Paper
19 October 2022 A fast and precise cyber attack detection method of power grid SCADA protocol
Wenzhe Zhang, Binquan Wang, Shaosen Li, Fuchuan Zhang, Shanfeng Chen
Author Affiliations +
Proceedings Volume 12294, 7th International Symposium on Advances in Electrical, Electronics, and Computer Engineering; 122945Q (2022) https://doi.org/10.1117/12.2641233
Event: 7th International Symposium on Advances in Electrical, Electronics and Computer Engineering (ISAEECE 2022), 2022, Xishuangbanna, China
Abstract
The existing cyber attack detection methods of power grid supervisory control and data acquisition system (SCADA) protocol suffer from the complicated models and high computation delay. In this paper, a fast and precise method is proposed. First of all, original protocol messages are captured from traffic and critical fields are seperated. Secondly, the features of network layer communication are extracted to construct a simple feature detection model. Thirdly, the attributes of application layer SCADA behavior are extracted to construct a time series anormaly detection model. Finally, cyber attacks are detected from the two-layer model. Experimental results: The recall rate is improved from 85.06% to 90.55% at least and computation delay is reduced from 10.58ms to 2.07ms significantly compared to three widely used detection methods. The performance of this detection method is demonstrated.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Wenzhe Zhang, Binquan Wang, Shaosen Li, Fuchuan Zhang, and Shanfeng Chen "A fast and precise cyber attack detection method of power grid SCADA protocol", Proc. SPIE 12294, 7th International Symposium on Advances in Electrical, Electronics, and Computer Engineering, 122945Q (19 October 2022); https://doi.org/10.1117/12.2641233
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Neural networks

Data mining

Network security

Computer simulations

Control systems

Mirrors

Operating systems

Back to Top