Redirigiendo al acceso original de articulo en 15 segundos...
Inicio  /  Energies  /  Vol: 5 Núm: 10Pages Par: October (2012)  /  Artículo
ARTÍCULO
TITULO

Intrusion Detection of NSM Based DoS Attacks Using Data Mining in Smart Grid

Kyung Choi    
Xinyi Chen    
Shi Li    
Mihui Kim    
Kijoon Chae and JungChan Na    

Resumen

In this paper, we analyze the Network and System Management (NSM) requirements and NSM data objects for the intrusion detection of power systems; NSM is an IEC 62351-7 standard. We analyze a SYN flood attack and a buffer overflow attack to cause the Denial of Service (DoS) attack described in NSM. After mounting the attack in our attack testbed, we collect a data set, which is based on attributes for the attack. We then run several data mining methods with the data set using the Waikato Environment for Knowledge Analysis (WEKA). In the results, we select the decision tree algorithms with high detection rates, and choose key attributes in high level components of the trees. When we run several data mining methods again with the data set of chosen key attributes, the detection rates of most data mining methods are higher than before. We prove that our selected attack attributes, and the proposed detection process, are efficient and suitable for intrusion detection in the smart grid environment.

 Artículos similares

       
 
Hassan Khazane, Mohammed Ridouani, Fatima Salahdine and Naima Kaabouch    
With the rapid advancements and notable achievements across various application domains, Machine Learning (ML) has become a vital element within the Internet of Things (IoT) ecosystem. Among these use cases is IoT security, where numerous systems are dep... ver más
Revista: Future Internet

 
Paniti Netinant, Thitipong Utsanok, Meennapa Rukhiran and Suttipong Klongdee    
With the rapid rise of digitalization in the global economy, home security systems have become increasingly important for personal comfort and property protection. The collaboration between humans, the Internet of Things (IoT), and smart homes can be hig... ver más
Revista: IoT

 
Obinna Johnphill, Ali Safaa Sadiq, Feras Al-Obeidat, Haider Al-Khateeb, Mohammed Adam Taheir, Omprakash Kaiwartya and Mohammed Ali    
The rapid advancement of networking, computing, sensing, and control systems has introduced a wide range of cyber threats, including those from new devices deployed during the development of scenarios. With recent advancements in automobiles, medical dev... ver más
Revista: Future Internet

 
Mustafa Al Lail, Alejandro Garcia and Saul Olivo    
Modern society has quickly evolved to utilize communication and data-sharing media with the advent of the internet and electronic technologies. However, these technologies have created new opportunities for attackers to gain access to confidential electr... ver más
Revista: Future Internet

 
Kongpei Wu, Huiqin Qu and Conggui Huang    
For the current stage of complex and changing network environments and correlated and synchronized vulnerability attacks, this study first fuses attack graph technology and Bayesian networks and constructs Bayesian attack graphs toportray the correlation... ver más
Revista: Future Internet