Intrusion Detection with Unsupervised Techniques for Network Management Protocols over Smart Grids

被引:5
|
作者
Vega Vega, Rafael Alejandro [1 ]
Chamoso-Santos, Pablo [2 ,3 ]
Gonzalez Briones, Alfonso [2 ,3 ,4 ]
Casteleiro-Roca, Jose-Luis [1 ]
Jove, Esteban [1 ]
del Carmen Meizoso-Lopez, Maria [1 ]
Antonio Rodriguez-Gomez, Benigno [1 ]
Quintian, Hector [1 ]
Herrero, Alvaro [5 ]
Matsui, Kenji [6 ]
Corchado, Emilio [2 ]
Luis Calvo-Rolle, Jose [1 ]
机构
[1] Univ A Coruna, Dept Ind Engn, Ferrol 15403, Spain
[2] Univ Salamanca, BISITE Res Grp, Edificio I D I,Calle Espejo 2, Salamanca 37007, Spain
[3] IoT Digital Innovat Hub Spain, Air Inst, Calle Segunda 4, Salamanca 37188, Spain
[4] Univ Complutense Madrid, Res Grp Agent Based Social & Interdisciplinary Ap, Madrid 28040, Spain
[5] Univ Burgos, Dept Ingn Informat, Escuela Politecn Super, Grp Inteligencia Computac Aplicada GICAP, Ave Cantabria S-N, Burgos 09006, Spain
[6] Osaka Inst Technol, Fac Robot & Design, Osaka 5358585, Japan
来源
APPLIED SCIENCES-BASEL | 2020年 / 10卷 / 07期
关键词
smart grid; computational intelligence; automatic response; exploratory projection pursuit; neural networks; CLUSTERING EXTENSION; MOVICAB-IDS; SECURITY; VISUALIZATION; PERSPECTIVE;
D O I
10.3390/app10072276
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The present research work focuses on overcoming cybersecurity problems in the Smart Grid. Smart Grids must have feasible data capture and communications infrastructure to be able to manage the huge amounts of data coming from sensors. To ensure the proper operation of next-generation electricity grids, the captured data must be reliable and protected against vulnerabilities and possible attacks. The contribution of this paper to the state of the art lies in the identification of cyberattacks that produce anomalous behaviour in network management protocols. A novel neural projectionist technique (Beta Hebbian Learning, BHL) has been employed to get a general visual representation of the traffic of a network, making it possible to identify any abnormal behaviours and patterns, indicative of a cyberattack. This novel approach has been validated on 3 different datasets, demonstrating the ability of BHL to detect different types of attacks, more effectively than other state-of-the-art methods.
引用
收藏
页数:13
相关论文
共 50 条
  • [11] Protocol Aware Unsupervised Network Intrusion Detection System
    Ratti, Ritesh
    Singh, Sanasam Ranbir
    Nandi, Sukumar
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 1524 - 1531
  • [12] An Unsupervised Network Intrusion Detection Based on Anomaly Analysis
    Zhong, Jiang
    Deng, Xiongbing
    Wen, Luosheng
    Feng, Yong
    ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL II, PROCEEDINGS, 2009, : 367 - +
  • [13] Clustering Techniques for Data Network Planning in Smart Grids
    Vrbsky, Ladislav
    da Silva, Marcelino Silva
    Cardoso, Diego Lisboa
    Lisboa Frances, Carlos Renato
    PROCEEDINGS OF THE 2017 IEEE 14TH INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC 2017), 2017, : 7 - 12
  • [14] A fog-edge-enabled intrusion detection system for smart grids
    Tariq, Noshina
    Alsirhani, Amjad
    Humayun, Mamoona
    Alserhani, Faeiz
    Shaheen, Momina
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01):
  • [15] A fog-edge-enabled intrusion detection system for smart grids
    Noshina Tariq
    Amjad Alsirhani
    Mamoona Humayun
    Faeiz Alserhani
    Momina Shaheen
    Journal of Cloud Computing, 13
  • [16] An Unsupervised Learning Approach for In-Vehicle Network Intrusion Detection
    Leslie, Nandi
    2021 55TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2021,
  • [17] An artificial immune clustering approach to unsupervised network intrusion detection
    Wang Sifei
    Xu Jiayi
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 511 - 513
  • [18] Adaptive ensembles of autoencoders for unsupervised IoT network intrusion detection
    Abdul Jabbar Siddiqui
    Azzedine Boukerche
    Computing, 2021, 103 : 1209 - 1232
  • [19] Information fusion techniques for network intrusion detection
    Ye, N
    Giordano, J
    Feldman, J
    Zhong, Q
    1998 IEEE INFORMATION TECHNOLOGY CONFERENCE, PROCEEDINGS, 1998, : 117 - 120
  • [20] Unsupervised Network Intrusion Detection Using Convolutional Neural Networks
    Alam, Shumon
    Alam, Yasin
    Cui, Suxia
    Akujuobi, Cajetan M.
    2023 IEEE 13TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE, CCWC, 2023, : 712 - 717