Skip to main content

Optimal Inspection Points for Malicious Attack Detection in Smart Grids

  • Conference paper
Computing and Combinatorics (COCOON 2014)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 8591))

Included in the following conference series:

Abstract

In this paper, we study the Optimal Inspection Points (OIP) problem, which asks us to find a subset of vertices in a given network to perform the Deep Packet Inspection so as to maximize the number of scanned packets while satisfying the delay constraints. This problem finds many applications for malicious attack detection, especially those where packet scanning is a must. Accordingly, we prove OIP is NP-complete and provide an FPTAS in the case of single path routing. For the multiple path routings, we design an FPTAS when the routing graph takes a form of series-parallel graphs, which is commonly used to model electric networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mirkovic, J., Reiher, P.: A Taxonomy of DDoS Attack and DDoS Defense Mechanisms. In: ACM SIGCOMM (2004)

    Google Scholar 

  2. Peng, T., Leckie, C., Ramamohanarao, K.: Survey of Network-Based Defense Mechanisms Countering the DoS And DDoS Problems. ACM Comput. Surv. 39(1), Article 3 (2007)

    Google Scholar 

  3. Kim, Y., Lau, W.C., Chuah, M.C., Chao, H.J.: PacketScore: A Statistics-Based Packet Filtering Scheme against Distributed Denial-of-Service Attacks. IEEE Trans. Dependable Secur. Comput. 3(2), 141–155 (2006)

    Article  Google Scholar 

  4. Wanga, W., Lu, Z.: Cyber Security in the Smart Grid: Survey and Challenges. Computer Networks (57), 1344–1371 (2013)

    Google Scholar 

  5. Jeffrey, L.H., James, H.G., Sandip, C.P.: Cyber security enhancements for SCADA and DCS systems, Technical Report TR-ISRL-07-02, University of Louisville, 1–27 (2007)

    Google Scholar 

  6. Hamieh, A., Ben-Othman, J.: Detection of jamming attacks in wireless ad hoc networks using error distribution. In: Proc. of IEEE ICC 2009 (2009)

    Google Scholar 

  7. Choi, D., Kim, H., Won, D., Kim, S.: Advanced key-management architecture for secure SCADA communications. IEEE Trans. Power Delivery 24, 1154–1163 (2009)

    Article  Google Scholar 

  8. Choi, D., Lee, S., Won, D., Kim, S.: Efficient secure group communications for SCADA. IEEE Trans. Power Delivery 25, 714–722 (2010)

    Article  Google Scholar 

  9. Mackiewicz, R.E.: Overview of IEC 61850 and Benefits. In: Power Systems Conference and Exposition, PSCE 2006, pp. 623–630. IEEE PES (2006)

    Google Scholar 

  10. Mohagheghi, S., Stoupis, J., Wang, Z.: Communication protocols and networks for power systems - current status and future trends. In: Proc. of Power Systems Conference and Exposition, PES 2009 (2009)

    Google Scholar 

  11. IEC Standard, IEC 62351: Data and communication security

    Google Scholar 

  12. Brunner, C.: IEC 61850 for power system communication. In: Transmission and Distribution Conference and Exposition, pp. 1–6. IEEE/PES (2008)

    Google Scholar 

  13. Takamizawa, K., Nishizeki, T., Saito, N.: Linear-time Computability of Combinatorial Problems on Series-parallel Graphs. Journal of ACM, 623–641 (1982)

    Google Scholar 

  14. Vazirani, V.V.: Approximation Algorithms. Springer-Verlag New York, Inc., New York (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Mishra, S., Dinh, T.N., Thai, M.T., Shin, I. (2014). Optimal Inspection Points for Malicious Attack Detection in Smart Grids. In: Cai, Z., Zelikovsky, A., Bourgeois, A. (eds) Computing and Combinatorics. COCOON 2014. Lecture Notes in Computer Science, vol 8591. Springer, Cham. https://doi.org/10.1007/978-3-319-08783-2_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-08783-2_34

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-08782-5

  • Online ISBN: 978-3-319-08783-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics