首页> 外文会议>Conference on Resilience Week >D-IDS for Cyber-Physical DER Modbus System - Architecture, Modeling, Testbed-based Evaluation
【24h】

D-IDS for Cyber-Physical DER Modbus System - Architecture, Modeling, Testbed-based Evaluation

机译:用于网络物理DER Modbus系统的D-IDS-体系结构,建模,基于测试平台的评估

获取原文

摘要

Increasing penetration of distributed energy resources (DERs) in distribution networks expands the cyberattack surface. Moreover, the widely used standard protocols for communicating DER inverters such as Modbus is more vulnerable to data-integrity attacks and denial of service (DoS) attacks because of its native clear-text packet format. This paper proposes a distributed intrusion detection system (D-IDS) architecture and algorithms for detecting anomalies on the DER Modbus communication. We devised a model-based approach to define physics-based threshold bands for analog data points and transaction-based threshold bands for both the analog and discrete data points. The proposed IDS algorithm uses the model- based approach to develop Modbus-specific IDS rule sets, which can enhance the detection accuracy of the anomalies either by data-integrity attacks or maloperation on cyber-physical DER Modbus devices. Further, the IDS algorithm autogenerates the Modbus-specific IDS rulesets in compliance with various open- source IDS rule syntax formats, such as Snort and Suricata, for seamless integration and mitigation of semantic/syntax errors in the development and production environment. We considered the IEEE 13-bus distribution grid, including DERs, as a case study. We conducted various DoS type attacks and data-integrity attacks on the hardware-in-the-loop (HIL) CPS DER testbed at ISU to evaluate the proposed D-IDS. Consequently, we computed the performance metrics such as IDS detection accuracy, IDS detection rate, and end-to-end latency. The results demonstrated that 100% detection accuracy, 100% detection rate for 60k DoS packets, 99.96% detection rate for 80k DoS packets, and 0.25 ms end-to-end latency between DERs to Control Center.
机译:分布式能源在分布式网络中的渗透率不断提高,扩大了网络攻击的范围。此外,由于其固有的明文数据包格式,用于通信DER逆变器(如Modbus)的广泛使用的标准协议更容易受到数据完整性攻击和拒绝服务(DoS)攻击的影响。本文提出了一种分布式入侵检测系统(D-IDS)的体系结构和算法,用于检测DER Modbus通信中的异常情况。我们设计了一种基于模型的方法来为模拟数据点定义基于物理的阈值带,为模拟和离散数据点定义基于事务的阈值带。提出的IDS算法使用基于模型的方法来开发特定于Modbus的IDS规则集,该规则集可以通过数据完整性攻击或对网络物理DER Modbus设备的误操作来提高异常检测的准确性。此外,IDS算法会根据各种开源IDS规则语法格式(例如Snort和Suricata)自动生成特定于Modbus的IDS规则集,以便在开发和生产环境中无缝集成和缓解语义/语法错误。我们以IEEE 13总线配电网(包括DER)为例进行了研究。我们在ISU的硬件在环(HIL)CPS DER测试床上进行了各种DoS类型攻击和数据完整性攻击,以评估建议的D-IDS。因此,我们计算了性能指标,例如IDS检测准确性,IDS检测率和端到端延迟。结果表明,检测精度为100%,60k DoS数据包的检测率为100%,80k DoS数据包的检测率为99.96%,DER与控制中心之间的端到端等待时间为0.25 ms。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号