Research of a real-time database intrusion detection method for smart grid

被引:0
|
作者
Zhang Shaomin [1 ]
Li Zhixiong [1 ]
Wang Baoyi [1 ]
机构
[1] North China Elect Power Univ, Sch Control & Comp Engn, Baoding 071003, Hebei, Peoples R China
关键词
Smart Grid; Real-time database; DMAR algorithm;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Real-time database management system (DBMS) is the one of core of the dispatching automation system; it plays an important role for the safe operation of the smart grid. With the increase of smart grid open, the data security in the real-time database, especially the integrity of the security issues has recently received considerable attention. When the database is attacked, it has to roll back the malicious transactions and the transactions that be infected to recovery. During recovery, database either stops (or greatly restricts) the database service, which causes unacceptable availability loss or denial-of-service for mission critical applications, or continues database service, which may cause serious damage spreading during recovery where many clean data items are accidentally corrupted by legitimate new transactions. To solve this problem, the improved data mining algorithm DMAR is put forward in real- time database for smart grid. The propagation path of the malicious transactions can be found from these attack leave a unique fingerprint after them, namely attack sequence. So the potentially affected transaction in the propagation path can be enforced to filter out during recovery. The recovery process of database can avoid the spread of malicious transaction. It could improve the survivability of the real-time database systems.
引用
收藏
页码:159 / 162
页数:4
相关论文
共 50 条
  • [41] Towards Real-Time Intrusion Detection for NetFlow and IPFIX
    Hofstede, Rick
    Bartos, Vaclav
    Sperotto, Anna
    Pras, Aiko
    2013 9TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM), 2013, : 227 - 234
  • [42] A Real-Time Intrusion Detection Algorithm for Network Security
    El-Bakry, Hazem M.
    Mastorakis, Nikos
    PROCEEDINGS OF THE 8TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED INFORMATICS AND COMMUNICATIONS, PTS I AND II: NEW ASPECTS OF APPLIED INFORMATICS AND COMMUNICATIONS, 2008, : 533 - +
  • [43] A Bayesian classification model for real-time intrusion detection
    Puttini, RS
    Marrakchi, Z
    Mé, L
    BAYESIAN INFERENCE AND MAXIMUM ENTROPY METHODS IN SCIENCE AND ENGINEERING, 2003, 659 : 150 - 162
  • [44] Network intrusion intelligent real-time detection system
    Zhao, Haibo
    Li, Jianhua
    Yang, Yuhang
    Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 1999, 33 (01): : 76 - 79
  • [45] Performance adaptation in real-time intrusion detection systems
    Lee, W
    Cabrera, JBD
    Thomas, A
    Balwalli, N
    Saluja, S
    Zhang, Y
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2002, 2516 : 252 - 273
  • [46] Research on Real-time Database of Configuration Software
    Jing, Shaohong
    Song, Chao
    MATERIALS SCIENCE AND INFORMATION TECHNOLOGY, PTS 1-8, 2012, 433-440 : 4003 - 4008
  • [47] Real-time intrusion detection and suppression in ATM networks
    Bettati, R
    Zhao, W
    Teodor, D
    PROCEEDINGS OF THE WORKSHOP ON INTRUSION DETECTION AND NETWORK MONITORING (ID '99), 1999, : 111 - 118
  • [48] Real-Time Intrusion Detection in Power System Operations
    Valenzuela, Jorge
    Wang, Jianhui
    Bissinger, Nancy
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2013, 28 (02) : 1052 - 1062
  • [49] A real-time intrusion detection algorithm for network security
    El-Bakry, Hazem M.
    Mastorakis, Nikos
    2008, WSEAS (07):
  • [50] Fuzzy frequent episodes for real-time intrusion detection
    Luo, JX
    Bridges, SM
    Vaughn, RB
    10TH IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, VOLS 1-3: MEETING THE GRAND CHALLENGE: MACHINES THAT SERVE PEOPLE, 2001, : 368 - 371