Joshua Rivera’s research while affiliated with National Renewable Energy Laboratory and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (4)


NETWORK VISUALIZATION , INTRUSION DETECTION , AND NETWORK HEALING
  • Patent
  • Full-text available

April 2021

·

15 Reads

Joshua Rivera

·

·

Evan Vaughan

·

Adarsh Hasandka

The present disclosure is related to a cyber-security system that includes a Supervisory Control and Data Acquisition (SCADA) network monitor configured to receive a data set from a power system network , an event manager , and a mitigation system , where the SCADA network monitor includes an anomaly detector .

Download

Fig. 1: Proposed methodology of signature-and model-based IDSs.
Fig. 2: Proposed methodology of machine learning-based IDS. B. Implementing Architecture
HIDES: Hybrid Intrusion Detector for Energy Systems

February 2020

·

322 Reads

·

8 Citations



A Multidimensional Holistic Framework for the Security of Distributed Energy and Control Systems

July 2019

·

547 Reads

·

25 Citations

IEEE Systems Journal

·

·

·

[...]

·

The digitization of smart grid distributed generation and industrial control systems has prompted utilities to deploy tools with ubiquitous communications that potentially widen the attack surface. The utilities still continue to rely on the traditional cybersecurity technologies, such as firewalls, anti-malware tools, and passwords that do not ensure security across all dimensions of the information assurance model required for a strong cyberse-curity business process. This paper proposes a multidimensional holistic framework that addresses this gap through advanced technologies, intelligent algorithms, and continued assessments. To show proof, the layered defense model, a solution dimension of the framework, is integrated into the National Renewable Energy Laboratory's Security and Resilience Testbed to replicate a utility's enterprise and substation networks. The model is used to evaluate the security and resilience of microgrid control systems, and, based on the insights gathered, recommend best practices for utility cybersecurity analysts for a strong business process. With this baseline, the paper conceptually introduces intelligence-driven solutions comprising contextual data analysis and machine learning to respond to advanced persistent threats sponsored by campaign efforts.

Citations (3)


... I Cai et al. [11] I Degeler et al. [13] I Samir et al. [14] I Wyers et al. [15] I Gill et al. [12] I Mehmet [16] 2. Self-Healing Approaches and Techniques I Chen and Bahsoon [17] I Singh et al. [18] I Stojanovic and Stojanovic [19] I Berry and Chollot [20] I Schneider et al. [10] I Khalil et al. [21] I Hsieh [14] I El Fallah Seghrouchni et al. [2] 3. Intrusion Detection and Security I Degeler et al. [13] I Joseph and Mukesh [9] I Ahmad et al. [22] I Berry and Chollot [20] I Zhang et al. [6] I Subashini and Kavitha [4] I Colabianchi et al. [23] I Mohammadi et al. [24] ...

Reference:

Self-Healing in Cyber–Physical Systems Using Machine Learning: A Critical Analysis of Theories and Tools
SHARP-Net: Platform for Self-Healing and Attack Resilient PMU Networks

... Ramp Attack: Ramp attack on the measurement or control signals involves either continuous increase or decrease of the amplitude of the signal being attacked by addition or subtraction of attack vector parameters, respectively, to the target signal. Ramp attack [19] involve adding a time-changing ramp signal with a ramp signal parameter, λ ramp to the input signal, P i (t), as shown in (5). ...

HIDES: Hybrid Intrusion Detector for Energy Systems

... Holistic Security Frameworks: Existing research primarily addresses individual security measures, but there is a lack of comprehensive frameworks that integrate various security protocols and techniques into a unified, holistic approach [286]. Future research should focus on developing and validating such frameworks to ensure end-to-end security in 5G networks. ...

A Multidimensional Holistic Framework for the Security of Distributed Energy and Control Systems
  • Citing Article
  • July 2019

IEEE Systems Journal