Skip to main content

A Comparison of Different Intrusion Detection Approaches in an Advanced Metering Infrastructure Network Using ADVISE

  • Conference paper
  • First Online:
Quantitative Evaluation of Systems (QEST 2016)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9826))

Included in the following conference series:

Abstract

Utilities responsible for Advanced Metering Infrastructure (AMI) networks must be able to defend themselves from a variety of potential attacks so they may achieve the goals of delivering power to consumers and maintaining the integrity of their equipment and data. Intrusion detection systems (IDSes) can play an important part in the defense of such networks. Utilities should carefully consider the strengths and weaknesses of different IDS deployment strategies to choose the most cost-effective solution. Models of adversary behavior in the presence of different IDS deployments can help with making this decision as we demonstrate through a case study that uses a model created in the ADversary VIew Security Evaluation (ADVISE) formalism (which calculates metrics used to compare different IDSes). We show how these metrics give valuable insight into the selection of the appropriate IDS architecture for an AMI network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bellman, R.: Dynamic Programming, 1st edn. Princeton University Press, Princeton (1957)

    MATH  Google Scholar 

  2. Cardenas, A.A., Berthier, R., Bobba, R.B., Huh, J.H., Jetcheva, J.G., Grochocki, D., Sanders, W.H.: A framework for evaluating intrusion detection architectures in advanced metering infrastructures. IEEE Trans. Smart Grid 5(2), 906–915 (2014)

    Article  Google Scholar 

  3. Grochocki, D., Huh, J.H., Berthier, R., Bobba, R., Sanders, W.H., Cardenas, A.A., Jetcheva, J.G.: AMI threats, intrusion detection requirements and deployment recommendations. In: 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm), pp. 395–400, November 2012

    Google Scholar 

  4. Khoo, B., Cheng, Y.: Using RFID for anti-theft in a Chinese electrical supply company: a cost-benefit analysis. In: Wireless Telecommunications Symposium (WTS), 2011, pp. 1–6 (2011)

    Google Scholar 

  5. LeMay, E., Ford, M.D., Keefe, K., Sanders, W.H., Muehrcke, C.: Model-based security metrics using ADversary VIew Security Evaluation (ADVISE). In: Proceedings of the 8th International Conference on Quantitative Evaluation of SysTems (QEST 2011), Aachen, Germany, 5–8 September 2011, pp. 191–200 (2011)

    Google Scholar 

  6. LeMay, E.: Adversary-driven state-based system security evaluation. Ph.D. thesis, University of Illinois at Urbana-Champaign, Urbana, Illinois (2011)

    Google Scholar 

  7. McLaughlin, S., Podkuiko, D., Miadzvezhanka, S., Delozier, A., McDaniel, P.: Multi-vendor penetration testing in the advanced metering infrastructure. In: Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC 2010, pp. 107–116. ACM, New York (2010)

    Google Scholar 

  8. Sanders, W.H., Meyer, J.F.: A unified approach for specifying measures of performance, dependability, and performability. In: Avizienis, A., Kopetz, H., Laprie, J. (eds.) Dependable Computing for Critical Applications. Dependable Computing and Fault-Tolerant Systems, vol. 4, pp. 215–237. Springer, Heidelberg (1991)

    Chapter  Google Scholar 

  9. Tabrizi, F.M., Pattabiraman, K.: A model-based intrusion detection system for smart meters. In: 2014 IEEE 15th International Symposium on High-Assurance Systems Engineering (HASE), pp. 17–24, January 2014

    Google Scholar 

  10. Möbius team: Möbius Documentation. University of Illinois at Urbana-Champaign, Urbana, IL (2014). https://www.mobius.illinois.edu/wiki/

Download references

Acknowledgments

The work described here was performed, in part, with funding from the Department of Homeland Security under contract HSHQDC-13-C-B0014, “Practical Metrics for Enterprise Security Engineering.” The authors would also like to thank Robin Berthier, Corky Parks, Carol Muehrcke, and the anonymous reviewers of this paper for their valuable advice, as well as Jenny Applequist for her editorial assistance.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michael Rausch .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Rausch, M., Feddersen, B., Keefe, K., Sanders, W.H. (2016). A Comparison of Different Intrusion Detection Approaches in an Advanced Metering Infrastructure Network Using ADVISE. In: Agha, G., Van Houdt, B. (eds) Quantitative Evaluation of Systems. QEST 2016. Lecture Notes in Computer Science(), vol 9826. Springer, Cham. https://doi.org/10.1007/978-3-319-43425-4_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-43425-4_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-43424-7

  • Online ISBN: 978-3-319-43425-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics