Intrusion Detection with Unsupervised Techniques for Network Management Protocols over Smart Grids

被引:5
|
作者
Vega Vega, Rafael Alejandro [1 ]
Chamoso-Santos, Pablo [2 ,3 ]
Gonzalez Briones, Alfonso [2 ,3 ,4 ]
Casteleiro-Roca, Jose-Luis [1 ]
Jove, Esteban [1 ]
del Carmen Meizoso-Lopez, Maria [1 ]
Antonio Rodriguez-Gomez, Benigno [1 ]
Quintian, Hector [1 ]
Herrero, Alvaro [5 ]
Matsui, Kenji [6 ]
Corchado, Emilio [2 ]
Luis Calvo-Rolle, Jose [1 ]
机构
[1] Univ A Coruna, Dept Ind Engn, Ferrol 15403, Spain
[2] Univ Salamanca, BISITE Res Grp, Edificio I D I,Calle Espejo 2, Salamanca 37007, Spain
[3] IoT Digital Innovat Hub Spain, Air Inst, Calle Segunda 4, Salamanca 37188, Spain
[4] Univ Complutense Madrid, Res Grp Agent Based Social & Interdisciplinary Ap, Madrid 28040, Spain
[5] Univ Burgos, Dept Ingn Informat, Escuela Politecn Super, Grp Inteligencia Computac Aplicada GICAP, Ave Cantabria S-N, Burgos 09006, Spain
[6] Osaka Inst Technol, Fac Robot & Design, Osaka 5358585, Japan
来源
APPLIED SCIENCES-BASEL | 2020年 / 10卷 / 07期
关键词
smart grid; computational intelligence; automatic response; exploratory projection pursuit; neural networks; CLUSTERING EXTENSION; MOVICAB-IDS; SECURITY; VISUALIZATION; PERSPECTIVE;
D O I
10.3390/app10072276
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The present research work focuses on overcoming cybersecurity problems in the Smart Grid. Smart Grids must have feasible data capture and communications infrastructure to be able to manage the huge amounts of data coming from sensors. To ensure the proper operation of next-generation electricity grids, the captured data must be reliable and protected against vulnerabilities and possible attacks. The contribution of this paper to the state of the art lies in the identification of cyberattacks that produce anomalous behaviour in network management protocols. A novel neural projectionist technique (Beta Hebbian Learning, BHL) has been employed to get a general visual representation of the traffic of a network, making it possible to identify any abnormal behaviours and patterns, indicative of a cyberattack. This novel approach has been validated on 3 different datasets, demonstrating the ability of BHL to detect different types of attacks, more effectively than other state-of-the-art methods.
引用
收藏
页数:13
相关论文
共 50 条
  • [41] Genos: General In-Network Unsupervised Intrusion Detection by Rule Extraction
    Li, Ruoyu
    Li, Qing
    Zhang, Yu
    Zhao, Dan
    Xiao, Xi
    Jiang, Yong
    IEEE INFOCOM 2024-IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2024, : 561 - 570
  • [42] Unsupervised learning approach for network intrusion detection system using autoencoders
    Choi, Hyunseung
    Kim, Mintae
    Lee, Gyubok
    Kim, Wooju
    JOURNAL OF SUPERCOMPUTING, 2019, 75 (09): : 5597 - 5621
  • [43] Unsupervised Deep Learning for an Image Based Network Intrusion Detection System
    Hosler, Ryan
    Sundar, Agnideven
    Zou, Xukai
    Li, Feng
    Gao, Tianchong
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 6825 - 6831
  • [44] Evaluation of Machine Learning Techniques for Network Intrusion Detection
    Zaman, Marzia
    Lung, Chung-Horng
    NOMS 2018 - 2018 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2018,
  • [45] Network Intrusion Detection Using Hardware Techniques: A Review
    Abdulhammed, Razan
    Faezipour, Miad
    Elleithy, Khaled M.
    2016 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE (LISAT), 2016,
  • [46] Intrusion detection techniques in network environment: a systematic review
    Maruthi Rohit Ayyagari
    Nishtha Kesswani
    Munish Kumar
    Krishan Kumar
    Wireless Networks, 2021, 27 : 1269 - 1285
  • [47] Intrusion detection techniques in network environment: a systematic review
    Ayyagari, Maruthi Rohit
    Kesswani, Nishtha
    Kumar, Munish
    Kumar, Krishan
    WIRELESS NETWORKS, 2021, 27 (02) : 1269 - 1285
  • [48] Network Intrusion Detection Using Machine Learning Techniques
    Almutairi, Yasmeen
    Alhazmi, Bader
    Munshi, Amr
    ADVANCES IN SCIENCE AND TECHNOLOGY-RESEARCH JOURNAL, 2022, 16 (03) : 193 - 206
  • [49] Evaluation and Comparison of Classification Techniques for Network Intrusion Detection
    Giray, Sait Murat
    Polat, Aydin Goze
    2013 IEEE 13TH INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW), 2013, : 335 - 342
  • [50] A comparative study of unsupervised machine learning and data mining techniques for intrusion detection
    Sadoddin, Reza
    Ghorbani, Ali A.
    MACHINE LEARNING AND DATA MINING IN PATTERN RECOGNITION, PROCEEDINGS, 2007, 4571 : 404 - +