Modeling of anomaly detection for cyber security of the substation
As the continuous increase of environment issues and energy demand for recent decades, the deeper development of smart power grid has already become a significant research topic all over the world. In order to cope with the challenges, innovative research from many other different disciplines, such...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/54303 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Summary: | As the continuous increase of environment issues and energy demand for recent decades, the deeper development of smart power grid has already become a significant research topic all over the world. In order to cope with the challenges, innovative research from many other different disciplines, such as security, complex systems engineering, social
network, mathematical research, communication technology and some others, have been put into power engineering. Electronic intrusions are proposed for manipulating critical substation network for the purpose of cyber attack, which might lead to information loss, error handling of breaker and other disastrous consequences. The author gives an overview of relevant literature on smart gird, Coloured Petri Nets and some typical attack modelling so that readers can have a better understanding of professional knowledge. In this paper, our purpose is sure, which is aim to model substation intrusion from network.Because the Colored Petri Nets could offer more expressiveness and flexibility than traditional modeling tools, it is an effective modeling tool for the smart grid attacks. To find the integral route that how cyber-intruders accesses to power grid is our final primary mission. According to functional requirements of firewall system, use CPN theoretical to model and build the demand model based on anomaly detection system. |
---|