Novel Approach for Detecting Network Anomalies for Substation Automation based on IEC 61850

被引:44
作者
Yoo, Hyunguk [1 ,2 ]
Shon, Taeshik [3 ]
机构
[1] Ajou Univ, Comp Engn Integrated Course, Suwon 441749, Gyeonggi Do, South Korea
[2] Ajou Univ, ICS Informat Commun Secur Lab, Suwon 441749, Gyeonggi Do, South Korea
[3] Ajou Univ, Coll Informat Technol, Div Informat & Comp Engn, Suwon 441749, Gyeonggi Do, South Korea
关键词
IEC; 61850; Substation automation; Smartgrid; Anomaly detection; Machine learning; EM; SVM;
D O I
10.1007/s11042-014-1870-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An SA (Substation Automation) system based on IEC 61850 is an intelligent substation; it has been receiving considerable attention as a core component of a smart grid. The explosive increase of threats to cyber security has been expanded to critical national infrastructures including the power grid. Substation Automation has also become a main target of cyber-attacks. Currently, various countermeasures such as firewalls, IDS (Intrusion Detection System)s, and anti-virus solutions have been developed, but to date, these have not sufficiently reflected the inherent features of Substation Automation based on IEC 61850. This study suggests a method of anomaly detection for MMS (Manufacturing Message Specification) and GOOSE (Generic Object Oriented Substation Events) packets, the main communication protocols of IEC 61850 Substation Automation. 3-Phase preprocessing, EM (Expect Maximization), and one-class SVM (Support Vector Machine) techniques are applied. The effectiveness of the suggested method is evaluated through experiments.
引用
收藏
页码:303 / 318
页数:16
相关论文
共 20 条
[1]  
[Anonymous], 2010, P 1 WORKSH SEC CONTR
[2]  
Barbosa RRR, 2010, MECH AUTONOMOUS MANA
[3]  
Barbosa RRR, 2012, EM TECHN FACT AUT ET
[4]  
Breunig M.M., 2000, ACM SIGMOD REC, V29
[5]  
Cheung S., 2007, SCADA SEC SCI S
[6]   MAXIMUM LIKELIHOOD FROM INCOMPLETE DATA VIA EM ALGORITHM [J].
DEMPSTER, AP ;
LAIRD, NM ;
RUBIN, DB .
JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES B-METHODOLOGICAL, 1977, 39 (01) :1-38
[7]  
Dussel Patrick., 2010, Critical Information Infrastructures Security (CRITIS)
[8]  
Garitano I, 2010, INTELLIGENT SOFT COM
[9]  
Kirrmann H., 2012, INTRO IEC 61850 ELEC
[10]  
Markey E.J., 2013, Electric Grid Vulnerability: Industry Responses Reveal Security Gaps