2014 IEEE International Conference on Smart Grid Communications (SmartGridComm) 2014
DOI: 10.1109/smartgridcomm.2014.7007764
|View full text |Cite
|
Sign up to set email alerts
|

A hybrid network IDS for protective digital relays in the power transmission grid

Abstract: In this paper, we propose a novel use of network intrusion detection systems (NIDSs) tailored to detect attacks against networks that support hybrid controllers that implement power grid protection schemes. In our approach, we implement specification-based intrusion detection signatures based on the execution of the hybrid automata that specify the communication rules and physical limits that the system should obey. To validate our idea, we developed an experimental framework consisting of a simulation of the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 27 publications
(25 citation statements)
references
References 12 publications
0
22
0
Order By: Relevance
“…Specifically, our testbed enables the "re-creation" of common architectures of CPSs in order to conduct a series of experiments and test the efficiency of NIDS against cyber-physical attacks or anomalies. We note that details about the implementation and conceptual ideas of the NIDS used in this work, called "HC-NIDS," are presented elsewhere [11,22,18], and are beyond the scope of the work presented in this paper. We occasionally refer to this specific NIDS, because, based on the fact that disruptive cyber-physical attack-based experiments on simulation/emulation testbeds can lead to non-realistic results, it is the component responsible for detecting such types of attacks.…”
Section: Contributionsmentioning
confidence: 99%
See 3 more Smart Citations
“…Specifically, our testbed enables the "re-creation" of common architectures of CPSs in order to conduct a series of experiments and test the efficiency of NIDS against cyber-physical attacks or anomalies. We note that details about the implementation and conceptual ideas of the NIDS used in this work, called "HC-NIDS," are presented elsewhere [11,22,18], and are beyond the scope of the work presented in this paper. We occasionally refer to this specific NIDS, because, based on the fact that disruptive cyber-physical attack-based experiments on simulation/emulation testbeds can lead to non-realistic results, it is the component responsible for detecting such types of attacks.…”
Section: Contributionsmentioning
confidence: 99%
“…In real-time, we apply an intrusion detection system to the network traffic, and, in cases where it is required by the NIDS, we cross-check the observable traffic with the physical data reported to the data historian by the controllers. In this paper, we focus on the validation framework and extension of the emulation environment to include network taps, data management capabilities, and visualization, whereas the previously published work [11,22,18] discusses the derivation of effective NIDS rules. Finally, we show how our system could provide cyber-physical analytics to the operators that merge the view of the physical and cyberdomains and indicate anomalies of the CPS state.…”
Section: Contributionsmentioning
confidence: 99%
See 2 more Smart Citations
“…12 A differential protection scheme compares the phase values at two points in the line, and a difference in the phase values implies a fault in the line. We used two relays connected to circuit breakers to measure the phase difference, which signifies an internal fault where the circuit breakers isolate the transmission line from the transmission system.…”
Section: Demonstration Scenariosmentioning
confidence: 99%