Choi, Kyung; Chen, Xinyi; Li, Shi; Kim, Mihui; Chae, Kijoon - In: Energies 5 (2012) 10, pp. 4091-4109
that our selected attack attributes, and the proposed detection process, are efficient and suitable for intrusion detection …In this paper, we analyze the Network and System Management (NSM) requirements and NSM data objects for the intrusion … detection of power systems; NSM is an IEC 62351-7 standard. We analyze a SYN flood attack and a buffer overflow attack to cause …