Loading…

Detecting Intrusive Activity in the Smart Grid Communications Infrastructure Using Self-Organizing Maps

The Smart Grid Infrastructure (SGI) provides for sustainable, affordable and uninterrupted electricity supply to consumers. The communications infrastructure of the SGI is prone to several malicious attacks identified in the recent past. Customer-specific electricity readings are communicated up the...

Full description

Saved in:
Bibliographic Details
Main Authors: Baig, Zubair Ahmed, Ahmad, Saif, Sait, Sadiq Mohammed
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 1599
container_issue
container_start_page 1594
container_title
container_volume
creator Baig, Zubair Ahmed
Ahmad, Saif
Sait, Sadiq Mohammed
description The Smart Grid Infrastructure (SGI) provides for sustainable, affordable and uninterrupted electricity supply to consumers. The communications infrastructure of the SGI is prone to several malicious attacks identified in the recent past. Customer-specific electricity readings are communicated up the SGI hierarchy from consumer devices to centralized servers through intermediary devices such as smart meters and data concentrators/aggregators. In this paper, we model the attacks against the home area network of the SGI, through definition and generation of routine device behaviors. Any observed deviation from the defined normal profile is labeled as a malicious attack. Subsequently, we propose a Self-Organizing Map (SOM)-based approach towards training and testing of centralized SGI devices to qualify them for identifying anomalies accurately. The proposed scheme is capable of detecting anomalous readings within a consumer's household, with reasonable accuracies.
doi_str_mv 10.1109/TrustCom.2013.196
format conference_proceeding
fullrecord <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_6681021</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6681021</ieee_id><sourcerecordid>6681021</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-26bc277a9a88ab2f96009532cd494d6811cd1b020cea03eefa383220d165ebd13</originalsourceid><addsrcrecordid>eNotj81qAjEUhdPSQsX6AKWbvMBMb5KZTLIU21rB4kKF7iSTuTMN6ChJFOzTG6mr-8f5zrmEvDDIGQP9tvLHECf7Xc6BiZxpeUdGulJQSV2WwDnckwEXvMh0uj_ceqXVzxMZheBq4LKSAqQakO4dI9ro-o7O-pi47oR0nBYnF8_U9TT-Il3ujI906l1Dk-vu2Dtrotv3IWlab0LS2Xj0SNfhClrits0WvjO9-7vO3-YQnslja7YBR7c6JOvPj9XkK5svprPJeJ45VpUx47K2vKqMNkqZmrdaAuhScNsUumikYsw2LOUHiwYEYmuEEunhhskS64aJIXn95zpE3By8S9HPG5mUwJm4AHIrXFA</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Detecting Intrusive Activity in the Smart Grid Communications Infrastructure Using Self-Organizing Maps</title><source>IEEE Xplore All Conference Series</source><creator>Baig, Zubair Ahmed ; Ahmad, Saif ; Sait, Sadiq Mohammed</creator><creatorcontrib>Baig, Zubair Ahmed ; Ahmad, Saif ; Sait, Sadiq Mohammed</creatorcontrib><description>The Smart Grid Infrastructure (SGI) provides for sustainable, affordable and uninterrupted electricity supply to consumers. The communications infrastructure of the SGI is prone to several malicious attacks identified in the recent past. Customer-specific electricity readings are communicated up the SGI hierarchy from consumer devices to centralized servers through intermediary devices such as smart meters and data concentrators/aggregators. In this paper, we model the attacks against the home area network of the SGI, through definition and generation of routine device behaviors. Any observed deviation from the defined normal profile is labeled as a malicious attack. Subsequently, we propose a Self-Organizing Map (SOM)-based approach towards training and testing of centralized SGI devices to qualify them for identifying anomalies accurately. The proposed scheme is capable of detecting anomalous readings within a consumer's household, with reasonable accuracies.</description><identifier>ISSN: 2324-898X</identifier><identifier>EISSN: 2324-9013</identifier><identifier>EISBN: 9780769550220</identifier><identifier>EISBN: 0769550223</identifier><identifier>DOI: 10.1109/TrustCom.2013.196</identifier><identifier>CODEN: IEEPAD</identifier><language>eng</language><publisher>IEEE</publisher><subject>Anomaly Detection ; Electricity ; Energy consumption ; Intrusion detection ; Neurons ; Self-Organizing Maps ; Smart Grid Communications ; Smart grids ; Training ; Vectors</subject><ispartof>2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2013, p.1594-1599</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6681021$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,27925,54555,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6681021$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Baig, Zubair Ahmed</creatorcontrib><creatorcontrib>Ahmad, Saif</creatorcontrib><creatorcontrib>Sait, Sadiq Mohammed</creatorcontrib><title>Detecting Intrusive Activity in the Smart Grid Communications Infrastructure Using Self-Organizing Maps</title><title>2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications</title><addtitle>trustcom</addtitle><description>The Smart Grid Infrastructure (SGI) provides for sustainable, affordable and uninterrupted electricity supply to consumers. The communications infrastructure of the SGI is prone to several malicious attacks identified in the recent past. Customer-specific electricity readings are communicated up the SGI hierarchy from consumer devices to centralized servers through intermediary devices such as smart meters and data concentrators/aggregators. In this paper, we model the attacks against the home area network of the SGI, through definition and generation of routine device behaviors. Any observed deviation from the defined normal profile is labeled as a malicious attack. Subsequently, we propose a Self-Organizing Map (SOM)-based approach towards training and testing of centralized SGI devices to qualify them for identifying anomalies accurately. The proposed scheme is capable of detecting anomalous readings within a consumer's household, with reasonable accuracies.</description><subject>Anomaly Detection</subject><subject>Electricity</subject><subject>Energy consumption</subject><subject>Intrusion detection</subject><subject>Neurons</subject><subject>Self-Organizing Maps</subject><subject>Smart Grid Communications</subject><subject>Smart grids</subject><subject>Training</subject><subject>Vectors</subject><issn>2324-898X</issn><issn>2324-9013</issn><isbn>9780769550220</isbn><isbn>0769550223</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2013</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotj81qAjEUhdPSQsX6AKWbvMBMb5KZTLIU21rB4kKF7iSTuTMN6ChJFOzTG6mr-8f5zrmEvDDIGQP9tvLHECf7Xc6BiZxpeUdGulJQSV2WwDnckwEXvMh0uj_ceqXVzxMZheBq4LKSAqQakO4dI9ro-o7O-pi47oR0nBYnF8_U9TT-Il3ujI906l1Dk-vu2Dtrotv3IWlab0LS2Xj0SNfhClrits0WvjO9-7vO3-YQnslja7YBR7c6JOvPj9XkK5svprPJeJ45VpUx47K2vKqMNkqZmrdaAuhScNsUumikYsw2LOUHiwYEYmuEEunhhskS64aJIXn95zpE3By8S9HPG5mUwJm4AHIrXFA</recordid><startdate>201307</startdate><enddate>201307</enddate><creator>Baig, Zubair Ahmed</creator><creator>Ahmad, Saif</creator><creator>Sait, Sadiq Mohammed</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201307</creationdate><title>Detecting Intrusive Activity in the Smart Grid Communications Infrastructure Using Self-Organizing Maps</title><author>Baig, Zubair Ahmed ; Ahmad, Saif ; Sait, Sadiq Mohammed</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-26bc277a9a88ab2f96009532cd494d6811cd1b020cea03eefa383220d165ebd13</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Anomaly Detection</topic><topic>Electricity</topic><topic>Energy consumption</topic><topic>Intrusion detection</topic><topic>Neurons</topic><topic>Self-Organizing Maps</topic><topic>Smart Grid Communications</topic><topic>Smart grids</topic><topic>Training</topic><topic>Vectors</topic><toplevel>online_resources</toplevel><creatorcontrib>Baig, Zubair Ahmed</creatorcontrib><creatorcontrib>Ahmad, Saif</creatorcontrib><creatorcontrib>Sait, Sadiq Mohammed</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Baig, Zubair Ahmed</au><au>Ahmad, Saif</au><au>Sait, Sadiq Mohammed</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Detecting Intrusive Activity in the Smart Grid Communications Infrastructure Using Self-Organizing Maps</atitle><btitle>2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications</btitle><stitle>trustcom</stitle><date>2013-07</date><risdate>2013</risdate><spage>1594</spage><epage>1599</epage><pages>1594-1599</pages><issn>2324-898X</issn><eissn>2324-9013</eissn><eisbn>9780769550220</eisbn><eisbn>0769550223</eisbn><coden>IEEPAD</coden><abstract>The Smart Grid Infrastructure (SGI) provides for sustainable, affordable and uninterrupted electricity supply to consumers. The communications infrastructure of the SGI is prone to several malicious attacks identified in the recent past. Customer-specific electricity readings are communicated up the SGI hierarchy from consumer devices to centralized servers through intermediary devices such as smart meters and data concentrators/aggregators. In this paper, we model the attacks against the home area network of the SGI, through definition and generation of routine device behaviors. Any observed deviation from the defined normal profile is labeled as a malicious attack. Subsequently, we propose a Self-Organizing Map (SOM)-based approach towards training and testing of centralized SGI devices to qualify them for identifying anomalies accurately. The proposed scheme is capable of detecting anomalous readings within a consumer's household, with reasonable accuracies.</abstract><pub>IEEE</pub><doi>10.1109/TrustCom.2013.196</doi><tpages>6</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 2324-898X
ispartof 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2013, p.1594-1599
issn 2324-898X
2324-9013
language eng
recordid cdi_ieee_primary_6681021
source IEEE Xplore All Conference Series
subjects Anomaly Detection
Electricity
Energy consumption
Intrusion detection
Neurons
Self-Organizing Maps
Smart Grid Communications
Smart grids
Training
Vectors
title Detecting Intrusive Activity in the Smart Grid Communications Infrastructure Using Self-Organizing Maps
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T16%3A16%3A32IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Detecting%20Intrusive%20Activity%20in%20the%20Smart%20Grid%20Communications%20Infrastructure%20Using%20Self-Organizing%20Maps&rft.btitle=2013%2012th%20IEEE%20International%20Conference%20on%20Trust,%20Security%20and%20Privacy%20in%20Computing%20and%20Communications&rft.au=Baig,%20Zubair%20Ahmed&rft.date=2013-07&rft.spage=1594&rft.epage=1599&rft.pages=1594-1599&rft.issn=2324-898X&rft.eissn=2324-9013&rft.coden=IEEPAD&rft_id=info:doi/10.1109/TrustCom.2013.196&rft.eisbn=9780769550220&rft.eisbn_list=0769550223&rft_dat=%3Cieee_CHZPO%3E6681021%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i175t-26bc277a9a88ab2f96009532cd494d6811cd1b020cea03eefa383220d165ebd13%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6681021&rfr_iscdi=true