Securing Smart Grids Locally using a Power Flow-based Intrusion Detection System

被引:0
|
作者
Menzel, Verena [1 ]
Arias, Nataly Banol [1 ]
Hurink, Johann L. [1 ]
Remke, Anne [2 ]
机构
[1] Univ Twente, EEMCS, MOR, Enschede, Netherlands
[2] Univ Munster, Safety Crit Syst Grp, Munster, Germany
关键词
SCADA systems; process-aware; intrusion detection; smart grids; power distribution; power flow analysis;
D O I
10.1109/POWERTECH55446.2023.10202762
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As the ongoing energy transition requires more communication infrastructure in the electricity grid, this introduces new possible attack vectors. Current intrusion detection approaches for cyber attacks often neglect the underlying physical environment, which makes it especially hard to detect data injection attacks. We follow a process-aware approach to evaluate the communicated measurement data within the electricity system in a context-sensitive way and to detect manipulations in the communication layer of the SCADA architecture. This paper proposes a sophisticated tool for intrusion detection, which integrates power flow analysis in real-time and can be applied locally at field stations mainly at the intersection between the medium and low voltage grid. Applicability is illustrated using a simulation testbed with a typical three-node architecture and six different (attack) scenarios. Results show that the sensitivity parameter of the proposed tool can be tuned in advance such that attacks can be detected reliably.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Flow-Based Intrusion Detection System for SDN
    Ajaeiya, Georgi A.
    Adalian, Nareg
    Elhajj, Imad H.
    Kayssi, Ayman
    Chehab, Ali
    [J]. 2017 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2017, : 787 - 793
  • [2] SSHCure: A Flow-Based SSH Intrusion Detection System
    Hellemons, Laurens
    Hendriks, Luuk
    Hofstede, Rick
    Sperotto, Anna
    Sadre, Ramin
    Pras, Aiko
    [J]. DEPENDABLE NETWORKS AND SERVICES, 2012, 7279 : 86 - 97
  • [3] Ensemble Learning Approach for Flow-based Intrusion Detection System
    Zwane, Skhumbuzo
    Tarwireyi, Paul
    Adigun, Matthew
    [J]. 2019 IEEE AFRICON, 2019,
  • [4] Intrusion Detection Using Flow-Based Analysis of Network Traffic
    David, Jisa
    Thomas, Ciza
    [J]. ADVANCES IN NETWORKS AND COMMUNICATIONS, PT II, 2011, 132 : 391 - 399
  • [5] Flow-Based Anomaly Intrusion Detection System Using Two Neural Network Stages
    Abuadlla, Yousef
    Kvascev, Goran
    Gajin, Slavko
    Jovanovic, Zoran
    [J]. COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2014, 11 (02) : 601 - 622
  • [6] MULTI AGENT SYSTEM FOR NETWORK ATTACK CLASSIFICATION USING FLOW-BASED INTRUSION DETECTION
    Hancock, David L.
    Lamont, Gary B.
    [J]. 2011 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2011, : 1535 - 1542
  • [7] Flow-Based Intrusion Detection Systems: A Survey
    Al-Bakaa, Aliaa
    Al-Musawi, Bahaa
    [J]. APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY (ATIS 2021), 2022, 1554 : 121 - 137
  • [8] Flow-based intrusion detection: Techniques and challenges
    Umer, Muhammad Fahad
    Sher, Muhammad
    Bi, Yaxin
    [J]. COMPUTERS & SECURITY, 2017, 70 : 238 - 254
  • [9] An Overview of IP Flow-Based Intrusion Detection
    Sperotto, Anna
    Schaffrath, Gregor
    Sadre, Ramin
    Morariu, Cristian
    Pras, Aiko
    Stiller, Burkhard
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2010, 12 (03): : 343 - 356
  • [10] Securing a Smart Home with a Transformer-Based IoT Intrusion Detection System
    Wang, Minxiao
    Yang, Ning
    Weng, Ning
    [J]. ELECTRONICS, 2023, 12 (09)