Intrusion Detection System for IEC 60870-5-104 Based SCADA Networks

Yi Yang, Kieran McLaughlin, Timothy Littler, Sakir Sezer, Bernardi Pranggono, Haifeng Wang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

53 Citations (Scopus)

Abstract

Increased complexity and interconnectivity of Supervisory Control and Data Acquisition (SCADA) systems in Smart Grids potentially means greater susceptibility to malicious attackers. SCADA systems with legacy communication infrastructure have inherent cyber-security vulnerabilities as these systems were originally designed with little consideration of cyber threats. In order to improve cyber-security of SCADA networks, this paper presents a rule-based Intrusion Detection System (IDS) using a Deep Packet Inspection (DPI) method, which includes signature-based and model-based approaches tailored for SCADA systems. The proposed signature-based rules can accurately detect several known suspicious or malicious attacks. In addition, model-based detection is proposed as a complementary method to detect unknown attacks. Finally, proposed intrusion detection approaches for SCADA networks are implemented and verified via Snort rules.
Original languageEnglish
Title of host publicationProceedings of the IEEE Power & Energy Society General Meeting (PESGM 2013)
Publication statusPublished - Jul 2013

ASJC Scopus subject areas

  • Energy Engineering and Power Technology
  • Nuclear Energy and Engineering
  • Renewable Energy, Sustainability and the Environment
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Intrusion Detection System for IEC 60870-5-104 Based SCADA Networks'. Together they form a unique fingerprint.

Cite this