Intrusion Detection of NSM Based DoS Attacks Using Data Mining in Smart Grid

In this paper, we analyze the Network and System Management (NSM) requirements and NSM data objects for the intrusion detection of power systems; NSM is an IEC 62351-7 standard. We analyze a SYN flood attack and a buffer overflow attack to cause the Denial of Service (DoS) attack described in NSM. A...

Full description

Bibliographic Details
Main Authors: JungChan Na, Kijoon Chae, Mihui Kim, Shi Li, Xinyi Chen, Kyung Choi
Format: Article
Language:English
Published: MDPI AG 2012-10-01
Series:Energies
Subjects:
Online Access:http://www.mdpi.com/1996-1073/5/10/4091
id doaj-bae8012365364023b94fb478098f7bf7
record_format Article
spelling doaj-bae8012365364023b94fb478098f7bf72020-11-24T21:03:14ZengMDPI AGEnergies1996-10732012-10-015104091410910.3390/en5104091Intrusion Detection of NSM Based DoS Attacks Using Data Mining in Smart GridJungChan NaKijoon ChaeMihui KimShi LiXinyi ChenKyung ChoiIn this paper, we analyze the Network and System Management (NSM) requirements and NSM data objects for the intrusion detection of power systems; NSM is an IEC 62351-7 standard. We analyze a SYN flood attack and a buffer overflow attack to cause the Denial of Service (DoS) attack described in NSM. After mounting the attack in our attack testbed, we collect a data set, which is based on attributes for the attack. We then run several data mining methods with the data set using the Waikato Environment for Knowledge Analysis (WEKA). In the results, we select the decision tree algorithms with high detection rates, and choose key attributes in high level components of the trees. When we run several data mining methods again with the data set of chosen key attributes, the detection rates of most data mining methods are higher than before. We prove that our selected attack attributes, and the proposed detection process, are efficient and suitable for intrusion detection in the smart grid environment.http://www.mdpi.com/1996-1073/5/10/4091Denial of Service (DoS) attackintrusion detectionNetwork and System Management (NSM)smart griddata mining
collection DOAJ
language English
format Article
sources DOAJ
author JungChan Na
Kijoon Chae
Mihui Kim
Shi Li
Xinyi Chen
Kyung Choi
spellingShingle JungChan Na
Kijoon Chae
Mihui Kim
Shi Li
Xinyi Chen
Kyung Choi
Intrusion Detection of NSM Based DoS Attacks Using Data Mining in Smart Grid
Energies
Denial of Service (DoS) attack
intrusion detection
Network and System Management (NSM)
smart grid
data mining
author_facet JungChan Na
Kijoon Chae
Mihui Kim
Shi Li
Xinyi Chen
Kyung Choi
author_sort JungChan Na
title Intrusion Detection of NSM Based DoS Attacks Using Data Mining in Smart Grid
title_short Intrusion Detection of NSM Based DoS Attacks Using Data Mining in Smart Grid
title_full Intrusion Detection of NSM Based DoS Attacks Using Data Mining in Smart Grid
title_fullStr Intrusion Detection of NSM Based DoS Attacks Using Data Mining in Smart Grid
title_full_unstemmed Intrusion Detection of NSM Based DoS Attacks Using Data Mining in Smart Grid
title_sort intrusion detection of nsm based dos attacks using data mining in smart grid
publisher MDPI AG
series Energies
issn 1996-1073
publishDate 2012-10-01
description In this paper, we analyze the Network and System Management (NSM) requirements and NSM data objects for the intrusion detection of power systems; NSM is an IEC 62351-7 standard. We analyze a SYN flood attack and a buffer overflow attack to cause the Denial of Service (DoS) attack described in NSM. After mounting the attack in our attack testbed, we collect a data set, which is based on attributes for the attack. We then run several data mining methods with the data set using the Waikato Environment for Knowledge Analysis (WEKA). In the results, we select the decision tree algorithms with high detection rates, and choose key attributes in high level components of the trees. When we run several data mining methods again with the data set of chosen key attributes, the detection rates of most data mining methods are higher than before. We prove that our selected attack attributes, and the proposed detection process, are efficient and suitable for intrusion detection in the smart grid environment.
topic Denial of Service (DoS) attack
intrusion detection
Network and System Management (NSM)
smart grid
data mining
url http://www.mdpi.com/1996-1073/5/10/4091
work_keys_str_mv AT jungchanna intrusiondetectionofnsmbaseddosattacksusingdatamininginsmartgrid
AT kijoonchae intrusiondetectionofnsmbaseddosattacksusingdatamininginsmartgrid
AT mihuikim intrusiondetectionofnsmbaseddosattacksusingdatamininginsmartgrid
AT shili intrusiondetectionofnsmbaseddosattacksusingdatamininginsmartgrid
AT xinyichen intrusiondetectionofnsmbaseddosattacksusingdatamininginsmartgrid
AT kyungchoi intrusiondetectionofnsmbaseddosattacksusingdatamininginsmartgrid
_version_ 1716773728389431296