Author:
Tian Jianwei,Yu Zongchao,Liu Li,Wu Weidong,Zhu Hongyu,Liu Xuan
Abstract
Smart Substation becomes more vulnerable to cyber attacks due to the high integration of information technologies, so it is essential to detect intrusion behaviour by abnormal traffic analysis in smart substations. Although there have been many detection methods for abnormal traffic, the existing ones all focus on the format check of a single field of the industrial transmission protocol, and ignore the deep coupling relationships among multiple protocol fields, which lead to more or less false detections and missed detections. To overcome this problem and further improve the detection accuracy, in this paper, we propose an abnormal traffic detection method based on the coupling field extraction and the density-based spatial clustering of applications with noise (DBSCAN). By using correlation analysis to extract the coupling fields of the protocol fields and using DBSCAN to remove the noise in the coupling fields, the deep coupling relationship between the coupling fields can be mined by the piecewise linear function fitting method, and used to detect abnormal traffic. The simulation results on 10,000 frames traffic prove that the proposed detection method can effectively identify the abnormal traffic.
Reference16 articles.
1. He R., Xie H., Deng J., Feng T., Lai L. L. and Shahidehpour M., “Reliability Modeling and Assessment of Cyber Space in Cyber-Physical Power Systems,” IEEE Trans. Smart Grid, 11, 5, (2020)
2. Liu W., Gong Q., Han H., Wang Z. and Wang L., “Reliability Modeling and Evaluation of Active Cyber Physical Distribution System,” IEEE Trans. Power Syst., 33, 6, (2018)
3. Telecontrol Equipment and Systems—Part 5-104: Transmission Protocols—Network Access for IeC 60870-5-101 Using Standard Transport Profiles, IEC Standard 60870, (2006)
4. Han G., Xu B. and Suonan J., “IEC 61850-Based Feeder Terminal Unit Modeling and Mapping to IEC 60870-5-104,” IEEE Trans. Power Del., 27, 4, (2012)
5. Valenzuela J., Wang J. and Bissinger N., “Real-time intrusion detection in power system operations,” IEEE Trans. Power Syst., 28, 2, (2013)