The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2012
DOI: 10.3390/en5104091
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection of NSM Based DoS Attacks Using Data Mining in Smart Grid

Abstract: Abstract:In this paper, we analyze the Network and System Management (NSM) requirements and NSM data objects for the intrusion detection of power systems; NSM is an IEC 62351-7 standard. We analyze a SYN flood attack and a buffer overflow attack to cause the Denial of Service (DoS) attack described in NSM. After mounting the attack in our attack testbed, we collect a data set, which is based on attributes for the attack. We then run several data mining methods with the data set using the Waikato Environment fo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0
1

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 42 publications
(23 citation statements)
references
References 14 publications
0
22
0
1
Order By: Relevance
“…Kim et al [18] proposed a method where many different DDoS attacks [51,52] are described in terms of traffic patterns in a flow characteristics. In particular, the authors focused on counters like: number of flows, packets, bytes, the flow and packet sizes, average flow size and number of packets per flow.…”
Section: Detection Via Countersmentioning
confidence: 99%
“…Kim et al [18] proposed a method where many different DDoS attacks [51,52] are described in terms of traffic patterns in a flow characteristics. In particular, the authors focused on counters like: number of flows, packets, bytes, the flow and packet sizes, average flow size and number of packets per flow.…”
Section: Detection Via Countersmentioning
confidence: 99%
“…Kyung Choi et al [16] proposed the data attributes for the SYN flood attack and the buffer overflow attack, and the recognition procedure to find proficient data mining methods for those attacks. According to result obtained, in case of SYN flood attack, a total of 64 mining algorithms are executed with the selected key attributes.…”
Section: Related Workmentioning
confidence: 99%
“…Sixty four algorithms are achieved with selected key attributes using result of decision tree. Three algorithms show a 100% detection rate, 29 algorithms show 99.833% [16], [17], [18], [19]. Π -is the initial state distribution.…”
Section: Related Workmentioning
confidence: 99%
“…Most communication networks leave open a connection awaiting response to a SYN/ACK signal, sometimes as long as 75 s. An attacker can flood buffer with spoofed SYN requests creating congestion on the network. Bayesian statistical analysis can be used on the packet information to detect attack [24]. A fusion centre that uses transmitted data and library of previous data can also be used to determine whether malicious data are passed [25].…”
Section: Sensors and Devicesmentioning
confidence: 99%