2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks 2014
DOI: 10.1109/dsn.2014.81
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid Control Network Intrusion Detection Systems for Automated Power Distribution Systems

Abstract: Abstract-In this paper, we describe our novel use of network intrusion detection systems (NIDS) for protecting automated distribution systems (ADS) against certain types of cyber attacks in a new way. The novelty consists of using the hybrid control environment rules and model as the baseline for what is normal and what is an anomaly, tailoring the security policies to the physical operation of the system. NIDS sensors in our architecture continuously analyze traffic in the communication medium that comes from… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
7
2

Relationship

3
6

Authors

Journals

citations
Cited by 44 publications
(26 citation statements)
references
References 20 publications
0
26
0
Order By: Relevance
“…In our earlier work [14], we presented a hybrid control NIDS (HC-NIDS) for automated power distribution systems, where we focused on the "fault location, isolation, and service restoration (FLISR)" process. In this paper, our case study is a typical protection mechanism implemented through digital relays used in the power transmission grid.…”
Section: B Related Work and Contributionmentioning
confidence: 99%
“…In our earlier work [14], we presented a hybrid control NIDS (HC-NIDS) for automated power distribution systems, where we focused on the "fault location, isolation, and service restoration (FLISR)" process. In this paper, our case study is a typical protection mechanism implemented through digital relays used in the power transmission grid.…”
Section: B Related Work and Contributionmentioning
confidence: 99%
“…In [13] both AI and Genetic Algorithm (GA) are used in order to have protection from different attacks. Intrusion detection methods in IoT [14], [17] and cyber security mechanisms [15], botnet control traffic detection [16], attack detection in Wireless Sensor Networks (WSNs) [18], Hybrid approach in attack detection in MANET [19] and detection methods for virtual jamming methods [20] are other solutions found in literature. It is understood from the review that there is need for a hybrid approach for detecting different kinds of DDoS attacks in WAN.…”
Section: Figure 1: Ddos Flooding Attack Scenario [21]mentioning
confidence: 99%
“…By monitoring the associated DNP3 traffic, we showed that this model allows useful real-time comparisons between relay state and line fault indicators and a simplified topological model of an actual feeder circuit. 13 By developing Bro scripts that are cognizant of the required operation of the FLISR system, we were able to evaluate a variety of attacks against the FLISR system that would cause it to fail to respond appropriately.…”
Section: Demonstration Scenariosmentioning
confidence: 99%