Graph Theory and Classifying Security Events in Grid Security Gateways

Author:

Obert James1,Chavez Adrian1

Affiliation:

1. Sandia National Labs, Albuquerque, NM, USA

Abstract

In recent years, the use of security gateways (SG) located within the electrical grid distribution network has become pervasive. SGs in substations and renewable distributed energy resource aggregators (DERAs) protect power distribution control devices from cyber and cyber-physical attacks. When encrypted communications within a DER network is used, TCP/IP packet inspection is restricted to packet header behavioral analysis which in most cases only allows the SG to perform anomaly detection of blocks of time-series data (event windows). Packet header anomaly detection calculates the probability of the presence of a threat within an event window, but fails in such cases where the unreadable encrypted payload contains the attack content. The SG system log (syslog) is a time-series record of behavioral patterns of network users and processes accessing and transferring data through the SG network interfaces. Threatening behavioral pattern in the syslog are measurable using both anomaly detection and graph theory. In this paper, it will be shown that it is possible to efficiently detect the presence of and classify a potential threat within an SG syslog using light-weight anomaly detection and graph theory.

Publisher

World Scientific Pub Co Pte Lt

Subject

Artificial Intelligence,Computer Networks and Communications,Computer Science Applications,Linguistics and Language,Information Systems,Software

Reference13 articles.

1. SSH over SCTP — Optimizing a multi-channel protocol by adapting it to SCTP

2. J. Håvard, J. Dag, R. Robbert van, V. Hein, E. Mariki, L. Les, E. Jan and S. Rossouw von (eds.), New Approaches for Security, Privacy and Trust in Complex Environments, IFIP International Federation for Information Processing (Springer US, 2007), pp. 373–384.

3. J. Giermanski, Global Supply Chain Security (Scarecrow Press, 2012) 218 p.

Cited by 3 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. A Microgrid Security Defense Method Based on Cooperation in an Edge-Computing Environment;Journal of Electrical and Computer Engineering;2023-05-05

2. Power system abnormal pattern detection for new energy big data;International Journal of Emerging Electric Power Systems;2022-11-07

3. Computer User Behavior Anomaly Detection Based on K-Means Algorithm;Security and Communication Networks;2022-05-24

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3