Team for Research in
Ubiquitous Secure Technology

Design of Policy Engine to Prevent Malware Propagation in AMI
Younghee Park

Citation
Younghee Park. "Design of Policy Engine to Prevent Malware Propagation in AMI". Talk or presentation, 9, October, 2013.

Abstract
Malware can disrupt the efficient operation of valuable services in advanced metering infrastructure (AMI) through ever present threats on the Internet. To prevent such malevolent attacks, we must choke out malware propagation in AMI. In this paper, we propose a policy engine to block unwanted incoming or outgoing traffic through AMI systems. The policy engine is designed to use the standard AMI application layer protocol as well as the statistical characteristics of metering data. The experimental results demonstrate that the policy engine does identify metering data carrying malware according to the defined policy rules.

Electronic downloads

Citation formats  
  • HTML
    Younghee Park. <a
    href="http://www.truststc.org/pubs/921.html"
    ><i>Design of Policy Engine to Prevent Malware
    Propagation in AMI</i></a>, Talk or
    presentation,  9, October, 2013.
  • Plain text
    Younghee Park. "Design of Policy Engine to Prevent
    Malware Propagation in AMI". Talk or presentation,  9,
    October, 2013.
  • BibTeX
    @presentation{Park13_DesignOfPolicyEngineToPreventMalwarePropagationInAMI,
        author = {Younghee Park},
        title = {Design of Policy Engine to Prevent Malware
                  Propagation in AMI},
        day = {9},
        month = {October},
        year = {2013},
        abstract = {Malware can disrupt the efficient operation of
                  valuable services in advanced metering
                  infrastructure (AMI) through ever present threats
                  on the Internet. To prevent such malevolent
                  attacks, we must choke out malware propagation in
                  AMI. In this paper, we propose a policy engine to
                  block unwanted incoming or outgoing traffic
                  through AMI systems. The policy engine is designed
                  to use the standard AMI application layer protocol
                  as well as the statistical characteristics of
                  metering data. The experimental results
                  demonstrate that the policy engine does identify
                  metering data carrying malware according to the
                  defined policy rules.},
        URL = {http://www.truststc.org/pubs/921.html}
    }
    

Posted by Carolyn Winter on 18 Nov 2013.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.