Abstract
In this paper, we study the Optimal Inspection Points (OIP) problem, which asks us to find a subset of vertices in a given network to perform the Deep Packet Inspection so as to maximize the number of scanned packets while satisfying the delay constraints. This problem finds many applications for malicious attack detection, especially those where packet scanning is a must. Accordingly, we prove OIP is NP-complete and provide an FPTAS in the case of single path routing. For the multiple path routings, we design an FPTAS when the routing graph takes a form of series-parallel graphs, which is commonly used to model electric networks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Mirkovic, J., Reiher, P.: A Taxonomy of DDoS Attack and DDoS Defense Mechanisms. In: ACM SIGCOMM (2004)
Peng, T., Leckie, C., Ramamohanarao, K.: Survey of Network-Based Defense Mechanisms Countering the DoS And DDoS Problems. ACM Comput. Surv. 39(1), Article 3 (2007)
Kim, Y., Lau, W.C., Chuah, M.C., Chao, H.J.: PacketScore: A Statistics-Based Packet Filtering Scheme against Distributed Denial-of-Service Attacks. IEEE Trans. Dependable Secur. Comput. 3(2), 141–155 (2006)
Wanga, W., Lu, Z.: Cyber Security in the Smart Grid: Survey and Challenges. Computer Networks (57), 1344–1371 (2013)
Jeffrey, L.H., James, H.G., Sandip, C.P.: Cyber security enhancements for SCADA and DCS systems, Technical Report TR-ISRL-07-02, University of Louisville, 1–27 (2007)
Hamieh, A., Ben-Othman, J.: Detection of jamming attacks in wireless ad hoc networks using error distribution. In: Proc. of IEEE ICC 2009 (2009)
Choi, D., Kim, H., Won, D., Kim, S.: Advanced key-management architecture for secure SCADA communications. IEEE Trans. Power Delivery 24, 1154–1163 (2009)
Choi, D., Lee, S., Won, D., Kim, S.: Efficient secure group communications for SCADA. IEEE Trans. Power Delivery 25, 714–722 (2010)
Mackiewicz, R.E.: Overview of IEC 61850 and Benefits. In: Power Systems Conference and Exposition, PSCE 2006, pp. 623–630. IEEE PES (2006)
Mohagheghi, S., Stoupis, J., Wang, Z.: Communication protocols and networks for power systems - current status and future trends. In: Proc. of Power Systems Conference and Exposition, PES 2009 (2009)
IEC Standard, IEC 62351: Data and communication security
Brunner, C.: IEC 61850 for power system communication. In: Transmission and Distribution Conference and Exposition, pp. 1–6. IEEE/PES (2008)
Takamizawa, K., Nishizeki, T., Saito, N.: Linear-time Computability of Combinatorial Problems on Series-parallel Graphs. Journal of ACM, 623–641 (1982)
Vazirani, V.V.: Approximation Algorithms. Springer-Verlag New York, Inc., New York (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Mishra, S., Dinh, T.N., Thai, M.T., Shin, I. (2014). Optimal Inspection Points for Malicious Attack Detection in Smart Grids. In: Cai, Z., Zelikovsky, A., Bourgeois, A. (eds) Computing and Combinatorics. COCOON 2014. Lecture Notes in Computer Science, vol 8591. Springer, Cham. https://doi.org/10.1007/978-3-319-08783-2_34
Download citation
DOI: https://doi.org/10.1007/978-3-319-08783-2_34
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-08782-5
Online ISBN: 978-3-319-08783-2
eBook Packages: Computer ScienceComputer Science (R0)