BLITHE: Behavior Rule-Based Insider Threat Detection for Smart Grid

被引:33
作者
Bao, Haiyong [1 ,2 ]
Lu, Rongxing [1 ]
Li, Beibei [1 ]
Deng, Ruilong [1 ]
机构
[1] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
[2] Zhejiang Gongshang Univ, Sch Comp Sci & Informat Engn, Hangzhou 310018, Zhejiang, Peoples R China
关键词
Insider threat detection; security; smart grid; INTRUSION DETECTION; OPTIMIZATION;
D O I
10.1109/JIOT.2015.2459049
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a behavior rule-based methodology for insider threat (BLITHE) detection of data monitor devices in smart grid, where the continuity and accuracy of operations are of vital importance. Based on the dc power flow model and state estimation model, three behavior rules are extracted to depict the behavior norms of each device, such that a device (trustee) that is being monitored on its behavior can be easily checked on the deviation from the behavior specification. Specifically, a rule-weight and compliance-distance-based grading strategy is designed, which greatly improves the effectiveness of the traditional grading strategy for evaluation of trustees. The statistical property, i.e., the mathematical expectation of compliance degree of each trustee, is particularly analyzed from both theoretical and practical perspectives, which achieves satisfactory tradeoff between detection accuracy and false alarms to detect more sophisticated and hidden attackers. In addition, based on real data run in POWER WORLD for IEEE benchmark power systems, and through comparative analysis, we demonstrate that BLITHE outperforms the state of arts for detecting abnormal behaviors in pervasive smart grid applications.
引用
收藏
页码:190 / 205
页数:16
相关论文
共 48 条
[1]  
Anand M., 2006, Beyond SCADA: Networked Embedded Control for Cyber Physical Systems
[2]  
[Anonymous], 2005, Proceedings 1st ACM International Workshop on Quality of service Security in Wireless and Mobile Networks
[3]  
[Anonymous], 2012, Power Generation, Operation, and Control
[4]  
[Anonymous], IEEE NETWORK
[5]  
[Anonymous], 2012, P 2 ACM C DAT APPL S
[6]  
[Anonymous], 2011, P 6 ACM S INF COMP C, DOI DOI 10.1145/1966913.1966959
[7]  
[Anonymous], 2013, SIMULATION
[8]   Specification-based Intrusion Detection for Advanced Metering Infrastructures [J].
Berthier, Robin ;
Sanders, William H. .
2011 IEEE 17TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2011, :184-193
[9]  
Cardenas A., 2009, POWER ENERGY ENG C, P1
[10]  
Cheung S., 2007, P SCADA SECURITY SCI, V46, P1