Abstract
The cyber attack risks are threatening the smart grid security. Malicious worm could spread from meter to meter to take out power in a simulated attack. The North American Electric Reliability Corporation (NERC) has thus developed several iterations of cyber security standards. According to the NERC cyber standards CIP-002-2 requirements, in this paper, we present cyber security risk analysis using computational intelligence methods and review on core methods, such as in risk assessment HHM, IIM, RFRM algorithms, fault analysis FTA, ETA, FMEA, FMECA algorithms, fuzzy sets, intrusion detection systems, artificial neural networks and artificial immune systems. Through the analysis of the core computational intelligence algorithms used in the smart grid cyber security in power system network security lab, we clearly defined existing smart grid research challenges.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Wang, J.W., Rong, L.L.: Cascade-based Attack Vulnerability on the US Power Grid. Security Science 47, 1332–1336 (2009)
Chen, G., Dong, Z.Y., David, J.H., Zhang, G.H., Hua, K.Q.: Attack Structural Vulnerability of Power Grids: A Hybrid Approach Based on Complex Networks. In: Physica A: Statistical Mechanics and its Applications, vol. 389, pp. 595–603. Elsevier, Amsterdam (2010)
Ettore, B., Roberto, N., Fei, X.: Analysis of Structural Vulnerabilities in Power Transmission Grids. International Journal of Critical Infrastructure Protection 2, 5–12 (2009)
John, S.: CIA Says Hackers Attack Global Power Grid. Info. Security 5, 9 (2009)
Bompard, E., Napoli, R.: Assessment of Information Impacts in Power System Security against Malicious Attacks in a General Framework. Reliability Engineering & System Safety 94, 1087–1094 (2009)
DNP3 Wikipedia, http://en.wikipedia.org/wiki/DNP3
Todd, M., Richard, C., Farhad, N.: Power System DNP3Data Object Security using Data Sets. Computers & Security (2009), doi:10.1016/j.cose.2009.10.001
Electric Power Research Institute, 2010 Research Portfolio (2010), http://portfolio.epri.com/
IEEE Smart Grid StandardsP2030, http://grouper.ieee.org/groups/scc21/dr_shared/2030/
IEEE Power Engineering Society, IEEE Standard 1402-2000: IEEE Guide for Electric Power Substation Physical and Electronic Security. IEEE, New York, NY (2000)
North American Electric Reliability Corporation, Reliability Standards of Cyber Security, http://www.nerc.com/page.php?cid=220
Smart Grid Device, http://earth2tech.files.wordpress.com/2008/04/silver-demo.jpg
Smart Grid Device Security, By Mike Davis - Senior Security Consultant at Black Hat USA (2009), http://www.blackhat.com/presentations/bh-usa-09/MDAVIS/BHUSA09-Davis-AMI-SLIDES.pdf
NERC Reliability Standards of Cyber Security: Standard CIP-002-3-Cyber Security- Critical Cyber Asset Identification, http://www.nerc.com/files/CIP-002-3.pdf
Ralston, P.A.S., Graham, J.H., Hieb, J.L.: Cyber Security Risk Assessment for SCADA and DCS Networks. ISA Transactions 46, 583–594 (2007)
Haimes, Y.Y.: Hierarchical Holographic Modeling. IEEE Transactions on Systems, IEEE System Man, and Cybernetics 11, 606–617 (1981)
Crowther, K.G., Haimes, Y.Y.: Application of the Inoperability Input–output Model (IIM) for Systemic Risk Assessment and Management of Interdependent Infrastructures. Systems Engineering, IEEE System Man, and Cybernetics 8, 323–341 (2005)
Haimes, Y.Y., Kaplan, S., Lambert, J.H.: Risk Filtering, Ranking, and Management Framework using Hierarchical Holographic Modeling. Risk Analysis 22, 381–395 (2002)
Fault Tree Analysis, http://www.fault-tree.net/
Event Tree Analysis, http://www.event-tree.com/
Failure Mode and Effects Analysis (FMEA) or Failure Mode, Effects, and Criticality Analysis (FMECA), http://www.fmea-fmeca.com/
de Ru, W.G., Eloff, J.H.P.: Risk Analysis Modelling with the use of Fuzzy Logic. Computers & Security 15, 239–248 (1996)
Chen, S.M., Chen, J.H.: Fuzzy Risk Analysis based on Similarity Measures Between Interval-valued Fuzzy Numbers and Interval-valued Fuzzy Number Arithmetic Operators. Expert Systems with Applications 36, 6309–6317 (2009)
Xu, Z.Y., Shang, S.C., Qian, W.B., Shu, W.H.: A Method for Fuzzy Risk Analysis Based on the New Similarity of Trapezoidal Fuzzy Numbers. Expert Systems with Applications 37, 1920–1927 (2010)
Wei, S.H., Chen, S.M.: A New Approach for Fuzzy Risk Analysis Based on Similarity Measures of Generalized Fuzzy Numbers. Expert Systems with Applications 36, 589–595 (2009)
Chen, S.M., Chen, J.H.: Fuzzy Risk Analysis Based on Ranking Generalized Fuzzy Numbers with Different Heights and Different Spreads. Expert Systems with Applications 36, 6833–6842 (2009)
Chen, S.M., Wang, C.H.: Fuzzy Risk Analysis Based on Ranking Fuzzy Numbers using α-cuts, Belief Features and Signal/Noise Ratios. Expert Systems with Applications 36, 5576–5581 (2009)
Lee, L.W., Chen, S.M.: Fuzzy Risk Analysis Based on Fuzzy Numbers with Different Shapes and Different Deviations. Expert Systems with Applications 34, 2763–2771 (2008)
Shelly, X.W., Wolfgang, B.: The Use of Computational Intelligence in Intrusion Detection Systems: A review. Applied Soft Computing 10, 1–35 (2010)
Xuan, D.H., Jiankun, H., Peter, B.: A Program-based Anomaly Intrusion Detection Scheme using Multiple Detection Engines and Fuzzy Inference. Journal of Network and Computer Applications 32, 1219–1228 (2009)
Abadeh, M.S., Habib, J., Lucas, C.: Intrusion Detection using a Fuzzy Genetics-based Learning Algorithm. Journal of Network and Computer Applications 30, 414–428 (2007)
Tsang, C.H., Kwong, S., Wang, H.L.: Genetic-Fuzzy Rule Mining Approach and Evaluation of Feature Selection Techniques for Anomaly Intrusion Detection. Pattern Recognition 40, 2373–2391 (2007)
Tajbakhsh, A., Rahmati, M., Mirzaei, A.: Intrusion Detection using Fuzzy Association Rules. Applied Soft Computing 9, 462–469 (2009)
Adel, N.T., Mohsen, K.: A New Approach to Intrusion Detection Based on an Evolutionary Soft Computing Model using Neuro-fuzzy Classifiers. Computer Communications 30, 2201–2212 (2007)
Wang, Y., Gu, D.W., Wen, M., Xu, J.P., Li, H.M.: Denial of Service Detection with Hybrid Fuzzy Set based Feed Forward Neural Network. In: Advances in Neural Networks-ISNN 2009. LNCS. Springer, Heidelberg (2009)
Wang, Y., Gu, D.W., Wen, M., Li, H.M., Xu, J.P.: Classification of Malicious Software Behaviour Detection with Hybrid Set based Feed Forward Neural Network. In: Advances in Neural Networks-ISNN 2009. LNCS. Springer, Heidelberg (2010)
Azadeh, A., Ghaderi, S.F., Anvari, M., Saberi, M.: Performance Assessment of Electric Power Generations Using an Adaptive Neural Network Algorithm. Energy Policy 35, 3155–3166 (2007)
Vakil-Baghmisheh, M.T., Razmi, H.: Dynamic Voltage Stability Assessment of Power Transmission Systems using Neural Networks. Energy Conversion and Management 49, 1–7 (2008)
Sawhney, H., Jeyasurya, B.: A Feed-forward Artificial Neural Network with Enhanced Feature Selection for Power System Transient Stability Assessment. Electric Power Systems Research 76, 1047–1054 (2006)
Balducelli, C.S., Lavalle, L., Vicoli, G.: Safeguarding Information Intensive Critical Infrastructures Against Novel Types of Emerging Failures. Reliability Engineering & System Safety 92, 1218–1229 (2007)
Research on the Characteristics of a Smart Grid by the NETL Modern Grid Strategy Team, http://www.netl.doe.gov/moderngrid/referenceshelf/articles/EC%20Self%20Heals_Renz_APPROVED_2008_12_02.pdf
Wang, Y., Gu, D.W., Xu, J.P., Du, H.Z.: Hacking Risk Analysis of Web Trojan in Electric Power System. In: Electric Power System, 2009 International Conference on Web Information Systems and Mining, pp. 1047–1054. IEEE Press, Los Alamitos (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, Y., Ruan, D., Xu, J., Wen, M., Deng, L. (2010). Computational Intelligence Algorithms Analysis for Smart Grid Cyber Security. In: Tan, Y., Shi, Y., Tan, K.C. (eds) Advances in Swarm Intelligence. ICSI 2010. Lecture Notes in Computer Science, vol 6146. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13498-2_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-13498-2_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13497-5
Online ISBN: 978-3-642-13498-2
eBook Packages: Computer ScienceComputer Science (R0)