Skip to main content

2016 | OriginalPaper | Buchkapitel

5. Intrusion Detection Systems for AMI

verfasst von : Ehab Al-Shaer, Mohammad Ashiqur Rahman

Erschienen in: Security and Resiliency Analytics for Smart Grids

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recent studies have shown that AMI is potential to immense number of threats [7, 14, 19, 24, 25], which can affect the deployment and growth of smart grids. These studies outline that although there are some secure communication protocols used in smart grids, many vulnerabilities and exploitations have been observed. Despite these facts, limited progress has been made so far in order to detect malicious behaviors in smart grids [3, 4, 10]. In Chap. 1, Fig. 1.3 presents a typical AMI network. Smart meters communicate with intelligent data collectors using various mediums. These collectors communicate with the headend system (and vice versa) using WAN. Unlike traditional networks, AMI has its own requirements which pose significant challenges for monitoring and intrusion detection.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat C. Baier, J.P. Katoen, Principles of Model Checking (The MIT Press, Cambridge, 2008) C. Baier, J.P. Katoen, Principles of Model Checking (The MIT Press, Cambridge, 2008)
3.
Zurück zum Zitat R. Berthier, W. Sanders, Specification-based intrusion detection for advanced metering infrastructures, in IEEE 17th Pacific Rim International Symposium on Dependable Computing (PRDC) (2011) R. Berthier, W. Sanders, Specification-based intrusion detection for advanced metering infrastructures, in IEEE 17th Pacific Rim International Symposium on Dependable Computing (PRDC) (2011)
4.
Zurück zum Zitat R. Berthier, W. Sanders, H. Khurana, Intrusion detection for advanced metering infrastructures: requirements and architectural directions, in First IEEE International Conference on Smart Grid Communications (Smart-GridComm) (2010) R. Berthier, W. Sanders, H. Khurana, Intrusion detection for advanced metering infrastructures: requirements and architectural directions, in First IEEE International Conference on Smart Grid Communications (Smart-GridComm) (2010)
5.
Zurück zum Zitat D.C. Challener et al., Storing keys in a cryptology device, US Patent Application 10/051,495, 2002 D.C. Challener et al., Storing keys in a cryptology device, US Patent Application 10/051,495, 2002
6.
Zurück zum Zitat Y. Chen et al., Learning Markov models for stationary system behaviors, in NASA Formal Methods. Lecture Notes in Computer Science (Springer, New York, 2012) Y. Chen et al., Learning Markov models for stationary system behaviors, in NASA Formal Methods. Lecture Notes in Computer Science (Springer, New York, 2012)
7.
Zurück zum Zitat F.M. Cleveland, Cyber security issues for Advanced Metering Infrastructure (AMI), in IEEE Power and Energy Society General Meeting-Conversion and Delivery of Electrical Energy in the 21st Century (2008) F.M. Cleveland, Cyber security issues for Advanced Metering Infrastructure (AMI), in IEEE Power and Energy Society General Meeting-Conversion and Delivery of Electrical Energy in the 21st Century (2008)
10.
Zurück zum Zitat M.A. Faisal et al., Securing advanced metering infrastructure using intrusion detection system with data stream mining, in Proceedings of Pacific Asia Workshop on Intelligence and Security Informatics (PAISI) (2012) M.A. Faisal et al., Securing advanced metering infrastructure using intrusion detection system with data stream mining, in Proceedings of Pacific Asia Workshop on Intelligence and Security Informatics (PAISI) (2012)
11.
Zurück zum Zitat P. Garcia-Teodoro et al., Anomaly-based network intrusion detection: techniques, systems and challenges, in Comput. Secur. 28(1–2), 18–28 (2009) P. Garcia-Teodoro et al., Anomaly-based network intrusion detection: techniques, systems and challenges, in Comput. Secur. 28(1–2), 18–28 (2009)
12.
Zurück zum Zitat Y. Gu, A. McCullum, D. Towsley, Detecting anomalies in network traffic using maximum entropy estimation, in Proceedings of the ACM SIGCOMM Conference on Internet Measurement (IMC) (2005) Y. Gu, A. McCullum, D. Towsley, Detecting anomalies in network traffic using maximum entropy estimation, in Proceedings of the ACM SIGCOMM Conference on Internet Measurement (IMC) (2005)
14.
Zurück zum Zitat Idaho National Laboratory (INL), NSTB Assessments summary report: common industrial control system cyber security weaknesses, May 2010 Idaho National Laboratory (INL), NSTB Assessments summary report: common industrial control system cyber security weaknesses, May 2010
15.
Zurück zum Zitat J. Jung et al., Fast portscan detection using sequential hypothesis testing, in Proceedings of the IEEE Symposium on Security and Privacy (2004) J. Jung et al., Fast portscan detection using sequential hypothesis testing, in Proceedings of the IEEE Symposium on Security and Privacy (2004)
16.
Zurück zum Zitat M. Kwiatkowska, D. Parker, Advances in probabilistic model checking, in Proceedings 2011 Marktoberdorf Summer School: Tools for Analysis and Verification of Software Safety and Security (2012) M. Kwiatkowska, D. Parker, Advances in probabilistic model checking, in Proceedings 2011 Marktoberdorf Summer School: Tools for Analysis and Verification of Software Safety and Security (2012)
17.
Zurück zum Zitat D. Mashima, A.A. Cárdenas, Evaluating electricity theft detectors in smart grid networks, in Research in Attacks, Intrusions, and Defenses (2012) D. Mashima, A.A. Cárdenas, Evaluating electricity theft detectors in smart grid networks, in Research in Attacks, Intrusions, and Defenses (2012)
18.
Zurück zum Zitat S. McLaughlin, D. Podkuiko, P. McDaniel, Energy theft in the advanced metering infrastructure, in Critical Information Infrastructures Security (2010) S. McLaughlin, D. Podkuiko, P. McDaniel, Energy theft in the advanced metering infrastructure, in Critical Information Infrastructures Security (2010)
19.
Zurück zum Zitat S. McLaughlin et al., Multi-vendor penetration testing in the advanced metering infrastructure, in Proceedings of the 26th Annual Computer Security Applications Conference, (ACSAC) (2010) S. McLaughlin et al., Multi-vendor penetration testing in the advanced metering infrastructure, in Proceedings of the 26th Annual Computer Security Applications Conference, (ACSAC) (2010)
20.
Zurück zum Zitat M. Merhav, M. Gutman, J. Ziv, On the estimation of the order of a Markov chain and universal data compression, in IEEE Transactions on Information Theory (1989) M. Merhav, M. Gutman, J. Ziv, On the estimation of the order of a Markov chain and universal data compression, in IEEE Transactions on Information Theory (1989)
25.
Zurück zum Zitat U.S. Government Accountability Office (GAO), Information security: TVA needs to address weaknesses in control systems and networks (2008) U.S. Government Accountability Office (GAO), Information security: TVA needs to address weaknesses in control systems and networks (2008)
27.
Zurück zum Zitat Y. Zhang et al., Distributed intrusion detection system in a multi-layer network architecture of smart grids. IEEE Trans. Smart Grid 2 (4), 796–808 (2011) Y. Zhang et al., Distributed intrusion detection system in a multi-layer network architecture of smart grids. IEEE Trans. Smart Grid 2 (4), 796–808 (2011)
Metadaten
Titel
Intrusion Detection Systems for AMI
verfasst von
Ehab Al-Shaer
Mohammad Ashiqur Rahman
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-32871-3_5