{"title":"基于BLPC网络的网络攻击仿真与分析","authors":"Amin Danandeh Hesar, Mahmoud Ahmadian Attari","doi":"10.1109/SGC.2014.7150704","DOIUrl":null,"url":null,"abstract":"In this paper, at first, the main vulnerability of a BPLC network in the cyberspace of a home-area section is introduced. Then, we simulate several cyberattacks using a modified version of a NSL-KDD dataset that is applicable in any desired BPLC network. The nodes are mainly metering and controlling devices that handle the consumed Internet traffic plus electricity bill. The communicational protocol for our network is IEEE 1901 which is a standard protocol among broadband communication devices that work in a BPLC network. In the main part of our simulations, we have benefited from three types of Intrusion Detection Systems (IDS) using two Artificial Immune System (AIS) algorithms as well as an algorithm based on Support Vector Machines (SVM). At the end of our simulations, we compare these three Intrusion Detection Systems according to FPR, FNR, and DR criteria. Simulation results show that with our modified dataset and methods we can ensure a pretty high accuracy in intrusion detection and prevention in the home area of a desired BPLC network.","PeriodicalId":341696,"journal":{"name":"2014 Smart Grid Conference (SGC)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Simulating and analysis of cyber attacks on a BLPC network\",\"authors\":\"Amin Danandeh Hesar, Mahmoud Ahmadian Attari\",\"doi\":\"10.1109/SGC.2014.7150704\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, at first, the main vulnerability of a BPLC network in the cyberspace of a home-area section is introduced. Then, we simulate several cyberattacks using a modified version of a NSL-KDD dataset that is applicable in any desired BPLC network. The nodes are mainly metering and controlling devices that handle the consumed Internet traffic plus electricity bill. The communicational protocol for our network is IEEE 1901 which is a standard protocol among broadband communication devices that work in a BPLC network. In the main part of our simulations, we have benefited from three types of Intrusion Detection Systems (IDS) using two Artificial Immune System (AIS) algorithms as well as an algorithm based on Support Vector Machines (SVM). At the end of our simulations, we compare these three Intrusion Detection Systems according to FPR, FNR, and DR criteria. Simulation results show that with our modified dataset and methods we can ensure a pretty high accuracy in intrusion detection and prevention in the home area of a desired BPLC network.\",\"PeriodicalId\":341696,\"journal\":{\"name\":\"2014 Smart Grid Conference (SGC)\",\"volume\":\"128 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 Smart Grid Conference (SGC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SGC.2014.7150704\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Smart Grid Conference (SGC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SGC.2014.7150704","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Simulating and analysis of cyber attacks on a BLPC network
In this paper, at first, the main vulnerability of a BPLC network in the cyberspace of a home-area section is introduced. Then, we simulate several cyberattacks using a modified version of a NSL-KDD dataset that is applicable in any desired BPLC network. The nodes are mainly metering and controlling devices that handle the consumed Internet traffic plus electricity bill. The communicational protocol for our network is IEEE 1901 which is a standard protocol among broadband communication devices that work in a BPLC network. In the main part of our simulations, we have benefited from three types of Intrusion Detection Systems (IDS) using two Artificial Immune System (AIS) algorithms as well as an algorithm based on Support Vector Machines (SVM). At the end of our simulations, we compare these three Intrusion Detection Systems according to FPR, FNR, and DR criteria. Simulation results show that with our modified dataset and methods we can ensure a pretty high accuracy in intrusion detection and prevention in the home area of a desired BPLC network.