Skip to main content

Computational Intelligence Algorithms Analysis for Smart Grid Cyber Security

  • Conference paper
Advances in Swarm Intelligence (ICSI 2010)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 6146))

Included in the following conference series:

Abstract

The cyber attack risks are threatening the smart grid security. Malicious worm could spread from meter to meter to take out power in a simulated attack. The North American Electric Reliability Corporation (NERC) has thus developed several iterations of cyber security standards. According to the NERC cyber standards CIP-002-2 requirements, in this paper, we present cyber security risk analysis using computational intelligence methods and review on core methods, such as in risk assessment HHM, IIM, RFRM algorithms, fault analysis FTA, ETA, FMEA, FMECA algorithms, fuzzy sets, intrusion detection systems, artificial neural networks and artificial immune systems. Through the analysis of the core computational intelligence algorithms used in the smart grid cyber security in power system network security lab, we clearly defined existing smart grid research challenges.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wang, J.W., Rong, L.L.: Cascade-based Attack Vulnerability on the US Power Grid. Security Science 47, 1332–1336 (2009)

    Google Scholar 

  2. Chen, G., Dong, Z.Y., David, J.H., Zhang, G.H., Hua, K.Q.: Attack Structural Vulnerability of Power Grids: A Hybrid Approach Based on Complex Networks. In: Physica A: Statistical Mechanics and its Applications, vol. 389, pp. 595–603. Elsevier, Amsterdam (2010)

    Google Scholar 

  3. Ettore, B., Roberto, N., Fei, X.: Analysis of Structural Vulnerabilities in Power Transmission Grids. International Journal of Critical Infrastructure Protection 2, 5–12 (2009)

    Article  Google Scholar 

  4. John, S.: CIA Says Hackers Attack Global Power Grid. Info. Security 5, 9 (2009)

    Google Scholar 

  5. Bompard, E., Napoli, R.: Assessment of Information Impacts in Power System Security against Malicious Attacks in a General Framework. Reliability Engineering & System Safety 94, 1087–1094 (2009)

    Article  Google Scholar 

  6. DNP3 Wikipedia, http://en.wikipedia.org/wiki/DNP3

  7. Todd, M., Richard, C., Farhad, N.: Power System DNP3Data Object Security using Data Sets. Computers & Security (2009), doi:10.1016/j.cose.2009.10.001

    Google Scholar 

  8. Electric Power Research Institute, 2010 Research Portfolio (2010), http://portfolio.epri.com/

  9. IEEE Smart Grid StandardsP2030, http://grouper.ieee.org/groups/scc21/dr_shared/2030/

  10. IEEE Power Engineering Society, IEEE Standard 1402-2000: IEEE Guide for Electric Power Substation Physical and Electronic Security. IEEE, New York, NY (2000)

    Google Scholar 

  11. North American Electric Reliability Corporation, Reliability Standards of Cyber Security, http://www.nerc.com/page.php?cid=220

  12. Smart Grid Device, http://earth2tech.files.wordpress.com/2008/04/silver-demo.jpg

  13. Smart Grid Device Security, By Mike Davis - Senior Security Consultant at Black Hat USA (2009), http://www.blackhat.com/presentations/bh-usa-09/MDAVIS/BHUSA09-Davis-AMI-SLIDES.pdf

  14. NERC Reliability Standards of Cyber Security: Standard CIP-002-3-Cyber Security- Critical Cyber Asset Identification, http://www.nerc.com/files/CIP-002-3.pdf

  15. Ralston, P.A.S., Graham, J.H., Hieb, J.L.: Cyber Security Risk Assessment for SCADA and DCS Networks. ISA Transactions 46, 583–594 (2007)

    Article  Google Scholar 

  16. Haimes, Y.Y.: Hierarchical Holographic Modeling. IEEE Transactions on Systems, IEEE System Man, and Cybernetics 11, 606–617 (1981)

    Article  MathSciNet  Google Scholar 

  17. Crowther, K.G., Haimes, Y.Y.: Application of the Inoperability Input–output Model (IIM) for Systemic Risk Assessment and Management of Interdependent Infrastructures. Systems Engineering, IEEE System Man, and Cybernetics 8, 323–341 (2005)

    Google Scholar 

  18. Haimes, Y.Y., Kaplan, S., Lambert, J.H.: Risk Filtering, Ranking, and Management Framework using Hierarchical Holographic Modeling. Risk Analysis 22, 381–395 (2002)

    Google Scholar 

  19. Fault Tree Analysis, http://www.fault-tree.net/

  20. Event Tree Analysis, http://www.event-tree.com/

  21. Failure Mode and Effects Analysis (FMEA) or Failure Mode, Effects, and Criticality Analysis (FMECA), http://www.fmea-fmeca.com/

  22. de Ru, W.G., Eloff, J.H.P.: Risk Analysis Modelling with the use of Fuzzy Logic. Computers & Security 15, 239–248 (1996)

    Article  Google Scholar 

  23. Chen, S.M., Chen, J.H.: Fuzzy Risk Analysis based on Similarity Measures Between Interval-valued Fuzzy Numbers and Interval-valued Fuzzy Number Arithmetic Operators. Expert Systems with Applications 36, 6309–6317 (2009)

    Article  Google Scholar 

  24. Xu, Z.Y., Shang, S.C., Qian, W.B., Shu, W.H.: A Method for Fuzzy Risk Analysis Based on the New Similarity of Trapezoidal Fuzzy Numbers. Expert Systems with Applications 37, 1920–1927 (2010)

    Article  Google Scholar 

  25. Wei, S.H., Chen, S.M.: A New Approach for Fuzzy Risk Analysis Based on Similarity Measures of Generalized Fuzzy Numbers. Expert Systems with Applications 36, 589–595 (2009)

    Article  MathSciNet  Google Scholar 

  26. Chen, S.M., Chen, J.H.: Fuzzy Risk Analysis Based on Ranking Generalized Fuzzy Numbers with Different Heights and Different Spreads. Expert Systems with Applications 36, 6833–6842 (2009)

    Article  Google Scholar 

  27. Chen, S.M., Wang, C.H.: Fuzzy Risk Analysis Based on Ranking Fuzzy Numbers using α-cuts, Belief Features and Signal/Noise Ratios. Expert Systems with Applications 36, 5576–5581 (2009)

    Article  Google Scholar 

  28. Lee, L.W., Chen, S.M.: Fuzzy Risk Analysis Based on Fuzzy Numbers with Different Shapes and Different Deviations. Expert Systems with Applications 34, 2763–2771 (2008)

    Article  MathSciNet  Google Scholar 

  29. Shelly, X.W., Wolfgang, B.: The Use of Computational Intelligence in Intrusion Detection Systems: A review. Applied Soft Computing 10, 1–35 (2010)

    Article  Google Scholar 

  30. Xuan, D.H., Jiankun, H., Peter, B.: A Program-based Anomaly Intrusion Detection Scheme using Multiple Detection Engines and Fuzzy Inference. Journal of Network and Computer Applications 32, 1219–1228 (2009)

    Article  Google Scholar 

  31. Abadeh, M.S., Habib, J., Lucas, C.: Intrusion Detection using a Fuzzy Genetics-based Learning Algorithm. Journal of Network and Computer Applications 30, 414–428 (2007)

    Article  Google Scholar 

  32. Tsang, C.H., Kwong, S., Wang, H.L.: Genetic-Fuzzy Rule Mining Approach and Evaluation of Feature Selection Techniques for Anomaly Intrusion Detection. Pattern Recognition 40, 2373–2391 (2007)

    Article  MATH  Google Scholar 

  33. Tajbakhsh, A., Rahmati, M., Mirzaei, A.: Intrusion Detection using Fuzzy Association Rules. Applied Soft Computing 9, 462–469 (2009)

    Article  Google Scholar 

  34. Adel, N.T., Mohsen, K.: A New Approach to Intrusion Detection Based on an Evolutionary Soft Computing Model using Neuro-fuzzy Classifiers. Computer Communications 30, 2201–2212 (2007)

    Article  Google Scholar 

  35. Wang, Y., Gu, D.W., Wen, M., Xu, J.P., Li, H.M.: Denial of Service Detection with Hybrid Fuzzy Set based Feed Forward Neural Network. In: Advances in Neural Networks-ISNN 2009. LNCS. Springer, Heidelberg (2009)

    Google Scholar 

  36. Wang, Y., Gu, D.W., Wen, M., Li, H.M., Xu, J.P.: Classification of Malicious Software Behaviour Detection with Hybrid Set based Feed Forward Neural Network. In: Advances in Neural Networks-ISNN 2009. LNCS. Springer, Heidelberg (2010)

    Google Scholar 

  37. Azadeh, A., Ghaderi, S.F., Anvari, M., Saberi, M.: Performance Assessment of Electric Power Generations Using an Adaptive Neural Network Algorithm. Energy Policy 35, 3155–3166 (2007)

    Article  Google Scholar 

  38. Vakil-Baghmisheh, M.T., Razmi, H.: Dynamic Voltage Stability Assessment of Power Transmission Systems using Neural Networks. Energy Conversion and Management 49, 1–7 (2008)

    Article  Google Scholar 

  39. Sawhney, H., Jeyasurya, B.: A Feed-forward Artificial Neural Network with Enhanced Feature Selection for Power System Transient Stability Assessment. Electric Power Systems Research 76, 1047–1054 (2006)

    Article  Google Scholar 

  40. Balducelli, C.S., Lavalle, L., Vicoli, G.: Safeguarding Information Intensive Critical Infrastructures Against Novel Types of Emerging Failures. Reliability Engineering & System Safety 92, 1218–1229 (2007)

    Article  Google Scholar 

  41. Research on the Characteristics of a Smart Grid by the NETL Modern Grid Strategy Team, http://www.netl.doe.gov/moderngrid/referenceshelf/articles/EC%20Self%20Heals_Renz_APPROVED_2008_12_02.pdf

  42. Wang, Y., Gu, D.W., Xu, J.P., Du, H.Z.: Hacking Risk Analysis of Web Trojan in Electric Power System. In: Electric Power System, 2009 International Conference on Web Information Systems and Mining, pp. 1047–1054. IEEE Press, Los Alamitos (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, Y., Ruan, D., Xu, J., Wen, M., Deng, L. (2010). Computational Intelligence Algorithms Analysis for Smart Grid Cyber Security. In: Tan, Y., Shi, Y., Tan, K.C. (eds) Advances in Swarm Intelligence. ICSI 2010. Lecture Notes in Computer Science, vol 6146. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13498-2_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-13498-2_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-13497-5

  • Online ISBN: 978-3-642-13498-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics