基于BLPC网络的网络攻击仿真与分析

Amin Danandeh Hesar, Mahmoud Ahmadian Attari
{"title":"基于BLPC网络的网络攻击仿真与分析","authors":"Amin Danandeh Hesar, Mahmoud Ahmadian Attari","doi":"10.1109/SGC.2014.7150704","DOIUrl":null,"url":null,"abstract":"In this paper, at first, the main vulnerability of a BPLC network in the cyberspace of a home-area section is introduced. Then, we simulate several cyberattacks using a modified version of a NSL-KDD dataset that is applicable in any desired BPLC network. The nodes are mainly metering and controlling devices that handle the consumed Internet traffic plus electricity bill. The communicational protocol for our network is IEEE 1901 which is a standard protocol among broadband communication devices that work in a BPLC network. In the main part of our simulations, we have benefited from three types of Intrusion Detection Systems (IDS) using two Artificial Immune System (AIS) algorithms as well as an algorithm based on Support Vector Machines (SVM). At the end of our simulations, we compare these three Intrusion Detection Systems according to FPR, FNR, and DR criteria. Simulation results show that with our modified dataset and methods we can ensure a pretty high accuracy in intrusion detection and prevention in the home area of a desired BPLC network.","PeriodicalId":341696,"journal":{"name":"2014 Smart Grid Conference (SGC)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Simulating and analysis of cyber attacks on a BLPC network\",\"authors\":\"Amin Danandeh Hesar, Mahmoud Ahmadian Attari\",\"doi\":\"10.1109/SGC.2014.7150704\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, at first, the main vulnerability of a BPLC network in the cyberspace of a home-area section is introduced. Then, we simulate several cyberattacks using a modified version of a NSL-KDD dataset that is applicable in any desired BPLC network. The nodes are mainly metering and controlling devices that handle the consumed Internet traffic plus electricity bill. The communicational protocol for our network is IEEE 1901 which is a standard protocol among broadband communication devices that work in a BPLC network. In the main part of our simulations, we have benefited from three types of Intrusion Detection Systems (IDS) using two Artificial Immune System (AIS) algorithms as well as an algorithm based on Support Vector Machines (SVM). At the end of our simulations, we compare these three Intrusion Detection Systems according to FPR, FNR, and DR criteria. Simulation results show that with our modified dataset and methods we can ensure a pretty high accuracy in intrusion detection and prevention in the home area of a desired BPLC network.\",\"PeriodicalId\":341696,\"journal\":{\"name\":\"2014 Smart Grid Conference (SGC)\",\"volume\":\"128 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 Smart Grid Conference (SGC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SGC.2014.7150704\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Smart Grid Conference (SGC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SGC.2014.7150704","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

本文首先介绍了家庭区域网络空间中BPLC网络的主要漏洞。然后,我们使用NSL-KDD数据集的修改版本模拟了几种网络攻击,该数据集适用于任何期望的BPLC网络。节点主要是计量和控制设备,处理已消耗的互联网流量和电费。我们网络的通信协议是IEEE 1901,这是在BPLC网络中工作的宽带通信设备之间的标准协议。在我们的模拟的主要部分,我们受益于三种类型的入侵检测系统(IDS),使用两种人工免疫系统(AIS)算法以及基于支持向量机(SVM)的算法。在仿真的最后,我们根据FPR、FNR和DR标准对这三种入侵检测系统进行了比较。仿真结果表明,利用改进的数据集和方法,我们可以保证在理想的BPLC网络的主区域进行相当高的入侵检测和防御精度。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Simulating and analysis of cyber attacks on a BLPC network
In this paper, at first, the main vulnerability of a BPLC network in the cyberspace of a home-area section is introduced. Then, we simulate several cyberattacks using a modified version of a NSL-KDD dataset that is applicable in any desired BPLC network. The nodes are mainly metering and controlling devices that handle the consumed Internet traffic plus electricity bill. The communicational protocol for our network is IEEE 1901 which is a standard protocol among broadband communication devices that work in a BPLC network. In the main part of our simulations, we have benefited from three types of Intrusion Detection Systems (IDS) using two Artificial Immune System (AIS) algorithms as well as an algorithm based on Support Vector Machines (SVM). At the end of our simulations, we compare these three Intrusion Detection Systems according to FPR, FNR, and DR criteria. Simulation results show that with our modified dataset and methods we can ensure a pretty high accuracy in intrusion detection and prevention in the home area of a desired BPLC network.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Probabilistic optimal power dispatch in multi-microgrids using heuristic algorithms Investigating the impacts of wind power contribution on the short-term frequency performance Application of active management in operation of distribution network using NSGA II Simulating and analysis of cyber attacks on a BLPC network Impact of forecast accuracy on energy management of a virtual power plant
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1