Faults and Cyber Attacks Detection in Critical Infrastructures

  • Yannis SoupionisEmail author
  • Stavros Ntalampiras
  • Georgios Giannopoulos
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8985)


In this paper we study the case of Critical Infrastructures (CIs), and especially power grid systems, which nowadays rely on computers and the Internet for their operation. We propose a combinatorial method for automatic detection and classification of faults and cyber-attacks, when there is limited data from the power grid nodes due to cyber implications. We design an experimental platform consisting of a power grid simulator and a cyber network emulator in order to demonstrate the efficiency of the proposed method.


Critical infrastructures Cyber security Fault diagnosis LTI modeling 


  1. 1.
    Ten, C.W., Liu, C.C., Manimaran, G.: Vulnerability assessment of cybersecurity for scada systems. Power Syst. IEEE Trans. 23(4), 1836–1846 (2008)CrossRefGoogle Scholar
  2. 2.
    Zio, E., Sansavini, G.: Modeling interdependent network systems for identifying cascade-safe operating margins. Reliab. IEEE Trans. 60(1), 94–101 (2011)CrossRefGoogle Scholar
  3. 3.
    Kotzanikolaou, P., Theoharidou, M., Gritzalis, D.: Accessing n-order dependencies between critical infrastructures. Int. J. Crit. Infrastruct. 9(1–2), 93–110 (2013)CrossRefGoogle Scholar
  4. 4.
    Mo, Y., Kim, T.-H., Brancik, K., Dickinson, D., Lee, H., Perrig, A., Sinopoli, B.: Cyber - physical security of a smart grid infrastructure. In: Proceedings of the IEEE, vol. 100, no. 1, pp. 195–209, January 2012Google Scholar
  5. 5.
    Sridhar, S., Hahn, A., Govindarasu, M.: Cyber - physical system security for the electric power grid. Proc. IEEE 100(1), 210–224 (2012)CrossRefGoogle Scholar
  6. 6.
    Goebel, K., Yan, W.: Correcting sensor drift and intermittency faults with data fusion and automated learning. IEEE Syst. 2(2), 189–197 (2008)CrossRefGoogle Scholar
  7. 7.
    Napolitano, M.R., Windon, D.A., Casanova, J.L., Innocenti, M., Silvestri, G.: Kalman filters and neural network schemes for sensor validation in flight control systems. IEEE Trans. Control Syst. Technol. 6(5), 596–611 (1998)CrossRefGoogle Scholar
  8. 8.
    Genge, B., Siaterlis, C., Hohenadel, M.: AMICI: An assessment platform for multi-domain security experimentation on critical infrastructures. In: Hämmerli, B.M., Kalstad Svendsen, N., Lopez, J. (eds.) CRITIS 2012. LNCS, vol. 7722, pp. 228–239. Springer, Heidelberg (2013)CrossRefGoogle Scholar
  9. 9.
    Siaterlis, C., Garcia, A., Genge, B.: On the use of Emulab testbeds for scientifically rigorous experiments. IEEE Commun. Surveys Tuts. 15(2), 929–942 (2012)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  • Yannis Soupionis
    • 1
    Email author
  • Stavros Ntalampiras
    • 1
  • Georgios Giannopoulos
    • 1
  1. 1.Security Technology Assessment Unit, European Commission, Joint Research Centre (JRC)Institute for the Protection and Security of the Citizen (IPSC)IspraItaly

Personalised recommendations