2020 3rd World Symposium on Communication Engineering (WSCE) 2020
DOI: 10.1109/wsce51339.2020.9275580
|View full text |Cite
|
Sign up to set email alerts
|

Big Data against Security Threats: The SPEAR Intrusion Detection System

Abstract: The environmental concerns, the limited availability of conventional energy sources, the integration of alternative energy sources and the increasing number of powerdemanding appliances change the way electricity is generated and distributed. Smart Grid (SG) is an appealing concept, which was developed in response to the emerging issues of electricity generation and distribution. By leveraging the latest advancements of Information and Communication Technologies (ICT), it offers significant benefits to energy … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…One such example is the fact that EKs have evolved beyond file-based methods, with malicious files now existing as memory processes in the operating system in order to evade detection (file-less payloads). This makes even more challenging the detection of EKs at the host level as the delivery payload does not touch the disk and leaves no room for antivirus technology to detect EKs [8]. Thus, we conclude that despite their longevity, EKs are still relevant in the underground malware market as they evolve by adapting to new malware trends.…”
Section: Problem Statement and Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…One such example is the fact that EKs have evolved beyond file-based methods, with malicious files now existing as memory processes in the operating system in order to evade detection (file-less payloads). This makes even more challenging the detection of EKs at the host level as the delivery payload does not touch the disk and leaves no room for antivirus technology to detect EKs [8]. Thus, we conclude that despite their longevity, EKs are still relevant in the underground malware market as they evolve by adapting to new malware trends.…”
Section: Problem Statement and Motivationmentioning
confidence: 99%
“…writing it was the snapshot 2983 8 ). Regarding Suricata, we deployed the Proofpoint Emerging Threat (ET) open ruleset 9 .…”
mentioning
confidence: 99%
“…To this end, several security countermeasures have been employed [5] to enhance smart grid security, such as intrusion detection systems (IDSs) [6], [7]. However, IDSs rely heavily on previous knowledge of cyberattack patterns or network behavior.…”
Section: Introductionmentioning
confidence: 99%