1,746 research outputs found

    What Ukraine Taught NATO about Hybrid Warfare

    Get PDF
    Russia’s invasion of Ukraine in 2022 forced the United States and its NATO partners to be confronted with the impact of hybrid warfare far beyond the battlefield. Targeting Europe’s energy security, Russia’s malign influence campaigns and malicious cyber intrusions are affecting global gas prices, driving up food costs, disrupting supply chains and grids, and testing US and Allied military mobility. This study examines how hybrid warfare is being used by NATO’s adversaries, what vulnerabilities in energy security exist across the Alliance, and what mitigation strategies are available to the member states. Cyberattacks targeting the renewable energy landscape during Europe’s green transition are increasing, making it urgent that new tools are developed to protect these emerging technologies. No less significant are the cyber and information operations targeting energy security in Eastern Europe as it seeks to become independent from Russia. Economic coercion is being used against Western and Central Europe to stop gas from flowing. China’s malign investments in Southern and Mediterranean Europe are enabling Beijing to control several NATO member states’ critical energy infrastructure at a critical moment in the global balance of power. What Ukraine Taught NATO about Hybrid Warfare will be an important reference for NATO officials and US installations operating in the European theater.https://press.armywarcollege.edu/monographs/1952/thumbnail.jp

    Security Technology by Using Firewall for Smart Grid

    Full text link
    Due to the increasing development of computer systems and information networks, power grids should change extensively too. Nowadays, substantial movement has begun to implement the Smart Grid industry around the world. Since with the creation of smart electricity grids, it is possible to access the internal network from the external spaces, it is also necessary to protect information and data against unauthorized access. Therefore, a firewall should be used for information security. The firewall based on existing security regulations, decides which data is incoming to the network or going out of the network. Considering the discussions of passive defense topics at the national level and also the high importance of information security in Smart Grids, in this paper, in addition to examining the Firewalls, its advantages and disadvantages are also stated. Although the firewall has a major role in establishing security, and its installation and appropriate configuration can only be one of the primary activities in this field, we should also take advantage of other security mechanisms to enhance the security of the Smart Grid

    Security Technology by using Firewall for Smart Grid

    Get PDF
    Due to the increasing development of computer systems and information networks, power grids should change extensively too. Nowadays, substantial movement has begun to implement the Smart Grid industry around the world. Since with the creation of smart electricity grids, it is possible to access the internal network from the external spaces, it is also necessary to protect information and data against unauthorized access. Therefore, a firewall should be used for information security. The firewall based on existing security regulations, decides which data is incoming to the network or going out of the network. Considering the discussions of passive defense topics at the national level and also the high importance of information security in Smart Grids, in this paper, in addition to examining the Firewalls, its advantages and disadvantages are also stated. Although the firewall has a major role in establishing security, and its installation and appropriate configuration can only be one of the primary activities in this field, we should also take advantage of other security mechanisms to enhance the security of the Smart Grid

    Multidimensional Intrusion Detection System for IEC 61850 based SCADA Networks

    Get PDF

    Autonomic computing architecture for SCADA cyber security

    Get PDF
    Cognitive computing relates to intelligent computing platforms that are based on the disciplines of artificial intelligence, machine learning, and other innovative technologies. These technologies can be used to design systems that mimic the human brain to learn about their environment and can autonomously predict an impending anomalous situation. IBM first used the term ‘Autonomic Computing’ in 2001 to combat the looming complexity crisis (Ganek and Corbi, 2003). The concept has been inspired by the human biological autonomic system. An autonomic system is self-healing, self-regulating, self-optimising and self-protecting (Ganek and Corbi, 2003). Therefore, the system should be able to protect itself against both malicious attacks and unintended mistakes by the operator

    Machine Learning Methods for Attack Detection in the Smart Grid

    Get PDF
    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semi-supervised) are employed with decision and feature level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than the attack detection algorithms which employ state vector estimation methods in the proposed attack detection framework.Comment: 14 pages, 11 Figure
    corecore