Dispersion analysis of network traffic for intrusion detection in Smart Grids
Abstract
We consider the systems of detection and prevention of intrusions in modern telecommunication systems and networks. Methods of monitoring events, consisting of analysis of network activity of individual services and information services, are analyzed. It is proposed to use the mathematical apparatus of analysis of variance for processing results of modeling telecommunication systems and studying the statistical properties of network traffic in determining the significance of discrepancies or coincidence of characteristics. The proposed approach is to use the Fisher statistical criterion based on an estimate of the ratio of sample variances. This allows you to test the hypothesis about the homogeneity of statistical properties of network traffic with respect to the variance index (variance) with a given level of significance. The obtained results of experimental studies are recommended to be used to improve mechanisms for monitoring the network activity of individual services and information services, including for detecting and preventing intrusions in telecommunications systems and networks of promising Smart Grids.
Downloads
References
Cybersecurity for Smart Grid Systems URL: https://www.nist.gov/programs-projects/cybersecurity-smart-grid-systems (Last accessed: 25 June 2018)
Dagle J. E. Cyber-physical system security of smart grids. 2012 IEEE PES Innovative Smart Grid Technologies (ISGT). Wash-ington, DC, 2012. Р. 1 – 2.
Lightweight Stream Ciphers for Green IT Engineering / Kuznetsov O. and all. Green IT Engineering: Social, Business and Indus-trial Applications. Studies in Systems, Decision and Control. 2019. Vol. 171. Р. 113 – 137.
Christodorescu M., Jha S. Testing. Malware Detectors. Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA’04). Boston: Massachusetts, USA, 2004. 11 p.
Prospective Lightweight Block Cipher for Green IT Engineering / Andrushkevych A. and all. Green IT Engineering: Social, Busi-ness and Industrial Applications. Studies in Systems, Decision and Control. 2019. Vol. 171. Р. 95 – 112.
Methods of Information Protection in Communications Systems and Methods of Their Cryptoanalysis / Gorbenko I.D., Dolgov V.I., Rublinetskii V.I., Korovkin K.V. Telecommunications and Radio Engineering. 1998. Vol. 52, Issue 4. Р. 89 – 96.
OpenStack-Based Evaluation Framework for Smart Grid Cyber Security / Albarakati A. and all. 2018 IEEE International Confer-ence on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm). Aalborg, 2018. Р. 1 – 6.
Jahan S., Habiba R. An analysis of smart grid communication infrastructure & cyber security in smart grid. 2015 International Conference on Advances in Electrical Engineering (ICAEE). Dhaka, 2015. Р. 190 – 193.
Smart grid information security - a research on standards/ Wang Y., Zhang B., Lin W., Zhang T. 2011 International Conference on Advanced Power System Automation and Protection. Beijing, 2011. Р. 1188 – 1194.
Security and Reliability Perspectives in Cyber-Physical Smart Grids / Lei H., Chen B., Butler-Purry K. L., Singh C. 2018 IEEE Innovative Smart Grid Technologies - Asia (ISGT Asia). Singapore, 2018. Р. 42 – 47.
Smart grid information security - a research on standards / Wang Y., Zhang B., Lin W., Zhang T. 2011 International Conference on Advanced Power System Automation and Protection. Beijing, 2011. Р. 1188 – 1194.
Impact of cyber-security issues on Smart Grid / Yang Y and all. 2011 2nd IEEE PES International Conference and Exhibition on Innovative Smart Grid Technologies. Manchester, 2011. Р. 1 – 7.
Zamula A., Kavun S. Complex systems modeling with intelligent control elements. International Journal of Modeling, Simulation, and Scientific Computing. 2017. Vol. 8, № 1. [19 pages]
Zetter K. The Ukrainian Power Grid Was Hacked Again. Vice Motherboard. URL: https://motherboard.vice.com (Last accessed: January 10, 2017)
Lipovsky R. New wave of cyberattacks against Ukrainian power industry. We Live Security. URL: https://www.welivesecurity.com (Last accessed: 20 February 2016)