메뉴 건너뛰기




Volumn , Issue , 2014, Pages 17-24

A model-based intrusion detection system for smart meters

Author keywords

IDS; Security model; Selective monitoring

Indexed keywords

COMPUTER CRIME; INTRUSION DETECTION; SMART METERS; SYSTEMS ENGINEERING;

EID: 84898638471     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HASE.2014.12     Document Type: Conference Paper
Times cited : (22)

References (29)
  • 2
    • 84898626339 scopus 로고    scopus 로고
    • Uk department of energy, smart meter design document
    • Uk department of energy, smart meter design document. http://www. decc. gov. uk/assets/decc/Consultations/ smart-meter-imp-prospectus/1478-design- requirements. pdf.
  • 3
    • 84898661565 scopus 로고    scopus 로고
    • Arduino home page
    • Arduino home page. http://www. arduino. cc.
  • 4
    • 84857771025 scopus 로고    scopus 로고
    • Sanders Specification-based intrusion detection for advanced metering infrastructures
    • Robin Berthier and William H. Sanders. Specification-based intrusion detection for advanced metering infrastructures. PRDC, IEEE, 0, 2011.
    • (2011) PRDC, IEEE , vol.0
    • Berthier, R.1    William, H.2
  • 5
    • 84898626340 scopus 로고    scopus 로고
    • Department of energy and climate change and the office of gas and electricity markets
    • March
    • Department of Energy and Climate Change and the Office of Gas and Electricity Markets. Smart metering response to prospectus consultation, March 2011. http://www. ofgem. gov. uk/Pages/ MoreInformation. aspx?docid= 56&refer=e-serve/sm/Documentation.
    • (2011) Smart Metering Response to Prospectus Consultation
  • 9
    • 84898626341 scopus 로고    scopus 로고
    • Electricity grid in u. s. penetrated by spies
    • Electricity grid in u. s. penetrated by spies, 2009. http://online. wsj. com/article/SB123914805204099085. html.
    • (2009)
  • 10
    • 15744370034 scopus 로고    scopus 로고
    • A taxonomy of network and computer attacks
    • Simon Hansman and Ray Hunt. A taxonomy of network and computer attacks. Computers & Security, 24(1):31-43, 2005.
    • (2005) Computers & Security , vol.24 , Issue.1 , pp. 31-43
    • Hansman, S.1    Hunt, R.2
  • 11
    • 84890861404 scopus 로고    scopus 로고
    • A multi-layer model for anomaly intrusion detection using program sequences of system calls
    • Xuan Dau Hoang, Jiankun Hu, and Peter Bertok. A multi-layer model for anomaly intrusion detection using program sequences of system calls. In Proc. 11th IEEE Intl. Conference on Networks, pages 531-536, 2003.
    • (2003) Proc. 11th IEEE Intl. Conference on Networks
    • Dau Hoang, X.1    Hu, J.2    Bertok, P.3
  • 12
    • 65249107163 scopus 로고    scopus 로고
    • A simple and efficient hidden markov model scheme for host-based anomaly intrusion detection
    • January
    • Jiankun Hu, Xinghuo Yu, D. Qiu, and Hsiao-Hwa Chen. A simple and efficient hidden markov model scheme for host-based anomaly intrusion detection. Netwrk. Mag. of Global Internetwkg., 23(1):42-47, January 2009.
    • (2009) Netwrk. Mag. of Global Internetwkg , vol.23 , Issue.1 , pp. 42-47
    • Hu, J.1    Yu, X.2    Qiu, D.3    Chen, H.4
  • 13
    • 24944563451 scopus 로고    scopus 로고
    • Robust support vector machines for anomaly detection
    • Wenjie Hu. Robust support vector machines for anomaly detection. In In Proc. ICMLA03, 2003.
    • (2003) Proc. ICMLA03
    • Hu, W.1
  • 14
    • 84898661567 scopus 로고    scopus 로고
    • In-stat and ndp group company
    • In-stat and ndp group company. http://www. instat. com/press. asp?ID=3352&sku=IN1104731WH.
  • 16
    • 39749178297 scopus 로고    scopus 로고
    • Unified architecture for large-scale attested metering
    • Washington, DC, USA. IEEE Computer Society
    • Michael LeMay, George Gross, Carl A. Gunter, and Sanjam Garg. Unified architecture for large-scale attested metering. In Proceedings of HICCS'07, Washington, DC, USA, 2007. IEEE Computer Society.
    • (2007) Proceedings of HICCS'07
    • Lemay, M.1    Gross, G.2    Gunter, C.A.3    Garg, S.4
  • 18
    • 74049113264 scopus 로고    scopus 로고
    • False data injection attacks against state estimation in electric power grids
    • New York, NY, USA ACM.
    • Yao Liu, Peng Ning, and Michael K. Reiter. False data injection attacks against state estimation in electric power grids. In Proceedings of CCS'09, pages 21-32, New York, NY, USA, 2009. ACM.
    • (2009) Proceedings of CCS'09 , pp. 21-32
    • Liu, Y.1    Ning, P.2    Reiter, M.K.3
  • 19
    • 76249114557 scopus 로고    scopus 로고
    • Performance analysis of artificial neural network intrusion detection systems
    • Abdel-Azim M, Abdel-Fatah A. I, and Awad M. Performance analysis of artificial neural network intrusion detection systems. In In Proc. ICEE., 2009.
    • (2009) Proc ICEE.
    • Abdel-Azim, M.1    Abdel-Fatah, A.I.2    Awad, M.3
  • 20
    • 67650822699 scopus 로고    scopus 로고
    • Security and privacy challenges in the smart grid
    • P. McDaniel and S. McLaughlin. Security and privacy challenges in the smart grid. IEEE S&P, 2009.
    • (2009) IEEE S&P
    • McDaniel, P.1    McLaughlin, S.2
  • 21
    • 78751557822 scopus 로고    scopus 로고
    • Multi-vendor penetration testing in the advanced metering infrastructure
    • New York, NY, USA, 2010. ACM
    • Stephen McLaughlin, Dmitry Podkuiko, Sergei Miadzvezhanka, Adam Delozier, and Patrick McDaniel. Multi-vendor penetration testing in the advanced metering infrastructure. In Proceedings of ACSAC'10, pages 107-116, New York, NY, USA, 2010. ACM.
    • Proceedings of ACSAC , vol.10 , pp. 107-116
    • McLaughlin, S.1    Podkuiko, D.2    Miadzvezhanka, S.3    Delozier, A.4    McDaniel, P.5
  • 23
    • 84898626336 scopus 로고    scopus 로고
    • Crutial: The blueprint of a reference critical information infrastructure architecture
    • August
    • Miguel Correia Paulo Veŕssimo, Nuno Ferreira Neves. Crutial: The blueprint of a reference critical information infrastructure architecture. In Proceedings of ISC06, August 2006.
    • (2006) Proceedings of ISC06
    • Correia Paulo Veŕssimo, M.1    Ferreira Neves, N.2
  • 24
    • 84898661561 scopus 로고    scopus 로고
    • Smart energy groups home page
    • Smart energy groups home page. http://smartenergygroups. com.
  • 26
    • 35048812546 scopus 로고    scopus 로고
    • Intrusion detection via static analysis
    • USA. IEEE Computer Society
    • David Wagner and Drew Dean. Intrusion detection via static analysis. In Proceedings S&P'01, USA, 2001. IEEE Computer Society.
    • (2001) Proceedings S&P'01
    • Wagner, D.1    Dean, D.2
  • 28
    • 0036647172 scopus 로고    scopus 로고
    • Multivariate statistical analysis of audit trails for host-based intrusion detection
    • July
    • Nong Ye, Syed Masum Emran, Qiang Chen, and Sean Vilbert. Multivariate statistical analysis of audit trails for host-based intrusion detection. IEEE Trans. Comput., 51(7):810-820, July 2002.
    • (2002) IEEE Trans. Comput , vol.51 , Issue.7 , pp. 810-820
    • Ye, N.1    Masum Emran, S.2    Chen, Q.3    Vilbert, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.