Intrusion Detection of NSM Based DoS Attacks Using Data Mining in Smart Grid

نویسندگان

  • Kyung Choi
  • Xinyi Chen
  • Mihui Kim
  • Kijoon Chae
چکیده

In this paper, we analyze the Network and System Management (NSM) requirements and NSM data objects for the intrusion detection of power systems; NSM is an IEC 62351-7 standard. We analyze a SYN flood attack and a buffer overflow attack to cause the Denial of Service (DoS) attack described in NSM. After mounting the attack in our attack testbed, we collect a data set, which is based on attributes for the attack. We then run several data mining methods with the data set using the Waikato Environment for Knowledge Analysis (WEKA). In the results, we select the decision tree algorithms with high detection rates, and choose key attributes in high level components of the trees. When we run several data mining methods again with the data set of chosen key attributes, the detection rates of most data mining methods are higher than before. We prove that our selected attack attributes, and the proposed detection process, are efficient and suitable for intrusion detection in the smart grid environment.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Intrusion Detection in Wireless Sensor Networks using Genetic Algorithm

Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...

متن کامل

A Data Mining Approach for the Detection of Denial of Service Attack

Received Dec 08,2012 Revised Jan 05, 2013 Accepted March 02,2013 Denial of Service (DoS) attacks constitutes one of the major threats and among the hardest security problems currently facing computer networks and particularly the Internet. A DoS attack can easily exhausts the computing and communication resources of its victim within a short period of time. Because of the seriousness of the pro...

متن کامل

Application of an AODE Based Classifier to Detect DOS Attacks

Digital forensics often utilize network intrusion detection systems based on various data mining methods to detect and collect evidence on intrusion events such as Denial of Service (DOS) attacks. Findings of our experiments reveal that a classification model based on averaged one-dependence estimators (AODE) can be used for this purpose. AODE is an extension of Naïve Bayes method which relies ...

متن کامل

Intrusion Detection Using Random Naives Bayes Classifier In Smart Grids

Smart grids (SG) represent succeeding step in modernizing this electrical grid. The communications network is combined with the Smart grid so as to collect data that may be used to increase the potency of the grid, reduce power consumption, and improve the reliability of services, among different varied benefits. Smart Grid communication networks are distinctive in their giant scale. . The Wire...

متن کامل

Securing Cluster-heads in Wireless Sensor Networks by a Hybrid Intrusion Detection System Based on Data Mining

Cluster-based Wireless Sensor Network (CWSN) is a kind of WSNs that because of avoiding long distance communications, preserve the energy of nodes and so is attractive for related applications. The criticality of most applications of WSNs and also their unattended nature, makes sensor nodes often susceptible to many types of attacks. Based on this fact, it is clear that cluster heads (CHs) are ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012