A comparison of different intrusion detection approaches in an advanced metering infrastructure network using ADVISE

Michael Rausch, Brett Feddersen, Ken Keefe, William H. Sanders

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Utilities responsible for Advanced Metering Infrastructure (AMI) networks must be able to defend themselves from a variety of potential attacks so they may achieve the goals of delivering power to consumers and maintaining the integrity of their equipment and data. Intrusion detection systems (IDSes) can play an important part in the defense of such networks. Utilities should carefully consider the strengths and weaknesses of different IDS deployment strategies to choose the most cost-effective solution. Models of adversary behavior in the presence of different IDS deployments can help with making this decision as we demonstrate through a case study that uses a model created in the ADversary VIew Security Evaluation (ADVISE) formalism (which calculates metrics used to compare different IDSes). We show how these metrics give valuable insight into the selection of the appropriate IDS architecture for an AMI network.

Original languageEnglish (US)
Title of host publicationQuantitative Evaluation of Systems - 13th International Conference, QEST 2016, Proceedings
EditorsBenny Van Houdt, Gul Agha
PublisherSpringer-Verlag
Pages279-294
Number of pages16
ISBN (Print)9783319434247
DOIs
StatePublished - Jan 1 2016
Event13th International Conference on Quantitative Evaluation of Systems, QEST 2016 - Quebec City, Canada
Duration: Aug 23 2016Aug 25 2016

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9826 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other13th International Conference on Quantitative Evaluation of Systems, QEST 2016
CountryCanada
CityQuebec City
Period8/23/168/25/16

Keywords

  • ADversary VIew Security Evaluation (ADVISE)
  • Advanced Metering Infrastructure (AMI)
  • Intrusion Detection Systems (IDS)
  • Security modeling
  • Smart grid

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'A comparison of different intrusion detection approaches in an advanced metering infrastructure network using ADVISE'. Together they form a unique fingerprint.

  • Cite this

    Rausch, M., Feddersen, B., Keefe, K., & Sanders, W. H. (2016). A comparison of different intrusion detection approaches in an advanced metering infrastructure network using ADVISE. In B. Van Houdt, & G. Agha (Eds.), Quantitative Evaluation of Systems - 13th International Conference, QEST 2016, Proceedings (pp. 279-294). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 9826 LNCS). Springer-Verlag. https://doi.org/10.1007/978-3-319-43425-4_19