View : 653 Download: 168

Full metadata record

DC Field Value Language
dc.contributor.author채기준*
dc.date.accessioned2016-08-28T10:08:58Z-
dc.date.available2016-08-28T10:08:58Z-
dc.date.issued2012*
dc.identifier.issn1996-1073*
dc.identifier.otherOAK-9369*
dc.identifier.urihttps://dspace.ewha.ac.kr/handle/2015.oak/223136-
dc.description.abstractIn this paper, we analyze the Network and System Management (NSM) requirements and NSM data objects for the intrusion detection of power systems; NSM is an IEC 62351-7 standard. We analyze a SYN flood attack and a buffer overflow attack to cause the Denial of Service (DoS) attack described in NSM. After mounting the attack in our attack testbed, we collect a data set, which is based on attributes for the attack. We then run several data mining methods with the data set using the Waikato Environment for Knowledge Analysis (WEKA). In the results, we select the decision tree algorithms with high detection rates, and choose key attributes in high level components of the trees. When we run several data mining methods again with the data set of chosen key attributes, the detection rates of most data mining methods are higher than before. We prove that our selected attack attributes, and the proposed detection process, are efficient and suitable for intrusion detection in the smart grid environment. © 2012 by the authors.*
dc.languageEnglish*
dc.titleIntrusion detection of NSM based DoS attacks using data mining in smart grid*
dc.typeArticle*
dc.relation.issue10*
dc.relation.volume5*
dc.relation.indexSCIE*
dc.relation.indexSCOPUS*
dc.relation.startpage4091*
dc.relation.lastpage4109*
dc.relation.journaltitleEnergies*
dc.identifier.doi10.3390/en5104091*
dc.identifier.wosidWOS:000310563000022*
dc.identifier.scopusid2-s2.0-84870360312*
dc.author.googleChoi K.*
dc.author.googleChen X.*
dc.author.googleLi S.*
dc.author.googleKim M.*
dc.author.googleChae K.*
dc.author.googleNa J.C.*
dc.contributor.scopusid채기준(7102584247)*
dc.date.modifydate20240322133135*


qrcode

BROWSE