2017
DOI: 10.1109/tpwrd.2016.2603339
|View full text |Cite
|
Sign up to set email alerts
|

Multidimensional Intrusion Detection System for IEC 61850-Based SCADA Networks

Abstract: Abstract--Emerging cybersecurity vulnerabilities in supervisory control and data acquisition (SCADA) systems are becoming urgent engineering issues for modern substations. This paper proposes a novel intrusion detection system (IDS) tailored for cybersecurity of IEC 61850 based substations. The proposed IDS integrates physical knowledge, protocol specifications and logical behaviors to provide a comprehensive and effective solution that is able to mitigate various cyberattacks. The proposed approach comprises … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
64
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
3
1

Relationship

1
9

Authors

Journals

citations
Cited by 127 publications
(68 citation statements)
references
References 22 publications
0
64
0
Order By: Relevance
“…To ensure the security of a SCADA system, several techniques can be used. Some of these techniques include a security technique focused on the communication channel or network as discussed in [27][28][29], a technique focused on protecting the hardware components as in [30], and a data-driven technique focused on protecting the cloud server as discussed in [6,25,31,32], or a combination of two or more of these techniques [27,33]. The SCADA system proposed in this work considers a combination of some of these security techniques, including the private network management and the data-driven private cloud server management techniques.…”
Section: Literature Reviewmentioning
confidence: 99%
“…To ensure the security of a SCADA system, several techniques can be used. Some of these techniques include a security technique focused on the communication channel or network as discussed in [27][28][29], a technique focused on protecting the hardware components as in [30], and a data-driven technique focused on protecting the cloud server as discussed in [6,25,31,32], or a combination of two or more of these techniques [27,33]. The SCADA system proposed in this work considers a combination of some of these security techniques, including the private network management and the data-driven private cloud server management techniques.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The systems are based on bidirectional communications, technologies are associated with RF (radio frequency) wireless communications or power line carrier communications or broadband options ( Figure 6) [37].…”
Section: Digital Substations Controlmentioning
confidence: 99%
“…They also came up with a metric, the component interdependency graph (CIG) and proposed CIG based attack strategy, which is proven to have stronger attack performance. The multidimensional Intrusion detection system (IDS) for IEC 61850 based smart substations has come up as an effective tool in detection of any attack on the substation [7]. It has been designed to detect any activity or complexity of communications by intruders.…”
Section: Literature Surveymentioning
confidence: 99%