Skip to main content

Cyber Attack Detection and Trust Management Toolkit for Defence-Related Microgrids

  • Conference paper
  • First Online:
Artificial Intelligence Applications and Innovations. AIAI 2021 IFIP WG 12.5 International Workshops (AIAI 2021)

Abstract

The rise of microgrids in defence applications, as a greener, more economical and efficient source of energy and the consequential softwarization of networks, has led to the emerge of various cyber-threats. The danger of cyber-attacks in defence microgrid facilities cannot be neglected nor undermined, due to the severe consequences that they can cause. To this end, this paper presents a cyberattack detection and cyber attack severity calculation toolkit, with the aim to provide an end-to-end solution to the cyberattack detection in defense IoT/microgrid systems. Concretely, in this paper are presented and evaluated the SPEAR Visual Analytics AI Engine and the SPEAR Grid Trusted Module (GTM) of the SPEAR H2020 project. The aim of the Visual Analytics AI Engine is to detect malicious action that intend to harm the microgrid and to assist the security engineer of an infrastructure to easily detect abnormalities and submit security events accordingly, while the GTM is responsible to calculate the severity of each security event and to assigns trust values to the affected assets of the system. The accurate detection of cyber-attacks and the efficient reputation management, are assessed with data from a real smart home infrastructure with an installed nanogrid, after applying a 3-stage attack against the MODBUS/TCP protocol used by some of the core nanogrid devices.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Home page - spear project: https://www.spear2020.eu/. Accessed 26 Mar 2021

  2. Ossim: The open source siem, alienvault: https://cybersecurity.att.com/products/ossim. Accessed 04 Mar 2021

  3. Scikit-fuzzy - skfuzzy v0.2 docs: https://pythonhosted.org/scikit-fuzzy/overview.html. Accessed 24 Mar 2021

  4. scikit-learn: machine learning in python - scikit-learn 0.24.1 documentation: https://scikit-learn.org/stable/. Accessed 29 Mar 2021

  5. Wireshark \(\cdot \) display filter reference: Modbus: https://www.wireshark.org/docs/dfref/m/modbus.html. Accessed 29 Mar 2021

  6. wireshark -google: https://www.wireshark.com. Accessed 29 Mar 2021

  7. Abadi, M., Agarwal, A., Barham, P., et al.: TensorFlow: large-scale machine learning on heterogeneous systems (2015). https://www.tensorflow.org/. software available from tensorflow.org

  8. Beg, O.A., Yadav, A.P., Johnson, T.T., Davoudi, A.: Formal online resiliency monitoring in microgrids. In: 2020 Resilience Week (RWS), pp. 99–105 (2020)

    Google Scholar 

  9. Beg, O.A., Nguyen, L.V., Johnson, T.T., Davoudi, A.: Cyber-physical anomaly detection in microgrids using time-frequency logic formalism. IEEE Access 9, 20012–20021 (2021)

    Article  Google Scholar 

  10. Berardi, U., Tomassoni, E., Khaled, K.: A smart hybrid energy system grid for energy efficiency in remote areas for the army. Energies 13(9), 2279 (2020)

    Article  Google Scholar 

  11. Borghesi, A., Bartolini, A., Lombardi, M., Milano, M., Benini, L.: Anomaly detection using autoencoders in high performance computing systems. Proc. AAAI Conf. Artif. Intell. 33, 9428–9433 (2019)

    Google Scholar 

  12. Canaan, B., Colicchio, B., Ould Abdeslam, D.: Microgrid cyber-security: Review and challenges toward resilience. Appl. Sci. 10(16), 5649 (2020)

    Article  Google Scholar 

  13. Grammatikis, P.R., et al.: Secure and private smart grid: the spear architecture. In: 2020 6th IEEE Conference on Network Softwarization (NetSoft), pp. 450–456. IEEE (2020)

    Google Scholar 

  14. Hadjichristofi, G., Varveris, G.: Visualizing and aggregating behavior for trust evaluation. In: 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), pp. 1–6. IEEE (2019)

    Google Scholar 

  15. Kashem, S.B.A., De Souza, S., Iqbal, A., Ahmed, J.: Microgrid in military applications. In: 2018 IEEE 12th International Conference on Compatibility, Power Electronics and Power Engineering (CPE-POWERENG 2018), pp. 1–5. IEEE (2018)

    Google Scholar 

  16. Kavousi-Fard, A., Su, W., Jin, T.: A machine-learning-based cyber attack detection model for wireless sensor networks in microgrids. IEEE Trans. Industr. Inf. 17(1), 650–658 (2020)

    Article  Google Scholar 

  17. Lamb, A., Goyal, A., Zhang, Y., Zhang, S., Courville, A., Bengio, Y.: Professor forcing: a new algorithm for training recurrent networks (2016). arXiv preprint arXiv:1610.09038

  18. Lu, L.Y., Liu, H.J., Zhu, H., Chu, C.C.: Intrusion detection in distributed frequency control of isolated microgrids. IEEE Trans. Smart Grid 10(6), 6502–6515 (2019)

    Article  Google Scholar 

  19. Mamdani, E.H., Assilian, S.: An experiment in linguistic synthesis with a fuzzy logic controller. Int. J. Man Mach. Stud. 7(1), 1–13 (1975)

    Article  Google Scholar 

  20. Muralidhar, N., Wang, C., Self, N., Momtazpour, M., Nakayama, K., Sharma, R., Ramakrishnan, N.: illiad: Intelligent invariant and anomaly detection in cyber-physical systems. ACM Trans. Intell. Syst. Technol. (TIST) 9(3), 1–20 (2018)

    Article  Google Scholar 

  21. Mustafa, A., Poudel, B., Bidram, A., Modares, H.: Detection and mitigation of data manipulation attacks in AC microgrids. IEEE Trans. Smart Grid 11(3), 2588–2603 (2019)

    Article  Google Scholar 

  22. Opitz, D., Maclin, R.: Popular ensemble methods: an empirical study. J. Artif. Intell. Res. 11, 169–198 (1999)

    Article  Google Scholar 

  23. Shi, D., Lin, P., Wang, Y., Chu, C.C., Xu, Y., Wang, P.: Deception attack detection of isolated DC microgrids under consensus-based distributed voltage control architecture. IEEE J. Emerg. Sel. Top. Circuits Syst. 11(1), 155–167 (2021)

    Google Scholar 

  24. Tsolakis, A.C., et al.: Design and real-life deployment of a smart nanogrid: a greek case study. In: 2020 IEEE International Conference on Power and Energy (PECon), pp. 321–326 (2020)

    Google Scholar 

  25. Zimmerer, D., Kohl, S.A., Petersen, J., Isensee, F., Maier-Hein, K.H.: Context-encoding variational autoencoder for unsupervised anomaly detection (2018). arXiv preprint arXiv:1812.05941

Download references

Acknowledgement

The aforementioned work effort in this paper is conducted under the framework of the SPEAR project, a Horizon 2020 program, funded by the European Union under the grant agreement No. 787011.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kotsiopoulos Thanasis .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Charalampos-Rafail, M., Thanasis, K., Vasileios, V., Dimosthenis, I., Dimitrios, T., Panagiotis, S. (2021). Cyber Attack Detection and Trust Management Toolkit for Defence-Related Microgrids. In: Maglogiannis, I., Macintyre, J., Iliadis, L. (eds) Artificial Intelligence Applications and Innovations. AIAI 2021 IFIP WG 12.5 International Workshops. AIAI 2021. IFIP Advances in Information and Communication Technology, vol 628. Springer, Cham. https://doi.org/10.1007/978-3-030-79157-5_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-79157-5_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-79156-8

  • Online ISBN: 978-3-030-79157-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics