Journal article Open Access

ARIES: A Novel Multivariate Intrusion Detection System for Smart Grid

Radoglou Grammatikis, Panagiotis; Sarigiannidis, Panagiotis; Efstathopoulos, Georgios; Panaousis, Emmanouil

The advent of the Smart Grid (SG) raises severe cybersecurity risks that can lead to devastating consequences. In this paper, we present a novel anomaly-based Intrusion DetectionSystem (IDS), called ARIES (smArt gRid Intrusion dEtection System), which is capable of protecting efficiently SG communications. ARIES combines three detection layers that are devoted to recognising possible cyberattacks and anomalies against (a) network flows, (b) Modbus/Transmission Control Protocol (TCP) packets and (c) operational data. Each detection layer relies on a Machine Learning (ML) model trained using data originating from a power plant. In particular, the first layer (network flow-based detection) performs a supervised multiclass classification, recognising Denial of Service (DoS), brute force attacks, port scanning attacks and bots. The second layer (packet-based detection) detects possible anomalies related to the Modbus packets, while the third layer (operational data based detection) monitors and identifies anomalies upon operational data (i.e., time series electricity measurements). By emphasising on the third layer, the ARIES Generative Adversarial Network (ARIES GAN) with novel error minimisation functions was developed, considering mainly the reconstruction difference. Moreover, a novel reformed conditional input was suggested, consisting of random noise and the signal features at any given time instance. Based on the evaluation analysis, the proposed GAN network overcomes the efficacy of conventional ML methods in terms of Accuracy and the F1 score.

Files (1.1 MB)
Name Size
[21] ARIES A Novel Multivariate Intrusion Detection System for Smart Grid.pdf
md5:e319d2d0180ea67f0bab09f479171885
1.1 MB Download
62
51
views
downloads
Views 62
Downloads 51
Data volume 57.2 MB
Unique views 55
Unique downloads 46

Share

Cite as