N. Yadav, Laura M. Truong, Erald Troja, Mehrdad Aliasgari
{"title":"智能电网中基于签名的物联网入侵检测的机器学习架构","authors":"N. Yadav, Laura M. Truong, Erald Troja, Mehrdad Aliasgari","doi":"10.1109/MELECON53508.2022.9843007","DOIUrl":null,"url":null,"abstract":"Security vulnerabilities of IoT (Internet of Things) enabled smart grid energy systems is a major concern. Contemporary mitigating frameworks incorporate Network Intrusion Detection Systems (NIDS) and Network Intrusion Prevention Systems (NIPS) whose architecture branches on either signature-based or anomaly-based detection. Signature-based systems offer higher detection rates; however they require tedious manual work to set up signature rules, and are incapable of learning through network traffic - missing out on attacks whose signature is unknown. Alternatively, anomaly-based systems are capable of mitigating the shortcomings of signature-based systems but suffer from high false-positive rates. In this paper, we propose an automated machine learning architecture for IoT-enabled smart energy grids capable of deciding whether to generate rules for signature-based systems. Results are presented using an IoT dataset comprising MITM (man in the middle) attacks, indicating the potential of this framework for intelligent threat mitigation in smart energy infrastructures.","PeriodicalId":303656,"journal":{"name":"2022 IEEE 21st Mediterranean Electrotechnical Conference (MELECON)","volume":"317 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Machine Learning Architecture for Signature-based IoT Intrusion Detection in Smart Energy Grids\",\"authors\":\"N. Yadav, Laura M. Truong, Erald Troja, Mehrdad Aliasgari\",\"doi\":\"10.1109/MELECON53508.2022.9843007\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security vulnerabilities of IoT (Internet of Things) enabled smart grid energy systems is a major concern. Contemporary mitigating frameworks incorporate Network Intrusion Detection Systems (NIDS) and Network Intrusion Prevention Systems (NIPS) whose architecture branches on either signature-based or anomaly-based detection. Signature-based systems offer higher detection rates; however they require tedious manual work to set up signature rules, and are incapable of learning through network traffic - missing out on attacks whose signature is unknown. Alternatively, anomaly-based systems are capable of mitigating the shortcomings of signature-based systems but suffer from high false-positive rates. In this paper, we propose an automated machine learning architecture for IoT-enabled smart energy grids capable of deciding whether to generate rules for signature-based systems. Results are presented using an IoT dataset comprising MITM (man in the middle) attacks, indicating the potential of this framework for intelligent threat mitigation in smart energy infrastructures.\",\"PeriodicalId\":303656,\"journal\":{\"name\":\"2022 IEEE 21st Mediterranean Electrotechnical Conference (MELECON)\",\"volume\":\"317 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-06-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE 21st Mediterranean Electrotechnical Conference (MELECON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MELECON53508.2022.9843007\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 21st Mediterranean Electrotechnical Conference (MELECON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MELECON53508.2022.9843007","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Machine Learning Architecture for Signature-based IoT Intrusion Detection in Smart Energy Grids
Security vulnerabilities of IoT (Internet of Things) enabled smart grid energy systems is a major concern. Contemporary mitigating frameworks incorporate Network Intrusion Detection Systems (NIDS) and Network Intrusion Prevention Systems (NIPS) whose architecture branches on either signature-based or anomaly-based detection. Signature-based systems offer higher detection rates; however they require tedious manual work to set up signature rules, and are incapable of learning through network traffic - missing out on attacks whose signature is unknown. Alternatively, anomaly-based systems are capable of mitigating the shortcomings of signature-based systems but suffer from high false-positive rates. In this paper, we propose an automated machine learning architecture for IoT-enabled smart energy grids capable of deciding whether to generate rules for signature-based systems. Results are presented using an IoT dataset comprising MITM (man in the middle) attacks, indicating the potential of this framework for intelligent threat mitigation in smart energy infrastructures.