On specification-based cyber-attack detection in smart grids
dc.bibliographicCitation.firstPage | 23 | eng |
dc.bibliographicCitation.issue | S1 | eng |
dc.bibliographicCitation.journalTitle | Energy Informatics | eng |
dc.bibliographicCitation.volume | 5 | eng |
dc.contributor.author | Sen, Ömer | |
dc.contributor.author | van der Velde, Dennis | |
dc.contributor.author | Lühman, Maik | |
dc.contributor.author | Sprünken, Florian | |
dc.contributor.author | Hacker, Immanuel | |
dc.contributor.author | Ulbig, Andreas | |
dc.contributor.author | Andres, Michael | |
dc.contributor.author | Henze, Martin | |
dc.date.accessioned | 2022-10-05T06:44:25Z | |
dc.date.available | 2022-10-05T06:44:25Z | |
dc.date.issued | 2022 | |
dc.description.abstract | The transformation of power grids into intelligent cyber-physical systems brings numerous benefits, but also significantly increases the surface for cyber-attacks, demanding appropriate countermeasures. However, the development, validation, and testing of data-driven countermeasures against cyber-attacks, such as machine learning-based detection approaches, lack important data from real-world cyber incidents. Unlike attack data from real-world cyber incidents, infrastructure knowledge and standards are accessible through expert and domain knowledge. Our proposed approach uses domain knowledge to define the behavior of a smart grid under non-attack conditions and detect attack patterns and anomalies. Using a graph-based specification formalism, we combine cross-domain knowledge that enables the generation of whitelisting rules not only for statically defined protocol fields but also for communication flows and technical operation boundaries. Finally, we evaluate our specification-based intrusion detection system against various attack scenarios and assess detection quality and performance. In particular, we investigate a data manipulation attack in a future-orientated use case of an IEC 60870-based SCADA system that controls distributed energy resources in the distribution grid. Our approach can detect severe data manipulation attacks with high accuracy in a timely and reliable manner. | eng |
dc.description.version | publishedVersion | eng |
dc.identifier.uri | https://oa.tib.eu/renate/handle/123456789/10215 | |
dc.identifier.uri | http://dx.doi.org/10.34657/9262 | |
dc.language.iso | eng | eng |
dc.relation.doi | https://doi.org/10.1186/s42162-022-00206-7 | |
dc.relation.essn | 2520-8942 | |
dc.rights.license | CC BY 4.0 Unported | eng |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ | eng |
dc.subject.ddc | 004 | eng |
dc.subject.ddc | 333.7 | eng |
dc.subject.other | Cyber security | eng |
dc.subject.other | Cyber physical systems | eng |
dc.subject.other | Intrusion detection systems | eng |
dc.title | On specification-based cyber-attack detection in smart grids | eng |
dc.type | Article | eng |
dc.type | Text | eng |
tib.accessRights | openAccess | eng |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- s42162-022-00206-7.pdf
- Size:
- 1.82 MB
- Format:
- Adobe Portable Document Format
- Description: