Balduino Estison Mugilila Camachi, D. Popescu, L. Ichim
{"title":"基于MAC值分析的智能电网保护","authors":"Balduino Estison Mugilila Camachi, D. Popescu, L. Ichim","doi":"10.1109/ECAI46879.2019.9042013","DOIUrl":null,"url":null,"abstract":"The purpose of this paper is to illustrate the vulnerabilities found through the studies, mainly through the methods of preventing an attack of a Smart Grid. Having a contingency plan of attacks is not something complex and should be part of everyday business, it's wrong to think that answering a security incident only happens in cases of mega attacks, such as WannaCry. Any Security threat must be taken seriously, no matter how small the threat is, because the threat might just be a test of vulnerability. The main goal of this article is to prevent cyber-attacks of Smart Grid using MAC Value Analysis. On this article the goal is to protect the network from these attacks.","PeriodicalId":285780,"journal":{"name":"2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Smart Grid Protection using MAC Value Analysis\",\"authors\":\"Balduino Estison Mugilila Camachi, D. Popescu, L. Ichim\",\"doi\":\"10.1109/ECAI46879.2019.9042013\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The purpose of this paper is to illustrate the vulnerabilities found through the studies, mainly through the methods of preventing an attack of a Smart Grid. Having a contingency plan of attacks is not something complex and should be part of everyday business, it's wrong to think that answering a security incident only happens in cases of mega attacks, such as WannaCry. Any Security threat must be taken seriously, no matter how small the threat is, because the threat might just be a test of vulnerability. The main goal of this article is to prevent cyber-attacks of Smart Grid using MAC Value Analysis. On this article the goal is to protect the network from these attacks.\",\"PeriodicalId\":285780,\"journal\":{\"name\":\"2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)\",\"volume\":\"68 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ECAI46879.2019.9042013\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ECAI46879.2019.9042013","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The purpose of this paper is to illustrate the vulnerabilities found through the studies, mainly through the methods of preventing an attack of a Smart Grid. Having a contingency plan of attacks is not something complex and should be part of everyday business, it's wrong to think that answering a security incident only happens in cases of mega attacks, such as WannaCry. Any Security threat must be taken seriously, no matter how small the threat is, because the threat might just be a test of vulnerability. The main goal of this article is to prevent cyber-attacks of Smart Grid using MAC Value Analysis. On this article the goal is to protect the network from these attacks.