2015
DOI: 10.1007/978-3-319-23802-9_7
|View full text |Cite
|
Sign up to set email alerts
|

METIS: A Two-Tier Intrusion Detection System for Advanced Metering Infrastructures

Abstract: Abstract. In the shift from traditional to cyber-physical electric grids, motivated by the needs for improved energy efficiency, Advanced Metering Infrastructures have a key role. However, together with the enabled possibilities, they imply an increased threat surface on the systems. Challenging aspects such as scalable traffic analysis, timely detection of malicious activity and intuitive ways of specifying detection mechanisms for possible adversary goals are among the core problems in this domain. Aiming at… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
3
1

Relationship

4
4

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 21 publications
0
7
0
Order By: Relevance
“…It should be noted that these options are not mutually exclusive. That is, a security application could run both at the meters as well as at the concentrators, as also discussed in [22]. Table 3 is inspired from [19] and provides a good comparison of all entities in the smart grid systems, especially from the data streaming point of view.…”
Section: What Deployment Options Exist For the Data Analysis?mentioning
confidence: 99%
“…It should be noted that these options are not mutually exclusive. That is, a security application could run both at the meters as well as at the concentrators, as also discussed in [22]. Table 3 is inspired from [19] and provides a good comparison of all entities in the smart grid systems, especially from the data streaming point of view.…”
Section: What Deployment Options Exist For the Data Analysis?mentioning
confidence: 99%
“…Stream processing in the context of AMIs has been explored since 2010. Several different applications have been found for SPEs in this area, including Intrusion Detection Systems (IDSs) [9], real-time pricing [10] and adaptive measurement rates [11]. Data validation with a simplified system model was investigated in [12].…”
Section: B Related Workmentioning
confidence: 99%
“…use in planning operations. In [6,10] the authors study the problem of detecting potential intrusions in AMI, since these are highly motivated.…”
Section: Related Workmentioning
confidence: 99%