3.8 Article

Detecting Cyber Attacks in Smart Grids Using Semi-Supervised Anomaly Detection and Deep Representation Learning

期刊

INFORMATION
卷 12, 期 8, 页码 -

出版社

MDPI
DOI: 10.3390/info12080328

关键词

smart grids; cyber-physical systems; cyber attacks; semi-supervised anomaly detection; deep representation learning; deep autoencoder (DAE)

资金

  1. National Science Foundation [CNS-1757945]
  2. EPSCoR [OIA-1757207]
  3. Institute for Complex Additive Systems Analysis (ICASA) of New Mexico Institute of Mining and Technology

向作者/读者索取更多资源

Smart grids incorporate advanced ICTs for efficient power delivery and management, but also introduce new security vulnerabilities. This paper presents a new method for detecting cyber attacks in smart grids using semi-supervised anomaly detection and deep representation learning, which outperforms popular supervised algorithms in finding attack events. Results show that the performance of semi-supervised anomaly detection algorithms can be further enhanced by incorporating deep representation learning.
Smart grids integrate advanced information and communication technologies (ICTs) into traditional power grids for more efficient and resilient power delivery and management, but also introduce new security vulnerabilities that can be exploited by adversaries to launch cyber attacks, causing severe consequences such as massive blackout and infrastructure damages. Existing machine learning-based methods for detecting cyber attacks in smart grids are mostly based on supervised learning, which need the instances of both normal and attack events for training. In addition, supervised learning requires that the training dataset includes representative instances of various types of attack events to train a good model, which is sometimes hard if not impossible. This paper presents a new method for detecting cyber attacks in smart grids using PMU data, which is based on semi-supervised anomaly detection and deep representation learning. Semi-supervised anomaly detection only employs the instances of normal events to train detection models, making it suitable for finding unknown attack events. A number of popular semi-supervised anomaly detection algorithms were investigated in our study using publicly available power system cyber attack datasets to identify the best-performing ones. The performance comparison with popular supervised algorithms demonstrates that semi-supervised algorithms are more capable of finding attack events than supervised algorithms. Our results also show that the performance of semi-supervised anomaly detection algorithms can be further improved by augmenting with deep representation learning.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

3.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Chemistry, Multidisciplinary

Enhancing the Security of Pattern Unlock with Surface EMG-Based Biometrics

Qingqing Li, Penghui Dong, Jun Zheng

APPLIED SCIENCES-BASEL (2020)

Article Computer Science, Information Systems

A Situation-Aware Scheme for Efficient Device Authentication in Smart Grid-Enabled Home Area Networks

Anhao Xiang, Jun Zheng

ELECTRONICS (2020)

Article Chemistry, Multidisciplinary

A Study of Adversarial Attacks and Detection on Deep Learning-Based Plant Disease Identification

Zhirui Luo, Qingqing Li, Jun Zheng

Summary: This study investigates adversarial attacks and detection on DL-based plant disease identification systems, revealing that attacks with a small number of perturbations can significantly degrade DNN model performance. It also proposes defense mechanisms against adversarial attacks, providing a basis for developing more robust DNN models and guiding defense strategies in plant disease identification.

APPLIED SCIENCES-BASEL (2021)

Article Chemistry, Analytical

Securing Smart Grid Enabled Home Area Networks with Retro-Reflective Visible Light Communication

Mathew Salas, Sihua Shao, Adrian Salustri, Zachary Schroeck, Jun Zheng

Summary: Smart appliances and electric vehicles can be managed through a smart grid enabled home area network (HAN), which helps to reduce electricity demand during critical times and decrease greenhouse gas emissions. However, the commonly used wireless communication technologies in HAN are vulnerable to cyber attacks. Therefore, a low-cost solution using retro-reflector based visible light communication (Retro-VLC) is proposed for secure data exchange.

SENSORS (2023)

Article Computer Science, Information Systems

Optimizing AoI in UAV-RIS-Assisted IoT Networks: Off Policy Versus On Policy

Michelle Sherman, Sihua Shao, Xiang Sun, Jun Zheng

Summary: In urban environments, tall buildings or structures can limit direct wireless communication between a base station (BS) and an Internet of Things device (IoTD). The use of unmanned aerial vehicles (UAVs) with reconfigurable intelligent surfaces (RIS) as relay nodes, known as UAV-RIS, has been proposed to enhance the system throughput capacity in wireless access networks. Uncoordinated UAVs or RIS phase shift elements can negatively impact signal transmission to IoTDs. To minimize Average Sum of Age of Information (ASoA), two model-free deep reinforcement learning (DRL) approaches, Off-Policy deep Q-network (DQN) and On-Policy proximal policy optimization (PPO), were developed to optimize RIS phase shift, UAV-RIS location, and IoTD transmission scheduling in large-scale Internet of Things wireless networks. Analysis and simulations show the superiority of the On-Policy approach, PPO, in terms of stability, convergence speed, and adaptability to different environments.

IEEE INTERNET OF THINGS JOURNAL (2023)

Proceedings Paper Green & Sustainable Science & Technology

Feature Engineering for Semi-supervised Electricity Theft Detection in AMI

Elijah Orozco, Ruobin Qi, Jun Zheng

Summary: Cyber attacks on smart grids' Advanced Metering Infrastructure (AMI), such as electricity theft, can lead to significant financial losses for utility companies. In this study, we propose a semi-supervised outlier detection approach for data-driven electricity theft detection, utilizing only normal energy usage data for training. We investigate nine semi-supervised outlier detection algorithms and perform feature engineering to extract 20 time-series features from energy load profiles, aiding in the detection of malicious changes in load curve or energy usage. The results demonstrate that the proposed feature engineering significantly improves the performance of semi-supervised outlier detection algorithms.

2023 IEEE GREEN TECHNOLOGIES CONFERENCE, GREENTECH (2023)

Article Engineering, Electrical & Electronic

A Novel Unsupervised Data-Driven Method for Electricity Theft Detection in AMI Using Observer Meters

Ruobin Qi, Jun Zheng, Zhirui Luo, Qingqing Li

Summary: This article proposes a novel method for detecting electricity theft in AMI, which uses observer meter data, wavelet-based feature extraction, and fuzzy c-means clustering to differentiate normal and fraudulent users. Experimental results show that the proposed method achieves significantly better performance compared to existing methods.

IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT (2022)

Article Engineering, Electrical & Electronic

A New Deep Anomaly Detection-Based Method for User Authentication Using Multichannel Surface EMG Signals of Hand Gestures

Qingqing Li, Zhirui Luo, Jun Zheng

Summary: This article investigates the use of multichannel sEMG signals of hand gestures for user authentication. A new deep anomaly detection-based method is proposed, which employs sEMG images generated from multichannel sEMG signals. Among different sEMG image generation methods, the root mean square (rms) map achieves the best performance.

IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT (2022)

Article Computer Science, Information Systems

Deep Feature Fusion for Rumor Detection on Twitter

Zhirui Luo, Qingqing Li, Jun Zheng

Summary: The increasing popularity of social media has made it easier to create and spread rumors, which could cause devastating damages. This paper introduces a new deep feature fusion method for Twitter rumor detection, utilizing linguistic characteristics and propagation tree patterns to achieve significantly better detection performance than other baseline methods.

IEEE ACCESS (2021)

Proceedings Paper Computer Science, Information Systems

Robust PDF Malware Detection with Image Visualization and Processing Techniques

Andrew Corum, Donovan Jenkins, Jun Zheng

2019 2ND INTERNATIONAL CONFERENCE ON DATA INTELLIGENCE AND SECURITY (ICDIS 2019) (2019)

Article Computer Science, Information Systems

M-Pattern: A novel scheme for improving the security of Android Pattern unlock against smudge attacks

Jun Zheng, Sai Krishna Chigurupati

ICT EXPRESS (2019)

Proceedings Paper Engineering, Electrical & Electronic

Scramble or Not, That is the Question A Study of the Security and Usability of Scramble Keypad for PIN Unlock on Smartphones

Geetika Kovelamudi, Jun Zheng, Srinivas Mukkamala

2016 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC) (2016)

暂无数据