Securing Smart Grids Locally using a Power Flow-based Intrusion Detection System

被引:0
|
作者
Menzel, Verena [1 ]
Arias, Nataly Banol [1 ]
Hurink, Johann L. [1 ]
Remke, Anne [2 ]
机构
[1] Univ Twente, EEMCS, MOR, Enschede, Netherlands
[2] Univ Munster, Safety Crit Syst Grp, Munster, Germany
关键词
SCADA systems; process-aware; intrusion detection; smart grids; power distribution; power flow analysis;
D O I
10.1109/POWERTECH55446.2023.10202762
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As the ongoing energy transition requires more communication infrastructure in the electricity grid, this introduces new possible attack vectors. Current intrusion detection approaches for cyber attacks often neglect the underlying physical environment, which makes it especially hard to detect data injection attacks. We follow a process-aware approach to evaluate the communicated measurement data within the electricity system in a context-sensitive way and to detect manipulations in the communication layer of the SCADA architecture. This paper proposes a sophisticated tool for intrusion detection, which integrates power flow analysis in real-time and can be applied locally at field stations mainly at the intersection between the medium and low voltage grid. Applicability is illustrated using a simulation testbed with a typical three-node architecture and six different (attack) scenarios. Results show that the sensitivity parameter of the proposed tool can be tuned in advance such that attacks can be detected reliably.
引用
收藏
页数:9
相关论文
共 50 条
  • [31] DLMHS: Flow-based intrusion detection system using deep learning neural network and meta-heuristic scale
    Jyothsna, V
    Prasad, Munivara K.
    GopiChand, G.
    Bhavani, Durga D.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2022, 35 (10)
  • [32] Flow-based Network Intrusion Detection Based on BERT Masked Language Model
    Nguyen, Loc Gia
    Watabe, Kohei
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONEXT STUDENT WORKSHOP 2022, CONEXT-SW 2022, 2022, : 7 - 8
  • [33] Conceptual integration of flow-based and packet-based network intrusion detection
    Schaffrath, Gregor
    Stiller, Burkhard
    [J]. RESILIENT NETWORKS AND SERVICES, 2008, 5127 : 190 - 194
  • [34] Evaluation of Machine Learning Techniques for Traffic Flow-Based Intrusion Detection
    Rodriguez, Maria
    Alesanco, Alvaro
    Mehavilla, Lorena
    Garcia, Jose
    [J]. SENSORS, 2022, 22 (23)
  • [35] FlowGANAnomaly: Flow-Based Anomaly Network Intrusion Detection with Adversarial Learning
    Li, Zeyi
    Wang, Pan
    Wang, Zixuan
    Zhan, De-chuan
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2024, 33 (01) : 58 - 71
  • [36] FlowGANAnomaly: Flow-Based Anomaly Network Intrusion Detection with Adversarial Learning
    Zeyi LI
    Pan WANG
    Zixuan WANG
    [J]. Chinese Journal of Electronics, 2024, 33 (01) : 58 - 71
  • [37] Real-Time and Resilient Intrusion Detection: A Flow-Based Approach
    Hofstede, Rick
    Pras, Aiko
    [J]. DEPENDABLE NETWORKS AND SERVICES, 2012, 7279 : 109 - 112
  • [38] FlowTransformer: A transformer framework for flow-based network intrusion detection systems
    Manocchio, Liam Daly
    Layeghy, Siamak
    Lo, Wai Weng
    Kulatilleke, Gayan K.
    Sarhan, Mohanad
    Portmann, Marius
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2024, 241
  • [39] Automated Flow-based Rule Generation for Network Intrusion Detection Systems
    Fallahi, Naser
    Sami, Ashkan
    Tajbakhsh, Morteza
    [J]. 2016 24TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2016, : 1948 - 1953
  • [40] On High-Speed Flow-Based Intrusion Detection Using Snort-Compatible Signatures
    Erlacher, Felix
    Dressler, Falko
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (01) : 495 - 506