Developing a Hybrid Intrusion Detection System Using Data Mining for Power Systems

被引:268
作者
Pan, Shengyi [1 ]
Morris, Thomas [1 ]
Adhikari, Uttam [1 ]
机构
[1] Mississippi State Univ, Starkville, MS 39762 USA
基金
美国国家科学基金会;
关键词
Cyber-attacks; data mining; distance protection; intrusion detection system (IDS); power system; synchrophasor system; FRAMEWORK;
D O I
10.1109/TSG.2015.2409775
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Synchrophasor systems provide an immense volume of data for wide area monitoring and control of power systems to meet the increasing demand of reliable energy. The construction of traditional intrusion detection systems (IDSs) that use manually created rules based upon expert knowledge is knowledge-intensive and is not suitable in the context of this big data problem. This paper presents a systematic and automated approach to build a hybrid IDS that learns temporal state-based specifications for power system scenarios including disturbances, normal control operations, and cyber-attacks. A data mining technique called common path mining is used to automatically and accurately learn patterns for scenarios from a fusion of synchrophasor measurement data, and power system audit logs. As a proof of concept, an IDS prototype was implemented and validated. The IDS prototype accurately classifies disturbances, normal control operations, and cyber-attacks for the distance protection scheme for a two-line three-bus power transmission system.
引用
收藏
页码:3104 / 3113
页数:10
相关论文
共 24 条
[1]  
AGRAWAL R, 1995, PROC INT CONF DATA, P3, DOI 10.1109/ICDE.1995.380415
[2]   An integrated lookahead control-based adaptive supervisory framework for autonomic power system applications [J].
Amgai, Ranjit ;
Shi, Jian ;
Abdelwahed, Sherif .
INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2014, 63 :824-835
[3]  
[Anonymous], 2014, NISTIR 7628 GUID SMA, V1
[4]  
[Anonymous], 2010, POWER SYSTEM ANAL
[5]  
[Anonymous], SYST VIEW MOD GRID
[6]  
[Anonymous], 2010, NERC STAND CRIT INFR
[7]  
[Anonymous], 2012, P 2 ACM C DAT APPL S
[8]  
[Anonymous], GAO11117
[9]  
[Anonymous], P 7 INT S RES CONTR
[10]   Specification-based Intrusion Detection for Advanced Metering Infrastructures [J].
Berthier, Robin ;
Sanders, William H. .
2011 IEEE 17TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2011, :184-193