Abstract

In recent decades, cyber security issues in IEC 61850-compliant substation automation systems (SASs) have become growing concerns. Many researchers have developed various strategies to detect malicious behaviours of SASs during the system operational stage, such as anomaly-based detection. However, most existing anomaly-based detection methods identify an abnormal behaviour by checking every single network packet without any association. These traditional methods cannot effectively detect “stealthy” attacks which modify legitimate messages slightly while imitating patterns of benign behaviours. In this paper, we present feature selection and extraction methods to generalise and summarise critical features when detecting insider attacks triggering from untrusted control devices within SASs. By applying a sliding window-based sequential classification mechanism, our detection method can detect anomalies across multiple devices without the need to learn datasets collected from all devices. Firstly, to generalise critical features and summarise systems’ behaviours so that it is unnecessary to collect all datasets, we selected and extracted six critical network features from generic object-oriented substation events (GOOSE) messages and seven summarised physical features based on the general architecture of the primary plant of distribution substations. After that, to improve detection accuracy and reduce computational costs, we applied sliding window algorithms to divide datasets into different overlapped window-based snippets. Then we applied a sequential classification model based on Bidirectional Long Short-Term Memory networks to train and test those datasets. As a result, our method can detect insider attacks across multiple devices accurately with a false-negative rate of less than 1%.

Highlights

  • In recent decades, cyber security issues in IEC 61850compliant substation automation systems (SASs) have become growing concerns

  • The main objective was to train all benign behaviours and stealthy attack behaviours only triggered from IED1, and to detect the same insider attack behaviours generating from IED2

  • Since previous experimental results show that quantity-based algorithms are better than time-based algorithms, we only focused on the settings in quantity-based sliding window algorithms

Read more

Summary

Introduction

Cyber security issues in IEC 61850compliant substation automation systems (SASs) have become growing concerns. These knowledge-based methods can only detect known attacks [5]. Most existing anomaly-based detection methods identify an abnormal behaviour by checking every single network packet without any association between them. The IEC 61850-compliant SASs support various communication protocols, including legacy protocols (DNP3, Modbus), and new protocols (MMS, GOOSE, SV). Both legacy and new protocols are insecure due to improper authentication, lack of encryption, poor access control, and lack of integrity checks [18]

Results
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call