Intrusion Detection of NSM Based DoS Attacks Using Data Mining in Smart Grid
In this paper, we analyze the Network and System Management (NSM) requirements and NSM data objects for the intrusion detection of power systems; NSM is an IEC 62351-7 standard. We analyze a SYN flood attack and a buffer overflow attack to cause the Denial of Service (DoS) attack described in NSM. A...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2012-10-01
|
Series: | Energies |
Subjects: | |
Online Access: | http://www.mdpi.com/1996-1073/5/10/4091 |
id |
doaj-bae8012365364023b94fb478098f7bf7 |
---|---|
record_format |
Article |
spelling |
doaj-bae8012365364023b94fb478098f7bf72020-11-24T21:03:14ZengMDPI AGEnergies1996-10732012-10-015104091410910.3390/en5104091Intrusion Detection of NSM Based DoS Attacks Using Data Mining in Smart GridJungChan NaKijoon ChaeMihui KimShi LiXinyi ChenKyung ChoiIn this paper, we analyze the Network and System Management (NSM) requirements and NSM data objects for the intrusion detection of power systems; NSM is an IEC 62351-7 standard. We analyze a SYN flood attack and a buffer overflow attack to cause the Denial of Service (DoS) attack described in NSM. After mounting the attack in our attack testbed, we collect a data set, which is based on attributes for the attack. We then run several data mining methods with the data set using the Waikato Environment for Knowledge Analysis (WEKA). In the results, we select the decision tree algorithms with high detection rates, and choose key attributes in high level components of the trees. When we run several data mining methods again with the data set of chosen key attributes, the detection rates of most data mining methods are higher than before. We prove that our selected attack attributes, and the proposed detection process, are efficient and suitable for intrusion detection in the smart grid environment.http://www.mdpi.com/1996-1073/5/10/4091Denial of Service (DoS) attackintrusion detectionNetwork and System Management (NSM)smart griddata mining |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
JungChan Na Kijoon Chae Mihui Kim Shi Li Xinyi Chen Kyung Choi |
spellingShingle |
JungChan Na Kijoon Chae Mihui Kim Shi Li Xinyi Chen Kyung Choi Intrusion Detection of NSM Based DoS Attacks Using Data Mining in Smart Grid Energies Denial of Service (DoS) attack intrusion detection Network and System Management (NSM) smart grid data mining |
author_facet |
JungChan Na Kijoon Chae Mihui Kim Shi Li Xinyi Chen Kyung Choi |
author_sort |
JungChan Na |
title |
Intrusion Detection of NSM Based DoS Attacks Using Data Mining in Smart Grid |
title_short |
Intrusion Detection of NSM Based DoS Attacks Using Data Mining in Smart Grid |
title_full |
Intrusion Detection of NSM Based DoS Attacks Using Data Mining in Smart Grid |
title_fullStr |
Intrusion Detection of NSM Based DoS Attacks Using Data Mining in Smart Grid |
title_full_unstemmed |
Intrusion Detection of NSM Based DoS Attacks Using Data Mining in Smart Grid |
title_sort |
intrusion detection of nsm based dos attacks using data mining in smart grid |
publisher |
MDPI AG |
series |
Energies |
issn |
1996-1073 |
publishDate |
2012-10-01 |
description |
In this paper, we analyze the Network and System Management (NSM) requirements and NSM data objects for the intrusion detection of power systems; NSM is an IEC 62351-7 standard. We analyze a SYN flood attack and a buffer overflow attack to cause the Denial of Service (DoS) attack described in NSM. After mounting the attack in our attack testbed, we collect a data set, which is based on attributes for the attack. We then run several data mining methods with the data set using the Waikato Environment for Knowledge Analysis (WEKA). In the results, we select the decision tree algorithms with high detection rates, and choose key attributes in high level components of the trees. When we run several data mining methods again with the data set of chosen key attributes, the detection rates of most data mining methods are higher than before. We prove that our selected attack attributes, and the proposed detection process, are efficient and suitable for intrusion detection in the smart grid environment. |
topic |
Denial of Service (DoS) attack intrusion detection Network and System Management (NSM) smart grid data mining |
url |
http://www.mdpi.com/1996-1073/5/10/4091 |
work_keys_str_mv |
AT jungchanna intrusiondetectionofnsmbaseddosattacksusingdatamininginsmartgrid AT kijoonchae intrusiondetectionofnsmbaseddosattacksusingdatamininginsmartgrid AT mihuikim intrusiondetectionofnsmbaseddosattacksusingdatamininginsmartgrid AT shili intrusiondetectionofnsmbaseddosattacksusingdatamininginsmartgrid AT xinyichen intrusiondetectionofnsmbaseddosattacksusingdatamininginsmartgrid AT kyungchoi intrusiondetectionofnsmbaseddosattacksusingdatamininginsmartgrid |
_version_ |
1716773728389431296 |