations with the security and resiliency requirements, and generates remediation plans for potential security violations. The second section covers the formal verification of the security and resiliency of smart grid control systems by using a formal model to analyze attack evasions on state estimation, a core control module of the supervisory control system in smart grids. The model identifies attack vectors that can compromise state estimation. This section also covers risk mitigation techniques that synthesize proactive security plans that make such attacks infeasible. The last part of the book discusses the dynamic security analysis for smart grids. It shows that AMI behavior can be modeled using event logs collected at smart collectors, which in turn can be verified using the specification invariants generated from the configurations of the AMI devices. Although the focus of this book is smart grid security and resiliency, the included formal analytics are generic enough to be extended to other cyber-physical systems, especially those related to industrial control systems (ICS). Therefore, industry professionals and academic researchers will find this book an exceptional resource to learn theoretical and practical aspects of applying formal methods for the protection of critical infrastructures.
650 0 _aComputer science.
650 0 _aComputer communication systems.
650 0 _aComputer security.
650 0 _aData encryption (Computer science).
650 1 4 _aComputer Science.
650 2 4 _aSystems and Data Security.
650 2 4 _aComputer Communication Networks.
650 2 4 _aInformation Systems Applications (incl. Internet).
650 2 4 _aData Encryption.
700 1 _aRahman, Mohammad Ashiqur.
_eauthor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783319328706
830 0 _aAdvances in Information Security,
_x1568-2633 ;
_v67
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-319-32871-3
912 _aZDB-2-SCS
942 _cEBK
999 _c52676
_d52676