AMI threats, intrusion detection requirements and deployment recommendations.
David GrochockiJun Ho HuhRobin BerthierRakesh BobbaWilliam H. SandersAlvaro A. CárdenasJorjeta G. JetchevaPublished in: SmartGridComm (2012)
Keyphrases
- intrusion detection
- cyber security
- information security
- intrusion detection system
- computer security
- ambient intelligent
- anomaly detection
- security vulnerabilities
- network security
- network traffic
- ambient intelligence
- smart grid
- cyber attacks
- network intrusion detection
- detecting anomalous
- artificial immune
- network intrusion
- worm detection
- countermeasures
- network intrusion detection systems
- high detection rate
- data mining techniques
- network intrusions
- data mining
- intrusion prevention
- machine learning
- critical infrastructure
- security issues
- false positives and false negatives
- data processing
- reinforcement learning
- training data
- database systems
- feature selection
- malicious code detection