Skip to main content

Big Data-Based Attack Scenario Reconstruction Architecture in Smart Grid

  • Conference paper
  • First Online:
Communications, Signal Processing, and Systems (CSPS 2018)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 517))

  • 2368 Accesses

Abstract

The intelligence of power grids has made the relationship between distribution networks and the Internet more and more compact. Therefore, in order to cope with the various threats in the situation of smart grid, it is necessary to study from multiple perspectives. Among them, attack scenario reconstruction is a more effective method of network security defense. However, the existing attack scenario reconstruction technology is not combined with the actual situation of the power grid. In this paper, we proposed a grid-based attack scenario reconstruction framework which is based on big data. The framework consists of KNN-based attack data classification and state machine-based attack scenario restoration. In addition, we also implemented prototypes and evaluated the effectiveness and availability of databases provided by IDS in China Grid Corporation. The results show that the framework proposed in this paper improves the efficiency and accuracy of analyzing attacker strategies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yu, J., Fang, C., Lu, L., Li, Z.: Mitigating application layer distributed denial of service attacks via effective trust management. AIET Commun. 4(16), 1952–1962 (2010)

    Google Scholar 

  2. Wang, K., Li, H., Feng, Y., Tian, G.: Big data analytics for system stability evaluation strategy in the energy Internet. IEEE Trans. Ind. Inform. (2017). https://doi.org/10.1109/TII.2017.2692775

  3. Vimalkumar, K., Radhika, N.: A novel model for detecting application layer DDoS attacks. In: International Conference on Advances in Computing, Communications and Informatics, pp. 198–204 (2017)

    Google Scholar 

  4. Adhikari, U., Morris, T.H., Pan, S.: A causal event graph for cyber-power system events using synchrophasor. In: PES General Meeting Conference Exposition, pp. 1–5 (2017)

    Google Scholar 

  5. Hinton, G.E., Osindero, S., Teh, Y.-W.: A fast learning algorithm for deep belief nets. Neural Comput. 18(7), 1527–1554 (2006)

    Google Scholar 

  6. Sukhbaatar, S., Makino, T., Aihara, K., Chikayama, T.: Robust generation of dynamical patterns in human motion by a deep belief nets. J. Mach. Learn. Res. 20, 231–246 (2011)

    Google Scholar 

  7. Campo, G.L., Cristina, C., de Diego, I.M., Enrique, C.: Detecting denial of service by modeling web-sever behavior. Comput. Electr. Eng. 39(7), 2252–2262 (2013)

    Google Scholar 

  8. Prasanna, K., Seetha, M., Siva, A.: CApriori: conviction based apriori algorithm for discovering frequent determinant patterns from high dimensional datasets. In: 2014 International Conference on Science Engineering and Management Research (ICSEMR) (2014)

    Google Scholar 

  9. Mao, X., Zhao, G., Sun, R.: Naive Bayesian algorithm classification model with local attribute weighted based on KNN. In: Information Technology, Networking, Electronic and Automation Control Conference, pp. 904–908. IEEE (2017)

    Google Scholar 

  10. Luna, J., Cano, A., Pechenizkiy, M., Ventura, S.: Speeding-up association rule mining with inverted index compression. IEEE Trans. Cybern. 46(12), 3059–3072 (2016)

    Article  Google Scholar 

  11. Li, K., Xie, P., Zhai, J., et al.: An improved AdaBoost algorithm for imbalanced data based on weighted KNN. In: International Conference on Big Data Analysis, pp. 30–34. IEEE (2017)

    Google Scholar 

  12. Ma, X., Liu, F., Qi, Y., Wang, X.: A multiobjective evolutionary algorithm based on decision variable analyses for multiobjective optimization problems with large-scale variables. IEEE Trans. Evol. Comput. 20(2), 275–298 (2016)

    Article  Google Scholar 

  13. Ao, W., Song, Y., Wen, C.: Distributed robust attack detection and reconstruction for a class of uncertain nonlinear interconnected CPSs. In: International Conference on Collaboration Technologies and Systems, pp. 1819–1824. IEEE (2016)

    Google Scholar 

  14. Wang, K., Shao, Y., Shu, L., Han, G., Zhu, C.: LDPA: a local data processing architecture in ambient assisted living communications. IEEE Commun. Mag. 53(1), 56–63 (2015)

    Article  Google Scholar 

  15. Zhu, L., Li, M., Zhang, Z., et al.: Big data mining of users energy consumption patterns in the wireless smart grid. IEEE Wirel. Commun. 25(1), 84–89 (2018)

    Google Scholar 

Download references

Acknowledgements

The work is supported by State Grid Corporation of China Science and Technology Project: Research on Unknown Security Threat Detection Technology Based on Big Data Analysis (No. SGJSXT00JFJS1700101).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Liang Guo or Qianqian Jin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Guo, L., Jin, Q., Liu, Y., Xia, Y., Hu, H. (2020). Big Data-Based Attack Scenario Reconstruction Architecture in Smart Grid. In: Liang, Q., Liu, X., Na, Z., Wang, W., Mu, J., Zhang, B. (eds) Communications, Signal Processing, and Systems. CSPS 2018. Lecture Notes in Electrical Engineering, vol 517. Springer, Singapore. https://doi.org/10.1007/978-981-13-6508-9_141

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-6508-9_141

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-6507-2

  • Online ISBN: 978-981-13-6508-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics