메뉴 건너뛰기




Volumn 6, Issue 6, 2015, Pages 3104-3113

Developing a Hybrid Intrusion Detection System Using Data Mining for Power Systems

Author keywords

Cyber attacks; data mining; distance protection; intrusion detection system (IDS); power system; synchrophasor system

Indexed keywords

BIG DATA; COMPUTER CRIME; CRIME; DATA MINING; ELECTRIC POWER TRANSMISSION; INTRUSION DETECTION; WIDE AREA NETWORKS;

EID: 84959498649     PISSN: 19493053     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSG.2015.2409775     Document Type: Article
Times cited : (370)

References (24)
  • 1
    • 66149111186 scopus 로고    scopus 로고
    • Nat. Energy Technol. Lab. (NETL), Morgantown, WV, USA
    • A Systems View of the Modern Grid, Nat. Energy Technol. Lab. (NETL), Morgantown, WV, USA, 2007. [Online]. Available: https://www.smartgrid.gov/sites/default/files/pdfs/a-systems-view-of-the-modern-grid.pdf
    • (2007) A Systems View of the Modern Grid
  • 5
    • 78650062267 scopus 로고    scopus 로고
    • Symantec Corp., Mountain View, CA, USA, Tech. Rep. MS10-046
    • N. Falliere, L. O'Murchu, E. Chien, "W32.Stuxnet dossier, V 1.4," Symantec Corp., Mountain View, CA, USA, Tech. Rep. MS10-046, 2011. [Online]. Available: http://www.symantec.com/content/en/us/enterprise/media/security-response/whitepapers/w32-stuxnet-dossier.pdf
    • (2011) W32.Stuxnet Dossier v 1.4
    • Falliere, N.1    O'Murchu, L.2    Chien, E.3
  • 6
    • 82155196441 scopus 로고    scopus 로고
    • Anomaly detection for cybersecurity of the substations
    • Dec.
    • C. W. Ten, J. Hong, C. C. Liu, "Anomaly detection for cybersecurity of the substations," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 865-873, Dec. 2011.
    • (2011) IEEE Trans. Smart Grid , vol.2 , Issue.4 , pp. 865-873
    • Ten, C.W.1    Hong, J.2    Liu, C.C.3
  • 8
    • 84883281959 scopus 로고    scopus 로고
    • Behavior-rule based intrusion detection systems for safety critical smart grid applications
    • Sep.
    • R. Mitchell and I.-R. Chen, "Behavior-rule based intrusion detection systems for safety critical smart grid applications," IEEE Trans. Smart Grid, vol. 4, no. 3, pp. 1254-1263, Sep. 2013.
    • (2013) IEEE Trans. Smart Grid , vol.4 , Issue.3 , pp. 1254-1263
    • Mitchell, R.1    Chen, I.-R.2
  • 9
    • 84894516839 scopus 로고    scopus 로고
    • Intrusion detection system for network security in synchrophasor systems
    • Y. Yang et al., "Intrusion detection system for network security in synchrophasor systems," in Proc. IET Int. Conf. Inf. Commun. Technol., Beijing, China, 2013, pp. 246-252.
    • (2013) Proc. IET Int. Conf. Inf. Commun. Technol., Beijing, China , pp. 246-252
    • Yang, Y.1
  • 10
    • 82155167665 scopus 로고    scopus 로고
    • Distributed intrusion detection system in a multi-layer network architecture of smart grids
    • Dec.
    • Y. Zhang, L. Wang, W. Sun, R. C. Green, M. Alam, "Distributed intrusion detection system in a multi-layer network architecture of smart grids," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 796-808, Dec. 2011.
    • (2011) IEEE Trans. Smart Grid , vol.2 , Issue.4 , pp. 796-808
    • Zhang, Y.1    Wang, L.2    Sun, W.3    Green, R.C.4    Alam, M.5
  • 13
    • 84886436167 scopus 로고    scopus 로고
    • Real-time intrusion detection in power system operations
    • May
    • J. Valenzuela, J. Wang, N. Bissinger, "Real-time intrusion detection in power system operations," IEEE Trans. Power Syst., vol. 28, no. 2, pp. 1052-1062, May 2013.
    • (2013) IEEE Trans. Power Syst. , vol.28 , Issue.2 , pp. 1052-1062
    • Valenzuela, J.1    Wang, J.2    Bissinger, N.3
  • 14
    • 84908684317 scopus 로고    scopus 로고
    • Secure power systems against malicious cyber-physical data attacks: Protection and identification
    • M. Talebi, J. Wang, Z. Qu, "Secure power systems against malicious cyber-physical data attacks: Protection and identification," World Acad. Sci. Eng. Technol., vol. 6, no. 6, pp. 112-119, 2012. [Online]. Available: http://2waset.org/publications/6605/secure-power-systems-againstmalicious-cyber-physical-data-attacks-protection-and-identification
    • (2012) World Acad. Sci. Eng. Technol. , vol.6 , Issue.6 , pp. 112-119
    • Talebi, M.1    Wang, J.2    Qu, Z.3
  • 21
    • 0018690869 scopus 로고
    • Auto-reclosing
    • R. Nylén, "Auto-reclosing," ASEA J., vol. 52, no. 6, pp. 127-132, 1979.
    • (1979) ASEA J. , vol.52 , Issue.6 , pp. 127-132
    • Nylén, R.1
  • 22
    • 84908701459 scopus 로고    scopus 로고
    • Machine learning for power system disturbance and cyber-attack discrimination
    • R. Borges et al., "Machine learning for power system disturbance and cyber-attack discrimination," in Proc. Int. Symp. Resil. Control Syst., Denver, CO, USA, 2014, pp. 1-8.
    • (2014) Proc. Int. Symp. Resil. Control Syst., Denver, CO, USA , pp. 1-8
    • Borges, R.1
  • 23
    • 84904666473 scopus 로고    scopus 로고
    • An integrated lookahead control-based adaptive supervisory framework for autonomic power system applications
    • Dec.
    • R. Amgai, J. Shi, S. Abdelwahed, "An integrated lookahead control-based adaptive supervisory framework for autonomic power system applications," Int. J. Elect. Power Energy Syst., vol. 63, pp. 824-835, Dec. 2014.
    • (2014) Int. J. Elect. Power Energy Syst. , vol.63 , pp. 824-835
    • Amgai, R.1    Shi, J.2    Abdelwahed, S.3
  • 24
    • 49249110834 scopus 로고    scopus 로고
    • Collaborative, trust-based security mechanisms for a regional utility intranet
    • Aug.
    • G. Coates, K. Hopkinson, S. Graham, S. Kurkowski, "Collaborative, trust-based security mechanisms for a regional utility intranet," IEEE Trans. Power Syst., vol. 23, no. 3, pp. 831-844, Aug. 2008.
    • (2008) IEEE Trans. Power Syst. , vol.23 , Issue.3 , pp. 831-844
    • Coates, G.1    Hopkinson, K.2    Graham, S.3    Kurkowski, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.