Altmetrics
Downloads
375
Views
209
Comments
0
This version is not peer-reviewed
Submitted:
07 September 2023
Posted:
08 September 2023
You are already at the latest version
SL# | Literature Work | Target System | Attacks | Detection Techniques |
---|---|---|---|---|
1 | The 2015 Ukraine Blackout [3] | The SCADA of the Ukraine Grid | False Data Injection (FDI) and Denial-of Services (DoS) | Not provided |
2 | IDS Framework [26] | HAN and NAN and many IDS sensors in WAN. | Denial-of Services (DoS) | Anomaly based. |
3 | IDS for Advanced Metering Infrastructure [73] | Advanced metering infrastructure (AMI) | Denial-of Services (DoS) | Data-Stream based |
4 | Bloom Filter Based IDS [74] | SCADA | HMI compromise, Man-in-the-middle attack | Anomaly based |
5 | Cyber Security Solution towards IDS [75] | DNP3 in SCADA | Length Overflow Attack, DFC Flag Attack, and Reset Function Attack | Protocol-based detection rules |
6 | The Snort detection rule template for anomaly DNP3 [76] | DNP3 in SCADA | Protocol anomalies, reconnaissance attack, Denial-of Services (DoS) attack | Signature-based |
7 | A Stateful Analysis Framework of IDS [77] | Substation | Denial-of Services (DoS), Port scanning, MMS, SNMP attacks | Specification-based |
8 | Multidimensional IDS [78] | Substation | DoS, MiTM, Packet Injection attacks | Specification-based |
9 | IDS based on log sequence clustering of honeypot [79] | Modbus TCP in SCADA | Reconnaissance, DoS attacks | Anomaly based |
10 | A nifty collaborative IDS [80] | Entire SG | DoS, Packet splitting, Command injection, Duplicate insertion, Payload mutation | Anomaly based |
11 | Support vector machine based IDS [81] | AMI | Worms, Fuzzer, DoS, Backdoor attacks | Anomaly based |
12 | IDS for blackhole attacks in a smart grid [5] | AMI | Blackhole attack | Anomaly based |
13 | Case analysis based IDS for SG [9] | AMI | L2l, DoS, Botnet, Secure shell attacks | Anomaly based |
14 | Real-time anomaly-based distributed IDS for AMI [82] | AMI | Port scanning, DoS attacks | Anomaly based |
15 | IDS and prevention for ZigBee-based home area networks in SG [83] | AMI | Spoofing, Radio Jamming, Replay, Black-off manipulation | Specification-based |
16 | Machine learning-based IDS on an industrial Modbus/TCP data set [15] | Modbus TCP in SCADA | Reconnaissance, DoS attacks | Anomaly based |
17 | The IDS for Profinet DCP [84] | Profinet in SCADA | Reconnaissance, DoS, MiTM, Protocol anomalies | HYbrid |
18 | Data mining methods to detect simulated intrusions on a Modbus network [85] | Modbus TCP in SCADA | Reconnaissance, DoS, Command injection, Response injection attacks | Anomaly based |
19 | A behavior-based intrusion detection technique for smart grid infrastructure [86] | Substation | Port scanning, DoS, GOOSE, MMS, SNMP attacks | Specification based |
20 | Power utility automation cybersecurity: IEC 61850 specification of an IDS [12] | Substation | Not provided | Specification based |
21 | IDS of cyber intrusions using network-based multicast messages for substation automation [87] | Substation | Replay, DoS attacks | Specification based |
22 | IDS for IEC 61850 based smart substations [11] | Substation | Packet injection, MiTM, DoS attacks | Specification based |
23 | a hybrid IDS using data mining for power systems [88] | Synchrophasor | Single-line-to-ground faults, Replay attack, Command injection, Disable relay attack | Hybrid |
24 | Model based IDS for synchrophasor applications in SG [19] | Synchrophasor | ARP spoofing, Port scanning, GPS scanning, Replay attack, Command injection, Physical attacks | Hybrid |
25 | IDS for network security in synchrophasor [20] | Synchrophasor | Reconnaissance, MiTM, DoS attacks | Specification based |
26 | Accurate modeling of Modbus/TCP for IDS in SCADA [89] | Modbus TCP in SCADA | Not provided | Anomaly based |
27 | Stateful IDS for IEC 60870-5-104 SCADA security [90] | SCADA | Packet injection, Replay attack, Data manipulation | Specification based |
28 | IDS for IEC 60870-5-104 based SCADA networks [91] | SCADA | Unauthorized read/reset command, Spontaneous packet storm, Buffer overflow | Hybrid |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 MDPI (Basel, Switzerland) unless otherwise stated