A method for modeling and quantifying the security attributes of intrusion tolerant systems
Performance Evaluation - Dependable systems and networks-performance and dependability symposium (DSN-PDS) 2002: Selected papers
The Crutial Way of Critical Infrastructure Protection
IEEE Security and Privacy
The Design of a Generic Intrusion-Tolerant Architecture for Web Servers
IEEE Transactions on Dependable and Secure Computing
Securing Web Servers Using Self Cleansing Intrusion Tolerance (SCIT)
DEPEND '09 Proceedings of the 2009 Second International Conference on Dependability
Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery
IEEE Transactions on Parallel and Distributed Systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Analysis of techniques for building intrusion tolerant server systems
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
Survey Paper: A survey on the communication architectures in smart grid
Computer Networks: The International Journal of Computer and Telecommunications Networking
A Comparison of Intrusion-Tolerant System Architectures
IEEE Security and Privacy
Challenges in Power System Information Security
IEEE Security and Privacy
Hi-index | 0.00 |
In this paper, we propose an intrusion tolerant architecture to enhance the security of smart grid control centers. The proposed architecture is mainly composed of several modules, including replication and diversity, auditing, compromised/faulty replica detector, reconfiguration and proxy. These modules attempt to enhance the service continuity and availability of critical components in smart grid control centers due to far-reaching, economic and destructive effects of failure, malfunction, power brownout or outage on the normal operation of societies. By adopting a combination of proactive and reactive security measures to tolerate and mitigate the impacts of intrusions, the presented intrusion tolerant system shows improved availability in case of DoS attacks when analytically evaluated and compared with two well-known intrusion tolerant architectures.