Loading…
Detecting Intrusive Activity in the Smart Grid Communications Infrastructure Using Self-Organizing Maps
The Smart Grid Infrastructure (SGI) provides for sustainable, affordable and uninterrupted electricity supply to consumers. The communications infrastructure of the SGI is prone to several malicious attacks identified in the recent past. Customer-specific electricity readings are communicated up the...
Saved in:
Main Authors: | , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 1599 |
container_issue | |
container_start_page | 1594 |
container_title | |
container_volume | |
creator | Baig, Zubair Ahmed Ahmad, Saif Sait, Sadiq Mohammed |
description | The Smart Grid Infrastructure (SGI) provides for sustainable, affordable and uninterrupted electricity supply to consumers. The communications infrastructure of the SGI is prone to several malicious attacks identified in the recent past. Customer-specific electricity readings are communicated up the SGI hierarchy from consumer devices to centralized servers through intermediary devices such as smart meters and data concentrators/aggregators. In this paper, we model the attacks against the home area network of the SGI, through definition and generation of routine device behaviors. Any observed deviation from the defined normal profile is labeled as a malicious attack. Subsequently, we propose a Self-Organizing Map (SOM)-based approach towards training and testing of centralized SGI devices to qualify them for identifying anomalies accurately. The proposed scheme is capable of detecting anomalous readings within a consumer's household, with reasonable accuracies. |
doi_str_mv | 10.1109/TrustCom.2013.196 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_6681021</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6681021</ieee_id><sourcerecordid>6681021</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-26bc277a9a88ab2f96009532cd494d6811cd1b020cea03eefa383220d165ebd13</originalsourceid><addsrcrecordid>eNotj81qAjEUhdPSQsX6AKWbvMBMb5KZTLIU21rB4kKF7iSTuTMN6ChJFOzTG6mr-8f5zrmEvDDIGQP9tvLHECf7Xc6BiZxpeUdGulJQSV2WwDnckwEXvMh0uj_ceqXVzxMZheBq4LKSAqQakO4dI9ro-o7O-pi47oR0nBYnF8_U9TT-Il3ujI906l1Dk-vu2Dtrotv3IWlab0LS2Xj0SNfhClrits0WvjO9-7vO3-YQnslja7YBR7c6JOvPj9XkK5svprPJeJ45VpUx47K2vKqMNkqZmrdaAuhScNsUumikYsw2LOUHiwYEYmuEEunhhskS64aJIXn95zpE3By8S9HPG5mUwJm4AHIrXFA</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Detecting Intrusive Activity in the Smart Grid Communications Infrastructure Using Self-Organizing Maps</title><source>IEEE Xplore All Conference Series</source><creator>Baig, Zubair Ahmed ; Ahmad, Saif ; Sait, Sadiq Mohammed</creator><creatorcontrib>Baig, Zubair Ahmed ; Ahmad, Saif ; Sait, Sadiq Mohammed</creatorcontrib><description>The Smart Grid Infrastructure (SGI) provides for sustainable, affordable and uninterrupted electricity supply to consumers. The communications infrastructure of the SGI is prone to several malicious attacks identified in the recent past. Customer-specific electricity readings are communicated up the SGI hierarchy from consumer devices to centralized servers through intermediary devices such as smart meters and data concentrators/aggregators. In this paper, we model the attacks against the home area network of the SGI, through definition and generation of routine device behaviors. Any observed deviation from the defined normal profile is labeled as a malicious attack. Subsequently, we propose a Self-Organizing Map (SOM)-based approach towards training and testing of centralized SGI devices to qualify them for identifying anomalies accurately. The proposed scheme is capable of detecting anomalous readings within a consumer's household, with reasonable accuracies.</description><identifier>ISSN: 2324-898X</identifier><identifier>EISSN: 2324-9013</identifier><identifier>EISBN: 9780769550220</identifier><identifier>EISBN: 0769550223</identifier><identifier>DOI: 10.1109/TrustCom.2013.196</identifier><identifier>CODEN: IEEPAD</identifier><language>eng</language><publisher>IEEE</publisher><subject>Anomaly Detection ; Electricity ; Energy consumption ; Intrusion detection ; Neurons ; Self-Organizing Maps ; Smart Grid Communications ; Smart grids ; Training ; Vectors</subject><ispartof>2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2013, p.1594-1599</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6681021$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,27925,54555,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6681021$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Baig, Zubair Ahmed</creatorcontrib><creatorcontrib>Ahmad, Saif</creatorcontrib><creatorcontrib>Sait, Sadiq Mohammed</creatorcontrib><title>Detecting Intrusive Activity in the Smart Grid Communications Infrastructure Using Self-Organizing Maps</title><title>2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications</title><addtitle>trustcom</addtitle><description>The Smart Grid Infrastructure (SGI) provides for sustainable, affordable and uninterrupted electricity supply to consumers. The communications infrastructure of the SGI is prone to several malicious attacks identified in the recent past. Customer-specific electricity readings are communicated up the SGI hierarchy from consumer devices to centralized servers through intermediary devices such as smart meters and data concentrators/aggregators. In this paper, we model the attacks against the home area network of the SGI, through definition and generation of routine device behaviors. Any observed deviation from the defined normal profile is labeled as a malicious attack. Subsequently, we propose a Self-Organizing Map (SOM)-based approach towards training and testing of centralized SGI devices to qualify them for identifying anomalies accurately. The proposed scheme is capable of detecting anomalous readings within a consumer's household, with reasonable accuracies.</description><subject>Anomaly Detection</subject><subject>Electricity</subject><subject>Energy consumption</subject><subject>Intrusion detection</subject><subject>Neurons</subject><subject>Self-Organizing Maps</subject><subject>Smart Grid Communications</subject><subject>Smart grids</subject><subject>Training</subject><subject>Vectors</subject><issn>2324-898X</issn><issn>2324-9013</issn><isbn>9780769550220</isbn><isbn>0769550223</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2013</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotj81qAjEUhdPSQsX6AKWbvMBMb5KZTLIU21rB4kKF7iSTuTMN6ChJFOzTG6mr-8f5zrmEvDDIGQP9tvLHECf7Xc6BiZxpeUdGulJQSV2WwDnckwEXvMh0uj_ceqXVzxMZheBq4LKSAqQakO4dI9ro-o7O-pi47oR0nBYnF8_U9TT-Il3ujI906l1Dk-vu2Dtrotv3IWlab0LS2Xj0SNfhClrits0WvjO9-7vO3-YQnslja7YBR7c6JOvPj9XkK5svprPJeJ45VpUx47K2vKqMNkqZmrdaAuhScNsUumikYsw2LOUHiwYEYmuEEunhhskS64aJIXn95zpE3By8S9HPG5mUwJm4AHIrXFA</recordid><startdate>201307</startdate><enddate>201307</enddate><creator>Baig, Zubair Ahmed</creator><creator>Ahmad, Saif</creator><creator>Sait, Sadiq Mohammed</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201307</creationdate><title>Detecting Intrusive Activity in the Smart Grid Communications Infrastructure Using Self-Organizing Maps</title><author>Baig, Zubair Ahmed ; Ahmad, Saif ; Sait, Sadiq Mohammed</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-26bc277a9a88ab2f96009532cd494d6811cd1b020cea03eefa383220d165ebd13</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Anomaly Detection</topic><topic>Electricity</topic><topic>Energy consumption</topic><topic>Intrusion detection</topic><topic>Neurons</topic><topic>Self-Organizing Maps</topic><topic>Smart Grid Communications</topic><topic>Smart grids</topic><topic>Training</topic><topic>Vectors</topic><toplevel>online_resources</toplevel><creatorcontrib>Baig, Zubair Ahmed</creatorcontrib><creatorcontrib>Ahmad, Saif</creatorcontrib><creatorcontrib>Sait, Sadiq Mohammed</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Baig, Zubair Ahmed</au><au>Ahmad, Saif</au><au>Sait, Sadiq Mohammed</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Detecting Intrusive Activity in the Smart Grid Communications Infrastructure Using Self-Organizing Maps</atitle><btitle>2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications</btitle><stitle>trustcom</stitle><date>2013-07</date><risdate>2013</risdate><spage>1594</spage><epage>1599</epage><pages>1594-1599</pages><issn>2324-898X</issn><eissn>2324-9013</eissn><eisbn>9780769550220</eisbn><eisbn>0769550223</eisbn><coden>IEEPAD</coden><abstract>The Smart Grid Infrastructure (SGI) provides for sustainable, affordable and uninterrupted electricity supply to consumers. The communications infrastructure of the SGI is prone to several malicious attacks identified in the recent past. Customer-specific electricity readings are communicated up the SGI hierarchy from consumer devices to centralized servers through intermediary devices such as smart meters and data concentrators/aggregators. In this paper, we model the attacks against the home area network of the SGI, through definition and generation of routine device behaviors. Any observed deviation from the defined normal profile is labeled as a malicious attack. Subsequently, we propose a Self-Organizing Map (SOM)-based approach towards training and testing of centralized SGI devices to qualify them for identifying anomalies accurately. The proposed scheme is capable of detecting anomalous readings within a consumer's household, with reasonable accuracies.</abstract><pub>IEEE</pub><doi>10.1109/TrustCom.2013.196</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 2324-898X |
ispartof | 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2013, p.1594-1599 |
issn | 2324-898X 2324-9013 |
language | eng |
recordid | cdi_ieee_primary_6681021 |
source | IEEE Xplore All Conference Series |
subjects | Anomaly Detection Electricity Energy consumption Intrusion detection Neurons Self-Organizing Maps Smart Grid Communications Smart grids Training Vectors |
title | Detecting Intrusive Activity in the Smart Grid Communications Infrastructure Using Self-Organizing Maps |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T16%3A16%3A32IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Detecting%20Intrusive%20Activity%20in%20the%20Smart%20Grid%20Communications%20Infrastructure%20Using%20Self-Organizing%20Maps&rft.btitle=2013%2012th%20IEEE%20International%20Conference%20on%20Trust,%20Security%20and%20Privacy%20in%20Computing%20and%20Communications&rft.au=Baig,%20Zubair%20Ahmed&rft.date=2013-07&rft.spage=1594&rft.epage=1599&rft.pages=1594-1599&rft.issn=2324-898X&rft.eissn=2324-9013&rft.coden=IEEPAD&rft_id=info:doi/10.1109/TrustCom.2013.196&rft.eisbn=9780769550220&rft.eisbn_list=0769550223&rft_dat=%3Cieee_CHZPO%3E6681021%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i175t-26bc277a9a88ab2f96009532cd494d6811cd1b020cea03eefa383220d165ebd13%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6681021&rfr_iscdi=true |