2021
DOI: 10.3390/sym13050826
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning-Based Intrusion Detection for Achieving Cybersecurity in Smart Grids Using IEC 61850 GOOSE Messages

Abstract: Increased connectivity is required to implement novel coordination and control schemes. IEC 61850-based communication solutions have become popular due to many reasons—object-oriented modeling capability, interoperable connectivity and strong communication protocols, to name a few. However, communication infrastructure is not well-equipped with cybersecurity mechanisms for secure operation. Unlike online banking systems that have been running such security systems for decades, smart grid cybersecurity is an em… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 48 publications
(16 citation statements)
references
References 30 publications
0
16
0
Order By: Relevance
“…It has been seen that transfer of distribution of energy powered by Information and Communication Technologies (ICT) is known as Smart Grid. Reference [14] developed an IDS Intrusion detection System for Smart Grids using IEC 61850's GOOSE messages Generic Object-Oriented Substation Event. Reference [15] framed the planned communication among hypervisor observing its vSDN and the origin of new flow possibly starting a Distributed Denial of Service (DDoS) attack through switches, as an active Bayesian game of intrusion detection.…”
Section: Related Workmentioning
confidence: 99%
“…It has been seen that transfer of distribution of energy powered by Information and Communication Technologies (ICT) is known as Smart Grid. Reference [14] developed an IDS Intrusion detection System for Smart Grids using IEC 61850's GOOSE messages Generic Object-Oriented Substation Event. Reference [15] framed the planned communication among hypervisor observing its vSDN and the origin of new flow possibly starting a Distributed Denial of Service (DDoS) attack through switches, as an active Bayesian game of intrusion detection.…”
Section: Related Workmentioning
confidence: 99%
“…Many researchers have applied both dynamic features and static features to monitor and identify abnormal GOOSE messages in SASs [1,3,4,28,29,31,32]. However, some of them failed to provide detailed statistical results, such as a false-positive rate (FPR) and false-negative rate (FNR) [28,29] while the others did not consider or failed to detect stealthy attacks [1,3,4,32]. Therefore, more features are required to improve the accuracy of detecting stealthy attacks.…”
Section: A Network Features Of Goosementioning
confidence: 99%
“…Advanced monitoring system based on SCADA is a critical infrastructure for renewable integrated power system operations [45] - [46]. SCADA is a well-established computer-based automate system used to gather realtime data from remote or local equipment such as programmable logic controller, remote terminal unit (RTU), intelligent electronic devices (IED) and human machine interface (HMI), etc.…”
Section: Artificial Intelligence In Scada Intrusion Detectionmentioning
confidence: 99%
“…SCADA is a well-established computer-based automate system used to gather realtime data from remote or local equipment such as programmable logic controller, remote terminal unit (RTU), intelligent electronic devices (IED) and human machine interface (HMI), etc. [45]- [48]. Figure 4 explains the block diagram of SCADA architecture connected from operation center, energy management and distribution systems (EMS and DMS) through control room to the substation.…”
Section: Artificial Intelligence In Scada Intrusion Detectionmentioning
confidence: 99%