메뉴 건너뛰기




Volumn 5, Issue 10, 2012, Pages 4091-4109

Intrusion detection of NSM based DoS attacks using data mining in smart grid

Author keywords

Data mining; Denial of service (DoS) attack; Intrusion detection; Network and system management (NSM); Smart grid

Indexed keywords

DECISION TREES; DENIAL-OF-SERVICE ATTACK; DIGITAL STORAGE; ELECTRIC POWER TRANSMISSION NETWORKS; INFORMATION MANAGEMENT; INTRUSION DETECTION; MERCURY (METAL); OBJECT DETECTION; SMART POWER GRIDS; TELECOMMUNICATION TRAFFIC;

EID: 84870360312     PISSN: None     EISSN: 19961073     Source Type: Journal    
DOI: 10.3390/en5104091     Document Type: Article
Times cited : (35)

References (28)
  • 1
    • 84870310556 scopus 로고    scopus 로고
    • IEC 62351-7 TS Ed.1: Power Systems Management and Associated Information Exchange-Data and Communications Security-Part 7: Network and System Management (NSM) Data Object Models
    • Geneva; Switzerland
    • IEC 62351-7 TS Ed.1: Power Systems Management and Associated Information Exchange-Data and Communications Security-Part 7: Network and System Management (NSM) Data Object Models; International Electrotechnical Commission (IEC): Geneva; Switzerland, 2009.
    • (2009) International Electrotechnical Commission IEC
  • 2
    • 84870307086 scopus 로고    scopus 로고
    • IEC 62351: Power Systems Management and Associated Information Exchange-Data and Communications Security
    • Geneva; Switzerland
    • IEC 62351: Power Systems Management and Associated Information Exchange-Data and Communications Security; International Electrotechnical Commission (IEC): Geneva; Switzerland, 2007.
    • (2007) International Electrotechnical Commission IEC
  • 3
    • 85029865295 scopus 로고    scopus 로고
    • Wikipedia, Available online, accessed on 12 October 2012
    • Wikipedia. SYN Flood. Available online: http://en.wikipedia.org/wiki/Syn_flood (accessed on 12 October 2012).
    • SYN Flood
  • 4
    • 84871169934 scopus 로고    scopus 로고
    • Wikipedia, Available online, accessed on 12 October 2012
    • Wikipedia. Buffer Overflow. Available online: http://en.wikipedia.org/wiki/Buffer_Overflow (accessed on 12 October 2012).
    • Buffer Overflow
  • 5
    • 1542280256 scopus 로고    scopus 로고
    • IEC 61850: Communication Networks and Systems in Substations
    • Geneva; Switzerland
    • IEC 61850: Communication Networks and Systems in Substations; International Electrotechnical Commission (IEC): Geneva; Switzerland, 2003.
    • (2003) International Electrotechnical Commission IEC
  • 6
    • 84870380308 scopus 로고    scopus 로고
    • IEC 60870-6-503 Ed2.0 Telecontrol Equipment and Systems-Part 6-503 Telecontrol Protocols Compatible with ISO Standards and ITU-T Recommendations-TASE.2 Service and Protocol
    • Geneva; Switzerland
    • IEC 60870-6-503 Ed2.0 Telecontrol Equipment and Systems-Part 6-503 Telecontrol Protocols Compatible with ISO Standards and ITU-T Recommendations-TASE.2 Service and Protocol. International Electrotechnical Commission (IEC): Geneva; Switzerland, 2009.
    • (2009) International Electrotechnical Commission IEC
  • 7
    • 79959856672 scopus 로고    scopus 로고
    • False data injection attacks against state estimation in electric power grids
    • Liu, Y.; Ning, P.; Reiter, M.K. False data injection attacks against state estimation in electric power grids. ACM Trans. Info. Syst. Sec. 2011, 14, 13:1-13:33.
    • (2011) ACM Trans. Info. Syst. Sec. , vol.14
    • Liu, Y.1    Ning, P.2    Reiter, M.K.3
  • 10
    • 82855168142 scopus 로고    scopus 로고
    • Artificial immune system based intrusion detection in a distributed hierarchical network architecture of smart grid
    • Detroit, MI, USA, 24-29 July
    • Zhang, Y.; Wang, L.; Sun, W.; Green, R.C.; Alam, M. Artificial immune system based intrusion detection in a distributed hierarchical network architecture of smart grid. In Proceedings of IEEE Power and Energy Society General Meeting, Detroit, MI, USA, 24-29 July 2011; pp. 1-8.
    • (2011) Proceedings of IEEE Power and Energy Society General Meeting , pp. 1-8
    • Zhang, Y.1    Wang, L.2    Sun, W.3    Green, R.C.4    Alam, M.5
  • 12
    • 79957758241 scopus 로고    scopus 로고
    • Modeling load redistribution attacks in power systems
    • Yuan, Y.; Li, Z.; Ren, K. Modeling load redistribution attacks in power systems. IEEE Trans. Smart Grid 2011, 2, 382-390.
    • (2011) IEEE Trans. Smart Grid , vol.2 , pp. 382-390
    • Yuan, Y.1    Li, Z.2    Ren, K.3
  • 13
    • 82155175605 scopus 로고    scopus 로고
    • Integrity data attacks in power market operations
    • Xie, L.; Mo, Y.; Sinopoli, B. Integrity data attacks in power market operations. IEEE Trans. Smart Grid 2011, 2, 659-666.
    • (2011) IEEE Trans. Smart Grid , vol.2 , pp. 659-666
    • Xie, L.1    Mo, Y.2    Sinopoli, B.3
  • 14
    • 82155185205 scopus 로고    scopus 로고
    • Distributed internet-based load altering attacks against smart power grids
    • Mohsenian-Rad, A.H.; Leon-Garcia, A. Distributed internet-based load altering attacks against smart power grids. IEEE Trans. Smart Grid 2011, 2, 667-674.
    • (2011) IEEE Trans. Smart Grid , vol.2 , pp. 667-674
    • Mohsenian-rad, A.H.1    Leon-garcia, A.2
  • 15
    • 79951648231 scopus 로고    scopus 로고
    • Review and evaluation of security threats on the communication networks in the smart grid
    • San Jose, CA, USA, 31 October-3 November
    • Lu, Z.; Lu, X.; Wang, W.; Wang, C. Review and evaluation of security threats on the communication networks in the smart grid. In Proceedings of IEEE Military Communications Conference (Milcom 2010), San Jose, CA, USA, 31 October-3 November 2010; pp. 1830-1835.
    • (2010) Proceedings of IEEE Military Communications Conference Milcom 2010 , pp. 1830-1835
    • Lu, Z.1    Lu, X.2    Wang, W.3    Wang, C.4
  • 18
    • 84870327017 scopus 로고    scopus 로고
    • A fuzzy cognitive map for data integrity assessment in a IEC 61850 based substation
    • Minneapolis, MN, USA, 25-29 July
    • Mohaghi, S. A fuzzy cognitive map for data integrity assessment in a IEC 61850 based substation. In Proceedings of IEEE Power and Energy Society General Meeting, Minneapolis, MN, USA, 25-29 July 2010; pp. 1-7.
    • (2010) Proceedings of IEEE Power and Energy Society General Meeting , pp. 1-7
    • Mohaghi, S.1
  • 19
    • 84870380305 scopus 로고    scopus 로고
    • IEC 61850-7-2: Communication Networks and Systems in Substations-Part 7-2: Basic Communication Structure for Substation and Feeder Equipment-Abstract Communication Service Interface ACSI
    • Geneva; Switzerland
    • IEC 61850-7-2: Communication Networks and Systems in Substations-Part 7-2: Basic Communication Structure for Substation and Feeder Equipment-Abstract Communication Service Interface (ACSI). International Electrotechnical Commission (IEC): Geneva; Switzerland, 2010.
    • (2010) International Electrotechnical Commission IEC
  • 22
    • 11244260106 scopus 로고    scopus 로고
    • University of Waikato: Hamilton, New Zealand, Availble online, accessed on 12 October 2012
    • Weka 3: Data Mining Software in Java; University of Waikato: Hamilton, New Zealand, 2005. Availble online: http://www.cs.waikato.ac.nz/ml/weka/ (accessed on 12 October 2012).
    • (2005) Weka 3: Data Mining Software in Java
  • 25
    • 0001492549 scopus 로고    scopus 로고
    • Shape quantization and recognition with randomized trees
    • Amit, Y.; Geman, D. Shape quantization and recognition with randomized trees. Neural Comput. 1997, 9, 1545-1588.
    • (1997) Neural Comput. , vol.9 , pp. 1545-1588
    • Amit, Y.1    Geman, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.