2020 9th International Conference on Modern Circuits and Systems Technologies (MOCAST) 2020
DOI: 10.1109/mocast49295.2020.9200285
|View full text |Cite
|
Sign up to set email alerts
|

An Anomaly Detection Mechanism for IEC 60870-5-104

Abstract: The transformation of the conventional electricity grid into a new paradigm called smart grid demands the appropriate cybersecurity solutions. In this paper, we focus on the security of the IEC 60870-5-104 (IEC-104) protocol which is commonly used by Supervisory Control and Data Acquisition (SCADA) systems in the energy domain. In particular, after investigating its security issues, we provide a multivariate Intrusion Detection System (IDS) which adopts both access control and outlier detection mechanisms in o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
2
1

Relationship

3
6

Authors

Journals

citations
Cited by 18 publications
(5 citation statements)
references
References 13 publications
(9 reference statements)
0
5
0
Order By: Relevance
“…An IEC 104 intrusion detection approach similar to Udd et al (2016) can be seen in a recent publication (Grammatikis et al 2020). In the latest work, an access control mechanism is enforced initially to filter unknown ports, Internet Protocol, and Media Access Control addresses.…”
Section: Anomaly Detection In Scada Communication Networkmentioning
confidence: 99%
“…An IEC 104 intrusion detection approach similar to Udd et al (2016) can be seen in a recent publication (Grammatikis et al 2020). In the latest work, an access control mechanism is enforced initially to filter unknown ports, Internet Protocol, and Media Access Control addresses.…”
Section: Anomaly Detection In Scada Communication Networkmentioning
confidence: 99%
“…There are no security procedures in IEC104. TCP port 2404 is used by the protocol [24]. The IEC 101/104 interaction between the controlled station and the controlling station [25] can be one the following:…”
Section: Honeypots Overviewmentioning
confidence: 99%
“…Regarding the anomaly detection methods for IEC-104, some multivariate access control and outlier detection approaches have been proposed using extracted packet information and communication statistics through Scapy [35] and CICFlowMeter [36] for anomaly detection [37]. In the area of statistically based anomaly detection on IEC-104, the work in [38] presents a 3-value detection method that independently compares the number of packets transmitted in three consecutive time windows against a statistical profile and reports anomalies when a deviation from the specified range is detected.…”
Section: Related Workmentioning
confidence: 99%