Implementation of deep packet inspection in smart grids and industrial Internet of Things: Challenges and opportunities

被引:62
作者
Parra, Gonzalo De la Torre [1 ]
Rad, Paul [1 ,2 ]
Choo, Kim-Kwang Raymond [1 ,2 ]
机构
[1] Univ Texas San Antonio, Dept Elect & Comp Engn, San Antonio, TX 78249 USA
[2] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
关键词
Smart grid; Industrial control system; Industrial internet of things; Deep Packet Inspection; Advanced metering infrastructure; Cybersecurity; Forensic-by-design; Forensic-driven security monitoring; STRING-MATCHING ALGORITHMS; TRAFFIC CLASSIFICATION; INTRUSION DETECTION; ARCHITECTURE; SEARCH; CAPTURE; DPI; END;
D O I
10.1016/j.jnca.2019.02.022
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Upgrading a power grid to a smart grid is a challenging task. For example, since power grids were originally developed to support unidirectional communications, the migration process requires architectural and cybersecurity upgrades due to the integration of devices using bidirectional communication. The integration of these devices opens numerous avenues for cyber attacks, although they also enable numerous capabilities in smart grids. To protect the smart grid from cyber threats, it is important for industry and academia to explore and implement practical cybersecurity models together, for example collaboratively designing and developing suitable smart grid testbeds to facilitate research. In this paper, we survey existing literature relating to the infrastructure and communications for the energy sector and smart grids. Specifically, we study existing recommendations and models from government agencies (e.g. NIST and DOE) and academia, and evaluate deep packet inspection (DPI) approaches as a security tool for smart grids. We also propose a conceptual SDN-based security monitoring framework based on SDN, Network Behavior Analysis (NBA), Deep Learning Models, and DPI attack corroboration, as well as a conceptual forensic-driven security monitoring framework where digital forensics and investigation capabilities are integrated to inform security monitoring.
引用
收藏
页码:32 / 46
页数:15
相关论文
共 124 条
  • [1] Cloud incident handling and forensic-by-design: cloud storage as a case study
    Ab Rahman, Nurul Hidayah
    Cahyani, Niken Dwi Wahyu
    Choo, Kim-Kwang Raymond
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (14)
  • [2] AbuHmed T., 2008, INF SECUR, V24, P10, DOI [10.1109/ICNISC.2015.17, DOI 10.1109/ICNISC.2015.17]
  • [3] EFFICIENT STRING MATCHING - AID TO BIBLIOGRAPHIC SEARCH
    AHO, AV
    CORASICK, MJ
    [J]. COMMUNICATIONS OF THE ACM, 1975, 18 (06) : 333 - 340
  • [4] Libtrace: A Packet Capture and Analysis Library
    Alcock, Shane
    Lorier, Perry
    Nelson, Richard
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2012, 42 (02) : 43 - 48
  • [5] [Anonymous], 1506732012 ISOIEC
  • [6] [Anonymous], 15882008 IEEE
  • [7] [Anonymous], 2007, P 3 ACM IEEE S ARCH, DOI DOI 10.1145/1323548.1323573
  • [8] [Anonymous], 2007, COMPILERS PRINCIPLES
  • [9] [Anonymous], 2011, C3711812011 IEEE
  • [10] [Anonymous], 2017, NIST CYBERSECURITY F