Intrusion Detection of NSM Based DoS Attacks Using Data Mining in Smart Grid

被引:24
作者
Choi, Kyung [1 ]
Chen, Xinyi [1 ]
Li, Shi [1 ]
Kim, Mihui [2 ]
Chae, Kijoon [1 ]
Na, JungChan [3 ]
机构
[1] Ewha Womans Univ, Dept Comp Sci & Engn, Seoul 120750, South Korea
[2] Hankyong Natl Univ, Dept Comp Engn, Anseong 456749, South Korea
[3] Elect & Telecommun Res Inst, Managed Secur Res Team, Taejon 305700, South Korea
基金
新加坡国家研究基金会;
关键词
Denial of Service (DoS) attack; intrusion detection; Network and System Management (NSM); smart grid; data mining;
D O I
10.3390/en5104091
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
In this paper, we analyze the Network and System Management (NSM) requirements and NSM data objects for the intrusion detection of power systems; NSM is an IEC 62351-7 standard. We analyze a SYN flood attack and a buffer overflow attack to cause the Denial of Service (DoS) attack described in NSM. After mounting the attack in our attack testbed, we collect a data set, which is based on attributes for the attack. We then run several data mining methods with the data set using the Waikato Environment for Knowledge Analysis (WEKA). In the results, we select the decision tree algorithms with high detection rates, and choose key attributes in high level components of the trees. When we run several data mining methods again with the data set of chosen key attributes, the detection rates of most data mining methods are higher than before. We prove that our selected attack attributes, and the proposed detection process, are efficient and suitable for intrusion detection in the smart grid environment.
引用
收藏
页码:4091 / 4109
页数:19
相关论文
共 26 条
[1]   Shape quantization and recognition with randomized trees [J].
Amit, Y ;
Geman, D .
NEURAL COMPUTATION, 1997, 9 (07) :1545-1588
[2]  
[Anonymous], 2005, WEK 3 DAT MIN SOFTW
[3]  
[Anonymous], 2009, 608706503ED20 IEC
[4]  
[Anonymous], 2009, 623517TSED1 IEC
[5]  
[Anonymous], 2003, 61850 IEC
[6]  
[Anonymous], 2010, 6185072 IEC
[7]   Petri Net Modeling of Cyber-Physical Attacks on Smart Grid [J].
Chen, Thomas M. ;
Carlos Sanchez-Aarnoutse, Juan ;
Buford, John .
IEEE TRANSACTIONS ON SMART GRID, 2011, 2 (04) :741-749
[8]  
Dán G, 2010, INT CONF SMART GRID, P214, DOI 10.1109/SMARTGRID.2010.5622046
[9]  
Engler F., 2005, P INT COUNC LARG EL
[10]  
Freund Y, 1999, MACHINE LEARNING, PROCEEDINGS, P124