Skip to main content

Intrusion Detection System Based on a Deterministic Finite Automaton for Smart Grid Systems

  • Conference paper
  • First Online:
Advances in Information and Communication Networks (FICC 2018)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 887))

Included in the following conference series:

  • 968 Accesses

Abstract

Smart grid system is a target to many types of network attacks, such as Denial Of Serive (DOS), Man In The Middle (MITM) ... that could compromise users’ privacy and network’s integrity and availability. For this reason we developed a network based intrusion detection system (IDS) that relies on a deterministic finite automaton (DFA) to recognize an attack’s language that represents some of the attacks that can target the smart grid network. The attacks’ language is defined using elements or symbols that help identifying each type of attack. Results of our simulations show the efficiency of our IDS and its ability to detect dangerous cyber attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. European Network and Information Security Agency (ENISA), Smart grid security (2012)

    Google Scholar 

  2. https://en.wikipedia.org/wiki/Intrusion_detection_system

  3. Verwoerd, T., Hunt, R.: Intrusion detection techniques and approaches. Comput. Commun. J. 25(15), 1356–1365 (2002)

    Google Scholar 

  4. Karthikeyan, K.R., Indra, A.: Intrusion detection tools and techniques - a survey. Int. J. Comput. Theory Eng. 2(6), 901 (2010)

    Google Scholar 

  5. Branch, J., Bivens, A., Chan, C.Y., Lee, T.K., Szymanski, B.K.: Denial of service intrusion detection using time dependent deterministic finite automata. In: Proceedings of the Research Conference, Troy, NY, October 2002 (2002)

    Google Scholar 

  6. Wee, K., Kim, S.: Construction of finite automata for intrusion detection from system call sequences by genetic algorithms. In: Pacific-Asia Conference on Knowledge Discovery and Data Mining, SINGAPOUR 2006 (2006)

    Google Scholar 

  7. http://www.omnisecu.com/ccna-security/arp-spoofing-attack.php

  8. https://www.cloudflare.com/learning/ddos/ping-icmp-flood-ddos-attack/

  9. https://www.incapsula.com/ddos/attack-glossary/syn-flood.html

  10. https://en.wikipedia.org/wiki/Wireshark

  11. http://whatis.techtarget.com/definition/Wireshark

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nadia Boumkheld .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Boumkheld, N., El Koutbi, M. (2019). Intrusion Detection System Based on a Deterministic Finite Automaton for Smart Grid Systems. In: Arai, K., Kapoor, S., Bhatia, R. (eds) Advances in Information and Communication Networks. FICC 2018. Advances in Intelligent Systems and Computing, vol 887. Springer, Cham. https://doi.org/10.1007/978-3-030-03405-4_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-03405-4_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-03404-7

  • Online ISBN: 978-3-030-03405-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics