Detailed Information

Cited 5 time in webofscience Cited 0 time in scopus
Metadata Downloads

Optimal packet scan against malicious attacks in smart grids

Full metadata record
DC Field Value Language
dc.contributor.authorMishra, Subhankar-
dc.contributor.authorDinh, Thang N.-
dc.contributor.authorThai, My T.-
dc.contributor.authorSeo, Jungtaek-
dc.contributor.authorShin, Incheol-
dc.date.accessioned2021-09-15T04:40:16Z-
dc.date.available2021-09-15T04:40:16Z-
dc.date.created2021-09-15-
dc.date.issued2016-01-
dc.identifier.issn0304-3975-
dc.identifier.urihttps://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/82130-
dc.description.abstractWith the integration of advanced computing and communication technologies, the Smart Grid is expected to greatly enhance efficiency and reliability of future power systems with renewable energy resources, as well as distributed intelligence and demand response. Along with the salient features of the Smart Grid, cyber security emerges to be a critical issue because millions of electronic devices are inter-connected via communication networks throughout critical power facilities, which has an immediate impact on reliability of such a widespread infrastructure. In this paper, we discuss the packet based attacks and study the Optimal Inspection Points (OIP) problem, which asks us to find a subset of nodes in a given network to perform the Deep Packet Inspection so as to maximize the number of scanned packets while satisfying the delay constraints. This problem finds many applications for malicious attack detection, especially for those cases where each single packet or the network traffic is required to be inspected. Accordingly, we prove OIP is NP-complete and provide an FPTAS in the case of single path routing. For the multiple path routings, we design an FPTAS when the routing graph takes a form of series-parallel graphs, which is commonly used to model electric networks. We also discuss the multi-scan scenario and design PIVOT algorithm to tackle the problem and evaluate the algorithms through experiments. (C) 2015 Elsevier B.V. All rights reserved.-
dc.language영어-
dc.language.isoen-
dc.publisherELSEVIER-
dc.relation.isPartOfTHEORETICAL COMPUTER SCIENCE-
dc.titleOptimal packet scan against malicious attacks in smart grids-
dc.typeArticle-
dc.type.rimsART-
dc.description.journalClass1-
dc.identifier.wosid000367275000009-
dc.identifier.doi10.1016/j.tcs.2015.07.054-
dc.identifier.bibliographicCitationTHEORETICAL COMPUTER SCIENCE, v.609, pp.606 - 619-
dc.description.isOpenAccessN-
dc.citation.endPage619-
dc.citation.startPage606-
dc.citation.titleTHEORETICAL COMPUTER SCIENCE-
dc.citation.volume609-
dc.contributor.affiliatedAuthorSeo, Jungtaek-
dc.type.docTypeArticle; Proceedings Paper-
dc.subject.keywordAuthorMalicious attacks detection-
dc.subject.keywordAuthorSmart Grids-
dc.subject.keywordAuthorApproximation algorithms-
dc.subject.keywordPlusSYSTEM-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
IT융합대학 > 컴퓨터공학과 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher SEO, JUNGTAEK photo

SEO, JUNGTAEK
College of IT Convergence (컴퓨터공학부(스마트보안전공))
Read more

Altmetrics

Total Views & Downloads

BROWSE