메뉴 건너뛰기




Volumn , Issue , 2007, Pages

A methodology to extract rules to identify attacks in power system critical infrastructure

Author keywords

Data mining; Detecting attacks; Electric power system; Rough set theory

Indexed keywords

ALGORITHMS; DATA MINING; ELECTRIC FAULT CURRENTS; ERROR DETECTION; ROUGH SET THEORY;

EID: 42549083708     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PES.2007.386075     Document Type: Conference Paper
Times cited : (5)

References (39)
  • 1
    • 42549111888 scopus 로고    scopus 로고
    • National Strategy for the Physical Protection of Critical Infrastructures and Key Assets.Washington D.C.,Feb 2003
    • "National Strategy for the Physical Protection of Critical Infrastructures and Key Assets".Washington D.C.,Feb 2003, http://www.dhs.gov/interweb/assetlibrary/Physical_S trategy.pdf
  • 2
    • 42549164843 scopus 로고    scopus 로고
    • Gamez, D., Nadjm-Tehrani. S., Bigham, J., Balducelli, C., Burbeck. K., and Chyssler, T., Chapter 19 Safeguarding Critical Infrastructures. Edited by Professor Hassan B. Diab & Professor Albert Y. Zomaya. Dependable Computing Systems: Paradigms, Performance Issues, and Applications, Wiley STM. 2000.
    • Gamez, D., Nadjm-Tehrani. S., Bigham, J., Balducelli, C., Burbeck. K., and Chyssler, T., "Chapter 19 Safeguarding Critical Infrastructures". Edited by Professor Hassan B. Diab & Professor Albert Y. Zomaya. "Dependable Computing Systems: Paradigms, Performance Issues, and Applications", Wiley STM. 2000.
  • 4
    • 42549120911 scopus 로고    scopus 로고
    • The National Strategy to Secure Cyberspace, Washington D.C.,February,2003
    • "The National Strategy to Secure Cyberspace", Washington D.C.,February,2003,http://www.dhs.gov/interweb/assetlibrary/ National_Cyberspace_Strategy.pdf.
  • 5
    • 12344300052 scopus 로고    scopus 로고
    • Washington D.C, January. 2002
    • "Homeland Security Act of 2002". Washington D.C., January. 2002, http://www.dhs.gov/interweb/assetlibrary/hr_5005_enr.pdf.
    • Homeland Security Act of 2002
  • 6
    • 42549090817 scopus 로고    scopus 로고
    • IT-Grundschutz Manual 2004, http://www.bsi.bund.de/english/gshb/index. htm.
    • (2004) Manual
    • IT-Grundschutz1
  • 7
    • 1542697911 scopus 로고    scopus 로고
    • IT Security for Industrial Control Systems
    • February
    • Falco, J., Stouffer, K., Wavering, A., and Proctor, F., "IT Security for Industrial Control Systems", NISTIR 6859, February 2002.
    • (2002) NISTIR , vol.6859
    • Falco, J.1    Stouffer, K.2    Wavering, A.3    Proctor, F.4
  • 10
    • 33847264121 scopus 로고    scopus 로고
    • The Myths and Facts behind Cyber Security Risks for Industrial Control Systems
    • VDE, Berlin, October
    • Byres, E. and Lowe. J., "The Myths and Facts behind Cyber Security Risks for Industrial Control Systems", VDE 2004 Congress. VDE, Berlin, October, 2004.
    • (2004) VDE 2004 Congress
    • Byres, E.1    Lowe, J.2
  • 12
    • 42549090335 scopus 로고    scopus 로고
    • Industrial Information System Security - Part I, Part2, and Part 3
    • ABB Review
    • Naedele, M., and Dzung, D., "Industrial Information System Security - Part I, Part2, and Part 3", ABB Review 2005.
    • (2005)
    • Naedele, M.1    Dzung, D.2
  • 13
    • 42549166280 scopus 로고    scopus 로고
    • The role of Intrusion Detection Systems
    • September/October
    • McHugh, J., Christie, A., and Allen, J., "The role of Intrusion Detection Systems", IEEE Software, September/October/2000.
    • (2000) IEEE Software
    • McHugh, J.1    Christie, A.2    Allen, J.3
  • 14
    • 42549093334 scopus 로고    scopus 로고
    • Hale. J., and Bose, A.,Information Survivability in the Electric Utility Industry, ISW'98, http://www.cert.org/research/isw/isw98/ all_the_papers/no19.html.
    • Hale. J., and Bose, A.,"Information Survivability in the Electric Utility Industry", ISW'98, http://www.cert.org/research/isw/isw98/ all_the_papers/no19.html.
  • 15
    • 42549094738 scopus 로고    scopus 로고
    • Goetz, E., Cyber Security of the Electric Power Industry, Institute for Security Technology Studies at Dartmouth College, December, 2002 [NERC-CIP,2005] http:/Avww.nerc.com/~filez/standards/Reliability_Standards. html#Critical_Infrastructure_Protection.
    • Goetz, E., "Cyber Security of the Electric Power Industry", Institute for Security Technology Studies at Dartmouth College", December, 2002 [NERC-CIP,2005] http:/Avww.nerc.com/~filez/standards/Reliability_Standards. html#Critical_Infrastructure_Protection.
  • 16
    • 1642265495 scopus 로고    scopus 로고
    • Protecting the Grid From Cyber Attack, Part 11: Safeguarding IEDS, Substations and SCADA Systems, Utility
    • Oman. P., Schweitzer, E., and Roberts, J., "Protecting the Grid From Cyber Attack, Part 11: Safeguarding IEDS, Substations and SCADA Systems", Utility Automation, 7(1), 2002, pp. 25-32.
    • (2002) Automation , vol.7 , Issue.1 , pp. 25-32
    • Oman, P.1    Schweitzer, E.2    Roberts, J.3
  • 18
    • 0012127229 scopus 로고    scopus 로고
    • Intrusion and Intrusion Detection
    • Aug, DOI 10.1007/s 102070100001, URL
    • McHugh, J., "Intrusion and Intrusion Detection", International Journal of Information Security, Volume 1, Issue 1, Aug 2001, Pages 14-35, DOI 10.1007/s 102070100001, URL http://dx.doi.org/10.1007/s102070100001.
    • (2001) International Journal of Information Security , vol.1 , Issue.1 , pp. 14-35
    • McHugh, J.1
  • 19
    • 0038223829 scopus 로고    scopus 로고
    • NIST Special Publication on Intrusion Detection System
    • Bace, R., and Mell, P. "Intrusion Detection Systems", NIST Special Publication on Intrusion Detection System,http://csrc.nist.gov/ publication/nistpubs/800-31/sp800-31.pdf.
    • Intrusion Detection Systems
    • Bace, R.1    Mell, P.2
  • 20
    • 1642408137 scopus 로고    scopus 로고
    • Survey of Intrusion Detection Research
    • Technical Report 02-04, Chalmers University of Technology, Göteborg, Sweeden
    • Lundin, E., and Jonson, E., "Survey of Intrusion Detection Research", Technical Report 02-04, Chalmers University of Technology, Göteborg, Sweeden, 2001.
    • (2001)
    • Lundin, E.1    Jonson, E.2
  • 21
    • 10444240629 scopus 로고    scopus 로고
    • Intrusion Detection: A Bibliograpy
    • Technical Report SSIR-2001-01. September, SUPELEC, France
    • Mé, L., and Michel, C., "Intrusion Detection: a Bibliograpy", Technical Report SSIR-2001-01. September,2001. SUPELEC, France.
    • (2001)
    • Mé, L.1    Michel, C.2
  • 23
    • 42549112797 scopus 로고    scopus 로고
    • Porras, P.A., and Neumann, P.G., EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances, Proc. National Information Systems Security Confrenece, Baltimore. MD, Oct. 1997.
    • Porras, P.A., and Neumann, P.G., "EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances", Proc. National Information Systems Security Confrenece, Baltimore. MD, Oct. 1997.
  • 24
    • 0029716418 scopus 로고    scopus 로고
    • Forrest. S., Hofmeyer, S.A., Somayaji, A., and Longstaff, T.A., A Sense of Self for Unix Process, Proc. 1996 IEEE Symp. on Security and Privacy, pp. 120-128, 06-08 May 1996. Oakland,CA.IEEE Computer Security Press. Los Alamitos, CA.
    • Forrest. S., Hofmeyer, S.A., Somayaji, A., and Longstaff, T.A., "A Sense of Self for Unix Process", Proc. 1996 IEEE Symp. on Security and Privacy, pp. 120-128, 06-08 May 1996. Oakland,CA.IEEE Computer Security Press. Los Alamitos, CA.
  • 25
    • 42549119227 scopus 로고    scopus 로고
    • Desenvolvimento de um Sistema Adaptativo de Detecção de Intrusos em Redes de Computadores
    • PhD Thesis, Instituto de Física de São Carlos. USP, Sâo Carlos, SP
    • Cansian. A.M., "Desenvolvimento de um Sistema Adaptativo de Detecção de Intrusos em Redes de Computadores", PhD Thesis, Instituto de Física de São Carlos. USP, Sâo Carlos, SP, 1997.
    • (1997)
    • Cansian, A.M.1
  • 26
    • 0036804085 scopus 로고    scopus 로고
    • Network Intrusion and Fault Detection: A Statistical Anomaly Approach
    • Oct
    • Manikopoulos, C., and Papavassiliou,S., "Network Intrusion and Fault Detection: A Statistical Anomaly Approach", IEEE Communication Magazine, Vol. 40, No. 10, pp. 76-82, Oct 2002.
    • (2002) IEEE Communication Magazine , vol.40 , Issue.10 , pp. 76-82
    • Manikopoulos, C.1    Papavassiliou, S.2
  • 27
    • 0028714365 scopus 로고
    • Automated Detection of Vulnerabilities in privileged Programs by Execution Monitoring
    • December 5-9
    • Fink, G., Ko, C., and Levitt, K., "Automated Detection of Vulnerabilities in privileged Programs by Execution Monitoring", Proc. Of the 10th Annual Computer Security Apps. Conf., pp. 134-144, December 5-9, 1994.
    • (1994) Proc. Of the 10th Annual Computer Security Apps. Conf , pp. 134-144
    • Fink, G.1    Ko, C.2    Levitt, K.3
  • 28
    • 0141757198 scopus 로고    scopus 로고
    • Intrusion Detection Using Neural Networks and Support Vector Machines
    • Mukkamala, S., Janoski, G., and Sung, A., "Intrusion Detection Using Neural Networks and Support Vector Machines". IEEE Proceedings, 2002.
    • (2002) IEEE Proceedings
    • Mukkamala, S.1    Janoski, G.2    Sung, A.3
  • 29
    • 0038011179 scopus 로고    scopus 로고
    • Sekar, R., Gupta, A., Frullo, J., Shanbhag, T., Tiwari. A., Yang, H., and Zhou, S., Specification-based anomaly detection: a new approach for detecting network intrusions, In Proceedings of the 9th ACM Conference on Computer and Communications Security (Washington, DC, USA, November 18-22, 2002). V. Atluri, Ed. CCS '02. ACM Press, New York, NY.
    • Sekar, R., Gupta, A., Frullo, J., Shanbhag, T., Tiwari. A., Yang, H., and Zhou, S., "Specification-based anomaly detection: a new approach for detecting network intrusions", In Proceedings of the 9th ACM Conference on Computer and Communications Security (Washington, DC, USA, November 18-22, 2002). V. Atluri, Ed. CCS '02. ACM Press, New York, NY.
  • 31
    • 33244468138 scopus 로고    scopus 로고
    • A Supervised Clustering and Classification Algorithm for Mining Data with Mixed Variables
    • March
    • Xiangyang Li, and Nong Ye, "A Supervised Clustering and Classification Algorithm for Mining Data with Mixed Variables", IEEE Trans. On Systems. Man, and Cybernetics, Part a: Systems and Humans, Vol. 36, No. 2, March 2006.
    • (2006) IEEE Trans. On Systems. Man, and Cybernetics, Part a: Systems and Humans , vol.36 , Issue.2
    • Li, X.1    Ye, N.2
  • 32
    • 0035193911 scopus 로고    scopus 로고
    • Monitoring Controller's DNA Sequence for System Security
    • Instrumentation Systems and Automation Society, Houston, September
    • Yu, B., Byres, E., and Howey, C., "Monitoring Controller's "DNA Sequence for System Security", ISA Emerging Technologies Conference, Instrumentation Systems and Automation Society, Houston, September 2001.
    • (2001) ISA Emerging Technologies Conference
    • Yu, B.1    Byres, E.2    Howey, C.3
  • 33
    • 35048861836 scopus 로고    scopus 로고
    • Electric Power System Anomaly Detection Using Neural Networks
    • Springer-Verlag, Heidelberg, Oct
    • Martinelli, M., Tronci, E., Dipoppa, E., and Balducelli, C., "Electric Power System Anomaly Detection Using Neural Networks", Lecture Notes in Computer Science, Vol.3213/2004, pp 1242-1248, Springer-Verlag, Heidelberg, Oct. 2004.
    • (2004) Lecture Notes in Computer Science , vol.3213 , pp. 1242-1248
    • Martinelli, M.1    Tronci, E.2    Dipoppa, E.3    Balducelli, C.4
  • 35
    • 21044433766 scopus 로고    scopus 로고
    • Training Genetic Programming on Half a Million Patterns: An Example from Anomaly Detection
    • June
    • Song, D., Heywood, M.I., and Zincir-Heywood, A., "Training Genetic Programming on Half a Million Patterns: An Example from Anomaly Detection", IEEE Trans. On Evolutionary Computation, Vol. 9, No. 3, June 2005.
    • (2005) IEEE Trans. On Evolutionary Computation , vol.9 , Issue.3
    • Song, D.1    Heywood, M.I.2    Zincir-Heywood, A.3
  • 36
    • 33847767196 scopus 로고    scopus 로고
    • Safeguarding SCADA Systems with Anomaly Detection
    • V.Gorodetsky et al.Eds, MMM-ACNS 2003, Springer-Verlag Berlin Heidelberg
    • Bigham, J., Gamez, D., and Ning Lu, "Safeguarding SCADA Systems with Anomaly Detection", V.Gorodetsky et al.(Eds.):MMM-ACNS 2003, LNCS 2776, pp. 171-182, Springer-Verlag Berlin Heidelberg, 2003.
    • (2003) LNCS , vol.2776 , pp. 171-182
    • Bigham, J.1    Gamez, D.2    Lu, N.3
  • 38
    • 0036082436 scopus 로고    scopus 로고
    • Applications of Rough Sets in Power System Control Center Data Mining
    • Lambert-Torres. G., "Applications of Rough Sets in Power System Control Center Data Mining", IEEE Power Engineering Society Winter Meeting 2002, Vol. 1, pp. 627-631.
    • (2002) IEEE Power Engineering Society Winter Meeting , vol.1 , pp. 627-631
    • Lambert-Torres, G.1
  • 39
    • 42549116401 scopus 로고    scopus 로고
    • Lambert-Torres. G. et al, Power System Security Analysis Based on Rough Classification, Rough-Fuzzy Hybridization: New Trend in Decision Making, S.K. Pal & A. Skowron, Springer-Verlag Co., pp. 263-274, 1999.
    • Lambert-Torres. G. et al, "Power System Security Analysis Based on Rough Classification", Rough-Fuzzy Hybridization: New Trend in Decision Making, S.K. Pal & A. Skowron, Springer-Verlag Co., pp. 263-274, 1999.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.