Skip to main content

2017 | OriginalPaper | Buchkapitel

Big Data Processing to Detect Abnormal Behavior in Smart Grids

verfasst von : Béla Genge, Piroska Haller, István Kiss

Erschienen in: Smart Grid Inspired Future Technologies

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper proposes a methodology to effectively detect abnormal behavior in Smart Grids. The approach uses a cyber attack impact assessment technique to rank different assets, a cross-association decomposition technique for grouping assets and ultimately to reduce the number of monitored parameters, and an anomaly detection system based on the Gaussian clustering technique. The developed methodology is evaluated in the context of the IEEE 14-bus electricity grid model and three distinct classes of cyber attacks: bus fault attacks, line breaker attacks, and integrity attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat CrySiS Lab. sKyWIper (a.k.a. Flame a.k.a. Flamer): a complex malware for targeted attacks (2012) CrySiS Lab. sKyWIper (a.k.a. Flame a.k.a. Flamer): a complex malware for targeted attacks (2012)
2.
Zurück zum Zitat Genge, B., Graur, F., Haller, P.: Experimental assessment of network design approaches for protecting industrial control systems. IJCIP 11, 24–38. Elsevier (2015) Genge, B., Graur, F., Haller, P.: Experimental assessment of network design approaches for protecting industrial control systems. IJCIP 11, 24–38. Elsevier (2015)
3.
Zurück zum Zitat Cherepanov, A.: BlackEnergy by the SSHBearDoor: attacks against Ukrainian news media and electric industry (2016) Cherepanov, A.: BlackEnergy by the SSHBearDoor: attacks against Ukrainian news media and electric industry (2016)
4.
Zurück zum Zitat Filippini, R., Silva, A.: A modeling framework for the resilience analysis of networked systems-of-systems based on functional dependencies. Reliab. Eng. Syst. Saf. 125, 82–91 (2014)CrossRef Filippini, R., Silva, A.: A modeling framework for the resilience analysis of networked systems-of-systems based on functional dependencies. Reliab. Eng. Syst. Saf. 125, 82–91 (2014)CrossRef
5.
Zurück zum Zitat Caselli, M., Zambon, E., Kargl, F.: Sequence-aware intrusion detection in industrial control systems. In: Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, pp. 13–24 (2015) Caselli, M., Zambon, E., Kargl, F.: Sequence-aware intrusion detection in industrial control systems. In: Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, pp. 13–24 (2015)
6.
Zurück zum Zitat Goldenberg, N., Wool, A.: Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems. IJCIP 6(2), 63–75 (2013) Goldenberg, N., Wool, A.: Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems. IJCIP 6(2), 63–75 (2013)
7.
Zurück zum Zitat Schuster, F., Paul, A., König, H.: Towards learning normality for anomaly detection in industrial control networks. In: Doyen, G., Waldburger, M., Čeleda, P., Sperotto, A., Stiller, B. (eds.) AIMS 2013. LNCS, vol. 7943, pp. 61–72. Springer, Heidelberg (2013). doi:10.1007/978-3-642-38998-6_8 CrossRef Schuster, F., Paul, A., König, H.: Towards learning normality for anomaly detection in industrial control networks. In: Doyen, G., Waldburger, M., Čeleda, P., Sperotto, A., Stiller, B. (eds.) AIMS 2013. LNCS, vol. 7943, pp. 61–72. Springer, Heidelberg (2013). doi:10.​1007/​978-3-642-38998-6_​8 CrossRef
8.
Zurück zum Zitat Zhao, J., Liu, K., Wang, W., Liu, Y.: Adaptive fuzzy clustering based anomaly data detection in energy system of steel industry. Inf. Sci. 259, 335–345 (2014)CrossRef Zhao, J., Liu, K., Wang, W., Liu, Y.: Adaptive fuzzy clustering based anomaly data detection in energy system of steel industry. Inf. Sci. 259, 335–345 (2014)CrossRef
9.
Zurück zum Zitat Berthier, R., Sanders, W.H., Khurana, H.: Intrusion detection for advanced metering infrastructures: requirements and architectural directions. In: First IEEE International Conference on Smart Grid Communications, pp. 350–355 (2010) Berthier, R., Sanders, W.H., Khurana, H.: Intrusion detection for advanced metering infrastructures: requirements and architectural directions. In: First IEEE International Conference on Smart Grid Communications, pp. 350–355 (2010)
10.
Zurück zum Zitat Scarfone, K.A., Mell, P.M.: Guide to intrusion detection and prevention systems (IDPS). (NIST SP) - 800–94. National Institute of Standards and Technology (2007) Scarfone, K.A., Mell, P.M.: Guide to intrusion detection and prevention systems (IDPS). (NIST SP) - 800–94. National Institute of Standards and Technology (2007)
11.
Zurück zum Zitat Chakrabarti, D., Papadimitriou, S., Modha, S.D., Faloutsos, C.: Fully automatic cross-associations. In: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 79–88 (2004) Chakrabarti, D., Papadimitriou, S., Modha, S.D., Faloutsos, C.: Fully automatic cross-associations. In: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 79–88 (2004)
12.
Zurück zum Zitat Genge, B., Kiss, I., Haller, P.: A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures. Int. J. Crit. Infrastruct. Prot. 10, 3–17 (2015)CrossRef Genge, B., Kiss, I., Haller, P.: A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures. Int. J. Crit. Infrastruct. Prot. 10, 3–17 (2015)CrossRef
13.
Zurück zum Zitat Kiss, I., Genge, B., Haller, P., Sebestyen, G.: A framework for testing stealthy attacks in energy grids. In: IEEE International Conference on Intelligent Computer Communication and Processing (ICCP), Cluj-Napoca, pp. 553–560 (2015) Kiss, I., Genge, B., Haller, P., Sebestyen, G.: A framework for testing stealthy attacks in energy grids. In: IEEE International Conference on Intelligent Computer Communication and Processing (ICCP), Cluj-Napoca, pp. 553–560 (2015)
14.
Zurück zum Zitat Kaufman, L., Rousseeuw, P.J.: Finding Groups in Data: An Introduction to Cluster Analysis, vol. 344. Wiley, Hoboken (2009)MATH Kaufman, L., Rousseeuw, P.J.: Finding Groups in Data: An Introduction to Cluster Analysis, vol. 344. Wiley, Hoboken (2009)MATH
15.
Zurück zum Zitat Kiss, I., Genge, B., Haller, P.: A clustering-based approach to detect cyber attacks in process control systems. In: 2015 IEEE International Conference on Industrial Informatics, Cambridge, UK, pp. 142–148 (2015) Kiss, I., Genge, B., Haller, P.: A clustering-based approach to detect cyber attacks in process control systems. In: 2015 IEEE International Conference on Industrial Informatics, Cambridge, UK, pp. 142–148 (2015)
16.
Zurück zum Zitat Horkan, M.: Challenges for IDS/IPS Deployment in Industrial Control Systems. SANS Institute Reading Room (2015) Horkan, M.: Challenges for IDS/IPS Deployment in Industrial Control Systems. SANS Institute Reading Room (2015)
17.
Zurück zum Zitat Zhang, Y., Wang, L., Sun, W., Green, R.C., Alam, M.: Distributed intrusion detection system in a multi-layer network architecture of smart grids. IEEE Trans. Smart Grid 2(4), 796–808 (2011)CrossRef Zhang, Y., Wang, L., Sun, W., Green, R.C., Alam, M.: Distributed intrusion detection system in a multi-layer network architecture of smart grids. IEEE Trans. Smart Grid 2(4), 796–808 (2011)CrossRef
18.
Zurück zum Zitat Levorato, M., Mitra, U.: Fast anomaly detection in smart grids via sparse approximation theory. In: 2012 IEEE 7th Sensor Array and Multichannel Signal Processing Workshop (SAM), pp. 5–8 (2012) Levorato, M., Mitra, U.: Fast anomaly detection in smart grids via sparse approximation theory. In: 2012 IEEE 7th Sensor Array and Multichannel Signal Processing Workshop (SAM), pp. 5–8 (2012)
19.
Zurück zum Zitat Cardenas, A.A., Berthier, R., Bobba, R.B., Huh, J.H., Jetcheva, J.G., Grochocki, D., Sanders, W.H.: A framework for evaluating intrusion detection architectures in advanced metering infrastructures. IEEE Trans. Smart Grid 5(2), 906–915 (2014)CrossRef Cardenas, A.A., Berthier, R., Bobba, R.B., Huh, J.H., Jetcheva, J.G., Grochocki, D., Sanders, W.H.: A framework for evaluating intrusion detection architectures in advanced metering infrastructures. IEEE Trans. Smart Grid 5(2), 906–915 (2014)CrossRef
20.
Zurück zum Zitat Milano, F.: An open source power system analysis toolbox. IEEE Trans. Power Syst. 20(3), 1199–1206 (2005)CrossRef Milano, F.: An open source power system analysis toolbox. IEEE Trans. Power Syst. 20(3), 1199–1206 (2005)CrossRef
21.
Zurück zum Zitat Grunwald, P.: A Tutorial Introduction to the Minimum Description Length Principle. Advances in Minimum Description Length: Theory and Applications, pp. 23–81. MIT Press, Cambridge (2005) Grunwald, P.: A Tutorial Introduction to the Minimum Description Length Principle. Advances in Minimum Description Length: Theory and Applications, pp. 23–81. MIT Press, Cambridge (2005)
Metadaten
Titel
Big Data Processing to Detect Abnormal Behavior in Smart Grids
verfasst von
Béla Genge
Piroska Haller
István Kiss
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-47729-9_22