Skip to main content

Securing Advanced Metering Infrastructure Using Intrusion Detection System with Data Stream Mining

  • Conference paper
Intelligence and Security Informatics (PAISI 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7299))

Included in the following conference series:

Abstract

Advanced metering infrastructure (AMI) is an imperative component of the smart grid, as it is responsible for collecting, measuring, analyzing energy usage data, and transmitting these data to the data concentrator and then to a central system in the utility side. Therefore, the security of AMI is one of the most demanding issues in the smart grid implementation. In this paper, we propose an intrusion detection system (IDS) architecture for AMI which will act as a complimentary with other security measures. This IDS architecture consists of three local IDSs placed in smart meters, data concentrators, and central system (AMI headend). For detecting anomaly, we use data stream mining approach on the public KDD CUP 1999 data set for analysis the requirement of the three components in AMI. From our result and analysis, it shows stream data mining technique shows promising potential for solving security issues in AMI.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Baena-García, M., Campo-Avila, J.D., Fidalgo, R., Bifet, A., Gavaldà, R., Morales-Bueno, R.: Early Drift Detection Method. In: 4th International Workshop on Knowledge Discovery from Data Streams (IWKDDS 2006), pp. 77–86 (2006)

    Google Scholar 

  2. Bai, X., Meng, J., Zhu, N.: Functional Analysis of Advanced Metering Infrastructure in Smart Grid. In: 2010 International Conference on Power System Technology (POWERCON 2010), pp. 1–4 (2010)

    Google Scholar 

  3. Berthier, R., Sanders, W.H.: Specification-based Intrusion Detection for Advanced Metering Infrastructures. In: 17th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2011), Pasadena, California, USA (2011)

    Google Scholar 

  4. Berthier, R., Sanders, W.H., Khurana, H.: Intrusion Detection for Advanced Metering Infrastructures: Requirements and Architectural Directions. In: 1st IEEE International Conference on Smart Grid Communications (SmartGridComm 2010), pp. 350–355 (2010)

    Google Scholar 

  5. Bifet, A., Frank, E., Holmes, G., Pfahringer, B.: Accurate Ensembles for Data Streams: Combining Restricted HoeffdingTrees using Stacking. In: 2nd Asian Conference on Machine Learning (ACML 2010), pp. 225–240 (2010)

    Google Scholar 

  6. Bifet, A., Holmes, G., Pfahringer, B.: Leveraging Bagging for Evolving Data Streams. In: Balcázar, J.L., Bonchi, F., Gionis, A., Sebag, M. (eds.) ECML PKDD 2010. LNCS, vol. 6321, pp. 135–150. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  7. Bifet, A., Holmes, G., Pfahringer, B., Kranen, P., Kremer, H., Jansen, T., Seidl, T.: MOA: Massive Online Analysis, a Framework for Stream Classification and Clustering. In: JMLR Workshop and Conference Proceedings. Workshop on Applications of Pattern Analysis, vol. 11, pp. 44–50 (2008)

    Google Scholar 

  8. Chu, N.C.N., Williams, A., Alhajj, R., et al.: Data Stream Mining Architecture for Network Intrusion Detection. In: 2004 IEEE International Conference on Information Reuse and Integration (IRI 2004), pp. 363–368 (2004)

    Google Scholar 

  9. Cleveland, F.M.: Cyber Security Issues for Advanced Metering Infrasttructure (AMI). In: 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century, pp. 1–5 (2008)

    Google Scholar 

  10. Costache, M., Tudor, V., Almgren, M., Papatriantafilou, M., Saunders, C.: Remote Control of Smart Meters: Friend or Foe? In: 7th European Conference on Computer Network Defense (EC2ND 2011), Göteborg, Sweden (2011)

    Google Scholar 

  11. Data Concentrator in AMI, http://www.meworks.net/userfile/44670/DataConcentratorforAdvancedMeteringInfrastructureAMI_1.pdf

  12. FitzPatrick, G.J., Wollman, D.A.: NIST Interoperability Framework and Action Plans. In: 2010 IEEE Power and Energy Society General Meeting, pp. 1–4 (2010)

    Google Scholar 

  13. Gama, J., Medas, P., Castillo, G., Rodrigues, P.: Learning with Drift Detection. In: Bazzan, A.L.C., Labidi, S. (eds.) SBIA 2004. LNCS (LNAI), vol. 3171, pp. 286–295. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  14. Gama, J., Sebastião, R., Rodrigues, P.: Issues in Evaluation of Stream Learning Algorithms. In: 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2009), pp. 329–338 (2009)

    Google Scholar 

  15. Hulten, G., Spencer, L., Domingos, P.: Mining Time-changing Data Streams. In: 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2001), pp. 97–106 (2001)

    Google Scholar 

  16. KDD Cup 1999 Data, http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html

  17. Khan, M.U.: Anomaly Detection in Data Streams using Fuzzy Logic. In: 2009 International Conference on Information and Communication Technologies (ICICT 2009), pp. 167–174 (2009)

    Google Scholar 

  18. Kush, N., Foo, E., Ahmed, E., Ahmed, I., Clark, A.: Gap Analysis of Intrusion Detection in Smart Grids. In: 2nd International Cyber Resilience Conference (ICR 2011), pp. 38–46 (2011)

    Google Scholar 

  19. Li, Q., Zhao, F., Zhao, Y.: A Real-Time Architecture for NIDS Based on Sequence Analysis. In: 4th International Conference on Machine Learning and Cybernetics (ICMLC 2005), vol. 3, pp. 1893–1896 (2005)

    Google Scholar 

  20. Lu, Z., Lu, X., Wang, W., et al.: Review and Evaluation of Security Threats on the Communication Networks in the Smart Grid. In: 2010 Military Communications Conference (MILCOM 2010), pp. 1830–1835 (2010)

    Google Scholar 

  21. Massive Online Analysis, http://moa.cs.waikato.ac.nz

  22. McLaughlin, S., Podkuiko, D., McDaniel, P.: Energy Theft in the Advanced Metering Infrastructure. In: Rome, E., Bloomfield, R. (eds.) CRITIS 2009. LNCS, vol. 6027, pp. 176–187. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  23. Oh, S., Kang, J., Byun, Y., et al.: Intrusion Detection Based on Clustering a Data Stream. In: 3rd ACIS International Conference on Software Engineering Research, Management and Applications (SERA 2005), pp. 220–227 (2005)

    Google Scholar 

  24. Open Public Extended Network Metering, http://www.openmeter.com/

  25. Bifet, A., Gavaldà, R.: Learning from Time-Changing Data with Adaptive Windowing. In: 2007 SIAM International Conference on Data Mining (SDM 2007), Minneapolis, Minnesota, USA (2007)

    Google Scholar 

  26. Bifet, A., Holmes, G., Pfahringer, B., Kirkby, R., Gavaldà, R.: New Ensemble Methods For Evolving Data Streams. In: 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2009), pp. 139–148 (2009)

    Google Scholar 

  27. Shein, R.: Security Measures for Advanced Metering Infrastructure Components. In: 2010 Asia-Pacific Power and Energy Engineering Conference (APPEEC 2010), pp. 1–3 (2010)

    Google Scholar 

  28. Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A Detailed Analysis of the KDD CUP 99 Data Set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA 2009), pp. 1–6 (2009)

    Google Scholar 

  29. Zhang, Q., Huang, W.: Research on Data Mining Technologies Appling Intrusion Detection. In: 2010 IEEE International Conference on Emergency Management and Management Sciences (ICEMMS 2010), pp. 230–233 (2010)

    Google Scholar 

  30. Zhang, Y., Wang, L., Sun, W., et al.: Distributed Intrusion Detection System in a Multi-Layer Network Architecture of Smart Grids. IEEE Transactions on Smart Grid 2, 796–808 (2011)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Faisal, M.A., Aung, Z., Williams, J.R., Sanchez, A. (2012). Securing Advanced Metering Infrastructure Using Intrusion Detection System with Data Stream Mining. In: Chau, M., Wang, G.A., Yue, W.T., Chen, H. (eds) Intelligence and Security Informatics. PAISI 2012. Lecture Notes in Computer Science, vol 7299. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30428-6_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30428-6_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30427-9

  • Online ISBN: 978-3-642-30428-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics