Microgrid, which is one of the main foundations of the future grid, inherits many properties of the smart grid such as, self‐healing capability, real‐time monitoring, advanced two‐way communication systems, low voltage ride through capability of distributed generator (DG) units, and high penetration of DGs. These substantial changes in properties and capabilities of the future grid result in significant protection challenges such as bidirectional fault current, various levels of fault current under different operating conditions, necessity of standards for automation system, cyber security issues, as well as, designing an appropriate grounding system, fast fault detection/location method, the need for an efficient circuit breaker for DC microgrids. Due to these new challenges in microgrid protection, the conventional protection strategies have to be either modified or substituted with new ones. This study aims to provide a comprehensive review of the protection challenges in AC and DC microgrids and available solutions to deal with them. Future trends in microgrid protection are also briefly discussed.
more »
« less
On Vulnerability and Security Log analysis: A Systematic Literature Review on Recent Trends
Log analysis is a technique of deriving knowledge from log files containing records of events in a computer system. A common application of log analysis is to derive critical information about a system's security issues and intrusions, which subsequently leads to being able to identify and potentially stop intruders attacking the system. However, many systems produce a high volume of log data with high frequency, posing serious challenges in analysis. This paper contributes with a systematic literature review and discusses current trends, advancements, and future directions in log security analysis within the past decade. We summarized current research strategies with respect to technology approaches from 34 current publications. We identified limitations that poses challenges to future research and opened discussion on issues towards logging mechanism in the software systems. Findings of this study are relevant for software systems as well as software parts of the Internet of Things (IoT) systems.
more »
« less
- Award ID(s):
- 1854049
- PAR ID:
- 10203755
- Date Published:
- Journal Name:
- RACS '20: Proceedings of the International Conference on Research in Adaptive and Convergent Systems
- Page Range / eLocation ID:
- 175 to 180
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
null (Ed.)In modern computing, log files provide a wealth of information regarding the past of a system, including the system failures and security breaches that cost companies and developers a fortune in both time and money. While this information can be used to attempt to recover from a problem, such an approach merely mitigates the damage that has already been done. Detecting problems, however, is not the only information that can be gathered from log files. It is common knowledge that segments of log files, if analyzed correctly, can yield a good idea of what the system is likely going to do next in real-time, allowing a system to take corrective action before any negative actions occur. In this paper, the authors put forth a systematic map of this field of log prediction, screening several hundred papers and finally narrowing down the field to approximately 30 relevant papers. These papers, when broken down, give a good idea of the state of the art, methodologies employed, and future challenges that still must be overcome. Findings and conclusions of this study can be applied to a variety of software systems and components, including classical software systems, as well as software parts of control, or the Internet of Things (IoT) systems.more » « less
-
Analyzing, implementing and maintaining security requirements of software-intensive systems and achieving truly secure software requires planning for security from ground up, and continuously assuring that security is maintained across the software's lifecycle and even after deployment when software evolves. Given the increasing complexity of software systems, new application domains, dynamic and often critical operating conditions, the distributed nature of many software systems, and fast moving markets which put pressure on software vendors, building secure systems from ground up becomes even more challenging. Security-related issues have previously been targeted in software engineering sub-communities and venues. In the second edition of the International Workshop on Security from Design to Deployment (SEAD) at the International Conference on Automated Software Engineering (ASE) 2020, we aimed to bring the research and practitioner communities of requirements engineers, security experts, architects, developers, and testers together to identify foundations, and challenges, and to formulate solutions related to automating the analysis, design, implementation, testing, and maintenance of secure software systems.more » « less
-
null (Ed.)Wireless infrastructure is steadily evolving into wireless access for all humans and most devices, from 5G to Internet-of-Things. This widespread access creates the expectation of custom and adaptive services from the personal network to the backbone network. In addition, challenges of scale and interoperability exist across networks, applications and services, requiring an effective wireless network management infrastructure. For this reason Software-Defined Networks (SDN) have become an attractive research area for wireless and mobile systems. SDN can respond to sporadic topology issues such as dropped packets, message latency, and/or conflicting resource management, to improved collaboration between mobile access points, reduced interference and increased security options. Until recently, the main focus on wireless SDN has been a more centralized approach, which has issues with scalability, fault tolerance, and security. In this work, we propose a state of the art WAM-SDN system for large-scale network management. We discuss requirements for large scale wireless distributed WAM-SDN and provide preliminary benchmarking and performance analysis based on our hybrid distributed and decentralized architecture. Keywords: software defined networks, controller optimization, resilience.more » « less
-
Abstract Urbanization and competing water demand, as well as rising temperatures and changing weather patterns, are manifesting as gradual processes that increasingly challenge urban water supply security. Cities are also threatened by acute risks arising at the intersection of aging infrastructure, entrenched institutions, and the increasing occurrence of extreme weather events. To better understand these multi-layered, interacting challenges of providing urban water supply for all, while being prepared to deal with recurring shocks, we present an integrated analysis of water supply security in New York City and its resilience to acute shocks and chronic disturbances. We apply a revised version of a recently developed, quantitative framework (‘Capital Portfolio Approach’, CPA) that takes a social-ecological-technological systems perspective to assess urban water supply security as the performance of water services at the household scale. Using the parameters of the CPA as input, we use a coupled systems dynamics model to investigate the dynamics of services in response to shocks—under current conditions and in a scenario of increasing shock occurrence and a loss of system robustness. We find water supply security to be high and current response to shocks to be resilient thanks to past shock experiences. However, we identify a number of risks and vulnerability issues that, if unaddressed, might significantly impact the city’s water services in the mid-term future. Our findings have relevance to cities around the world, and raise questions for research about how security and resilience can and should be maintained in the future.more » « less
An official website of the United States government

