Skip to main content

Table 14 Summary of detection results of the four different approaches for the two-class setting

From: Comparison of approaches for intrusion detection in substations using the IEC 60870-5-104 protocol

Detection method

False positive packets

Undetected attack packets

Snort

0

823

Supervised

0

31

Semi-supervised

136

56

Unsupervised

6211

2880