XAI-Based Accurate Anomaly Detector That Is Robust Against Black-Box Evasion Attacks for the Smart Grid
Abstract
:1. Introduction
- We propose a hybrid DAE+OCSVM anomaly detector for ET detection. The experimental results indicate that the proposed DAE+OCSVM detector overcomes existing limitations in the literature, including the inability of binary detectors to detect new (unseen) attacks and the sensitivity of DAE anomaly detectors’ performance to the selection of the optimal threshold;
- We investigate the vulnerability of the DAE+OCSVM anomaly detector to gradient- and optimization-based evasion attacks. The experimental results indicate its vulnerability to benchmark evasion attacks, including the Fast Gradient Sign Method (FGSM), Basic Iterative Method (BIM), Carlini Wagner (C&W), Zeroth-Order Optimization (ZOO), and DeepFool;
- We propose a robust and accurate cluster-based DAE+OCSVM ET anomaly detector by training it on the SHAP explanations of consumption readings. The design objectives include enhancing accuracy, robustness, and the ability to detect new ET cyber-attacks. The experimental results illustrate the robustness of our detector against all the experimented evasion attacks while maintaining high accuracy.
2. Related Work
2.1. Securing ET Detectors Against Adversarial Attacks
2.2. XAI and Adversarial Attacks
2.3. Limitations and Research Gaps
- Most existing defense mechanisms, such as adversarial training [19] and defensive distillation [20], are tailored to specific evasion attacks and their performance is unpredictable in the case of new attacks. Moreover, these defense mechanisms sacrifice model accuracy to improve robustness against evasion attacks and are primarily designed for binary detectors, rendering them unsuitable for anomaly detectors;
- Few defense mechanisms have been proposed for AE-based anomaly detection [22,23,24,25]. These mechanisms are primarily utilized for applications other than smart grids, with only [24] specifically designed for smart grid use. All of these mechanisms primarily aim to improve the AE’s decoder output to maximize the reconstruction error for adversarial samples. However, determining the optimal reconstruction error threshold requires some prior knowledge of the malicious data (i.e., the nature of attacks), which may not be possible practically.
3. Evasion Attacks and Threat Model
3.1. Evasion and ET Attacks
3.2. Threat Model
4. Proposed Robust and Accurate ET Anomaly Detector
4.1. The Proposed Detector’s Architecture
4.2. The Rationale Behind the Detector’s Design
- There is a trade-off between the level of generalization and robustness against evasion attacks in ML-based detectors [16,44,45]. Therefore, since a cluster-based detector requires less generalization, it leads to increased robustness compared to global detectors. This is because the cluster-based model is trained on data with close consumption patterns, resulting in superior performance and robustness [32,33]. To probe more deeply into the reasons behind this superiority, we applied principal component analysis (PCA) to the consumption readings of the dataset in global and cluster-based settings, as shown in Figure 4 and Figure 5, respectively. PCA allows one to reduce the dimensionality, which facilitates the visualization of complex relationships within the data. Analyzing the plots of the first two PCA components in these figures reveals a notable overlap between benign and malicious consumption patterns in the global setting as opposed to the cluster-based setting. Therefore, we opted for a cluster-based detector rather than a global detector;
- There is a deep connection between XAI model explanations and adversarial evasion samples. Intuitively, a model’s XAI explanation leads to robustness against adversarial evasion samples because evasion samples often result in anomalous XAI explanations [27,29]. To delve deeper into the reasons behind this, we applied PCA to the SHAP explanations of the consumption readings of the dataset in a cluster-based setting, as shown in Figure 6. It is evident from the figure that the SHAP explanations of benign and malicious consumption patterns are significantly distinct. Additionally, upon examining the cumulative variance explained by the principals component, we observe that approximately 90% of the data variance is explained by the first two components of the XAI explanations, compared to only 50% for the consumption readings. Therefore, SHAP explanations are capable of compressing larger amounts of information more efficiently than consumption readings, i.e., with a lower number of PCA components. Consequently, our detector is trained using the SHAP explanations of consumption readings, rather than the readings themselves;
- Unsupervised anomaly detectors are trained solely on benign data to detect various malicious activities by identifying deviations from learned benign patterns without needing malicious datasets during the training phase. However, they use malicious data to determine the ideal reconstruction threshold for superior detection performance. Comparing DAE and OCSVM anomaly detectors, the DAE achieves superior detection performance because its deep structure extracts relevant features from the input data, thereby enhancing detection [15,46]. However, the performance of the DAE is susceptible to threshold selection. Conversely, the OCSVM does not require finding optimal threshold values, which may be difficult to find without any knowledge of malicious data [47]. Therefore, we propose a hybrid anomaly detector that combines DAE and OCSVM, achieving superior performance while eliminating the need for determining optimal threshold values.
5. Performance Evaluation
5.1. Dataset
5.1.1. IRISH Dataset
5.1.2. PRECON Dataset
5.1.3. Dataset Preparation
5.2. Experimental Setup
5.3. Evaluation Metrics
- –
- Accuracy (ACC) represents the percentage of the test samples accurately classified by the detector to the total number of samples in the test dataset. It is calculated as follows:
- –
- False Alarm (FA), known also as the false positive rate (), represents the percentage of the false positive samples out of the total number of negative samples. It is calculated as follows:
- –
- Detection Rate (DR), known also as true positive rate () and recall, represents the percentage of the true positive samples out of the total number of positive samples. It is calculated as follows:
- –
- Precision (PR) represents the percentage of true positive samples out of the total number of samples identified by the detector as positive. It is calculated as follows:
- –
- F1-score (F1) represents a statistical measure of both the precision and the detection rate. It is calculated as follows:
- –
- Highest difference (HD)represents the difference between the detection rate and the false alarm. It is calculated as follows:Equations (7)–(12) are derived from the values within the confusion matrix (, , , and ). represents the count of correctly classified malicious samples, known as true positive. is the count of correctly classified benign samples, known as true negative. is the count of malicious samples incorrectly classified as benign, known as false negative. is the count of benign samples incorrectly classified as malicious, known as false positive.
5.4. Experimental Results
5.4.1. Experiment 1
5.4.2. Experiment 2
5.4.3. Experiment 3
- Table 4 compares the classification performance (, , , , , and ) of DAE+OCSVM with and without the proposed defense. It is evident from this table that the proposed defense improves all the classification performance metrics, which indicates an ability to accurately distinguish between benign and malicious samples. This improvement occurs because the use of clustering allows detectors to train on data with close consumption patterns, which leads to parameters closer to the optimal detector’s parameters for individual consumption patterns (i.e., lower level of generalization). Additionally, the use of XAI distinctly separates benign and malicious consumption patterns, leading to easier ET detection. Additionally, Figure 9 shows the Precision–Recall (PR) and Receiver Operating Characteristic (ROC) . These figures provide a visual representation of the performance comparison. They indicate that our proposed detectors achieve higher performance, as evidenced by the values of and , demonstrating that the proposed detectors enhance ET detection in both the IRISH and PRECON datasets;
- Figure 7 compares the robustness of DAE+OCSVM with and without the proposed defense against CNN-based attacker model in terms of . The difference between the before (i.e., with no evasion) and after attacks represents the severity of the attacks or attack success rate (). In No Defense, the shows a minimal decrease from to under BIM attack. However, with the proposed defense, the values remain above for all attacks across clusters C1-XAI to C5-XAI. Figure 8 compares the robustness of DAE+OCSVM with and without the proposed defense against the FFNN-based attacker model in terms of . Here, the difference between the DR before and after the attacks also reflects the severity of the attacks . In No Defense, the shows a minimal decrease from to under BIM attack. However, with the proposed defense, the values remain above for all attacks across clusters C1-XAI to C5-XAI. It is evident from those values that the proposed anomaly detector achieves a promising level of robustness. This is attributed to the use of clustering, which results in a lower level of generalization, and XAI, which facilitates the separation of benign and anomalous consumption patterns, as shown in Figure 5 and Figure 6, respectively. Moreover, the deep structure of the proposed detector extracts relevant features from the SHAP explanations of consumption readings, thereby facilitating the detection of anomalous XAI explanations caused by these adversarial evasion attacks.
6. Discussion and Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Erol-Kantarci, M.; Mouftah, H.T. Smart grid forensic science: Applications, challenges, and open issues. IEEE Commun. Mag. 2013, 51, 68–74. [Google Scholar] [CrossRef]
- Gunduz, M.Z.; Das, R. Smart Grid Security: An Effective Hybrid CNN-Based Approach for Detecting Energy Theft Using Consumption Patterns. Sensors 2024, 24, 1148. [Google Scholar] [CrossRef] [PubMed]
- Hashim, M.; Khan, L.; Javaid, N.; Ullah, Z.; Shaheen, I. Enhancing Smart City Functions through the Mitigation of Electricity Theft in Smart Grids: A Stacked Ensemble Method. Int. Trans. Electr. Energy Syst. 2024, 2024, 5566402. [Google Scholar] [CrossRef]
- Qi, R.; Zheng, J.; Luo, Z.; Li, Q. A novel unsupervised data-driven method for electricity theft detection in AMI using observer meters. IEEE Trans. Instrum. Meas. 2022, 71, 1–10. [Google Scholar] [CrossRef]
- Buzau, M.M.; Tejedor-Aguilera, J.; Cruz-Romero, P.; Gomez-Exposito, A. Hybrid deep neural networks for detection of non-technical losses in electricity smart meters. IEEE Trans. Power Syst. 2019, 35, 1254–1263. [Google Scholar] [CrossRef]
- Takiddin, A.; Ismail, M.; Zafar, U.; Serpedin, E. Deep Autoencoder-based Detection of Electricity Stealth Cyberattacks in AMI Networks. In Proceedings of the 2021 International Symposium on Signals, Circuits and Systems (ISSCS), Iasi, Romania, 15–16 July 2021; pp. 1–6. [Google Scholar] [CrossRef]
- Lepolesa, L.J.; Achari, S.; Cheng, L. Electricity Theft Detection in Smart Grids Based on Deep Neural Network. IEEE Access 2022, 10, 39638–39655. [Google Scholar] [CrossRef]
- McDaniel, P.; McLaughlin, S. Security and privacy challenges in the smart grid. IEEE Secur. Priv. 2009, 7, 75–77. [Google Scholar] [CrossRef]
- Liao, W.; Takiddin, A.; Tariq, M.; Chen, S.; Ge, L.; Yang, Z. Sample adaptive transfer for electricity theft detection with distribution shifts. IEEE Trans. Power Syst. 2024, 39, 7012–7024. [Google Scholar] [CrossRef]
- Emadaleslami, M.; Haghifam, M.R.; Zangiabadi, M. A two stage approach to electricity theft detection in AMI using deep learning. Int. J. Electr. Power Energy Syst. 2023, 150, 109088. [Google Scholar] [CrossRef]
- Yao, R.; Wang, N.; Ke, W.; Chen, P.; Sheng, X. Electricity theft detection in unbalanced sample distribution: A novel approach including a mechanism of sample augmentation. Appl. Intell. 2023, 53, 11162–11181. [Google Scholar] [CrossRef]
- Jindal, A.; Dua, A.; Kaur, K.; Singh, M.; Kumar, N.; Mishra, S. Decision tree and SVM-based data analytics for theft detection in smart grid. IEEE Trans. Ind. Inform. 2016, 12, 1005–1016. [Google Scholar] [CrossRef]
- El-Toukhy, A.T.; Elgarhy, I.; Badr, M.M.; Mahmoud, M.; Fouda, M.M.; Ibrahem, M.I.; Amsaad, F. Securing Smart Grids: Deep Reinforcement Learning Approach for Detecting Cyber-Attacks. In Proceedings of the 2024 International Conference on Smart Applications, Communications and Networking (SmartNets), Harrisonburg, VA, USA, 28–30 May 2024; pp. 1–6. [Google Scholar] [CrossRef]
- Jokar, P.; Arianpoo, N.; Leung, V.C. Electricity theft detection in AMI using customers’ consumption patterns. IEEE Trans. Smart Grid 2015, 7, 216–226. [Google Scholar] [CrossRef]
- Takiddin, A.; Ismail, M.; Zafar, U.; Serpedin, E. Deep autoencoder-based anomaly detection of electricity theft cyberattacks in smart grids. IEEE Syst. J. 2022, 16, 4106–4117. [Google Scholar] [CrossRef]
- Szegedy, C.; Zaremba, W.; Sutskever, I.; Bruna, J.; Erhan, D.; Goodfellow, I.; Fergus, R. Intriguing properties of neural networks. In Proceedings of the 2nd International Conference on Learning Representations, ICLR 2014, Banff, AB, Canada, 14–16 April 2014. [Google Scholar]
- Papernot, N.; McDaniel, P.; Jha, S.; Fredrikson, M.; Celik, Z.B.; Swami, A. The limitations of deep learning in adversarial settings. In Proceedings of the IEEE European symposium on security and privacy (EuroS&P), Saarbruecken, Germany, 21–24 March 2016; pp. 372–387. [Google Scholar]
- Yuan, X.; He, P.; Zhu, Q.; Li, X. Adversarial examples: Attacks and defenses for deep learning. IEEE Trans. Neural Netw. Learn. Syst. 2019, 30, 2805–2824. [Google Scholar] [CrossRef]
- Goodfellow, I.J.; Shlens, J.; Szegedy, C. Explaining and harnessing adversarial examples. arXiv 2014, arXiv:1412.6572. [Google Scholar]
- Papernot, N.; McDaniel, P.; Wu, X.; Jha, S.; Swami, A. Distillation as a defense to adversarial perturbations against deep neural networks. In Proceedings of the IEEE symposium on security and privacy (SP), San Jose, CA, USA, 22–26 May 2016; pp. 582–597. [Google Scholar]
- Wei, W.; Liu, L. Robust deep learning ensemble against deception. IEEE Trans. Dependable Secur. Comput. 2020, 18, 1513–1527. [Google Scholar] [CrossRef]
- Goodge, A.; Hooi, B.; Ng, S.K.; Ng, W.S. Robustness of autoencoders for anomaly detection under adversarial impact. In Proceedings of the Twenty-Ninth International Conference on International Joint Conferences on Artificial Intelligence, Yokohama, Japan, 7–15 January 2021; pp. 1244–1250. [Google Scholar]
- Lo, S.Y.; Oza, P.; Patel, V.M. Adversarially Robust One-Class Novelty Detection. IEEE Trans. Pattern Anal. Mach. Intell. 2023, 45, 4167–4179. [Google Scholar] [CrossRef]
- Takiddin, A.; Ismail, M.; Serpedin, E. Robust Data-Driven Detection of Electricity Theft Adversarial Evasion Attacks in Smart Grids. IEEE Trans. Smart Grid 2023, 14, 663–676. [Google Scholar] [CrossRef]
- Ko, G.; Lim, G. Unsupervised detection of adversarial examples with model explanations. arXiv 2021, arXiv:2107.10480. [Google Scholar]
- Fidel, G.; Bitton, R.; Shabtai, A. When Explainability Meets Adversarial Learning: Detecting Adversarial Examples using SHAP Signatures. In Proceedings of the 2020 International Joint Conference on Neural Networks (IJCNN), Glasgow, UK, 19–24 July 2020; pp. 1–8. [Google Scholar] [CrossRef]
- Watson, M.; Al Moubayed, N. Attack-agnostic Adversarial Detection on Medical Data Using Explainable Machine Learning. In Proceedings of the 2020 25th International Conference on Pattern Recognition (ICPR), Milan, Italy, 10–15 January 2021; pp. 8180–8187. [Google Scholar] [CrossRef]
- AL-Essa, M.; Andresini, G.; Appice, A.; Malerba, D. An XAI-based adversarial training approach for cyber-threat detection. In Proceedings of the 2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), Falerna, Italy, 12–15 September 2022; pp. 1–8. [Google Scholar] [CrossRef]
- Lin, Y.C.; Yu, F. DeepSHAP Summary for Adversarial Example Detection. In Proceedings of the 2023 IEEE/ACM International Workshop on Deep Learning for Testing and Testing for Deep Learning (DeepTest), Melbourne, Australia, 15 May 2023; pp. 17–24. [Google Scholar] [CrossRef]
- Lundberg, S.M.; Lee, S.I. A unified approach to interpreting model predictions. Adv. Neural Inf. Process. Syst. 2017, 30, 4765–4774. [Google Scholar]
- Li, J.; Yang, Y.; Sun, J.S. SearchFromFree: Adversarial measurements for machine learning-based energy theft detection. In Proceedings of the IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Tempe, AZ, USA, 11–13 November 2020; pp. 1–6. [Google Scholar]
- Badr, M.M.; Mahmoud, M.; Abdulaal, M.; Aljohani, A.J.; Alsolami, F.; Balamsh, A. A Novel Evasion Attack Against Global Electricity Theft Detectors and a Countermeasure. IEEE Internet Things J. 2023, 10, 11038–11053. [Google Scholar] [CrossRef]
- Elgarhy, I.; Badr, M.M.; Mahmoud, M.; Fouda, M.M.; Alsabaan, M.; Kholidy, H.A. Clustering and Ensemble Based Approach For Securing Electricity Theft Detectors Against Evasion Attacks. IEEE Access 2023, 11, 112147–112164. [Google Scholar] [CrossRef]
- Elgarhy, I.; El-Toukhy, A.T.; Badr, M.M.; Mahmoud, M.; Fouda, M.M.; Alsabaan, M.; Kholidy, H.A. Secured Cluster-Based Electricity Theft Detectors Against Blackbox Evasion Attacks. In Proceedings of the 2024 IEEE 21st Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 6–9 January 2024; pp. 333–338. [Google Scholar] [CrossRef]
- Elgarhy, I.; Badr, M.M.; Mahmoud, M.; Nabil, M.; Alsabaan, M.; Ibrahem, M.I. Securing Smart Grid False Data Detectors Against White-box Evasion Attacks Without Sacrificing Accuracy. IEEE Internet Things J. 2024, 11, 33873–33889. [Google Scholar] [CrossRef]
- Takiddin, A.; Ismail, M.; Zafar, U.; Serpedin, E. Robust Electricity Theft Detection Against Data Poisoning Attacks in Smart Grids. IEEE Trans. Smart Grid 2021, 12, 2675–2684. [Google Scholar] [CrossRef]
- Amich, A.; Eshete, B. EG-Booster: Explanation-Guided Booster of ML Evasion Attacks. In Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy, New York, NY, USA, 25–27 April 2022; CODASPY ’22. pp. 16–28. [Google Scholar] [CrossRef]
- Zhang, X.; Wang, N.; Shen, H.; Ji, S.; Luo, X.; Wang, T. Interpretable deep learning under fire. In Proceedings of the 29th {USENIX} Security Symposium ({USENIX} Security 20), Online, 12–14 August 2020. [Google Scholar]
- Kurakin, A.; Goodfellow, I.J.; Bengio, S. Adversarial examples in the physical world. In Artificial Intelligence Safety and Security; Chapman and Hall/CRC: Boca Raton, FL, USA, 2018; pp. 99–112. [Google Scholar]
- Carlini, N.; Wagner, D. Towards evaluating the robustness of neural networks. In Proceedings of the IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA, 22–26 May 2017; pp. 39–57. [Google Scholar]
- Chen, P.Y.; Zhang, H.; Sharma, Y.; Yi, J.; Hsieh, C.J. Zoo: Zeroth order optimization based black-box attacks to deep neural networks without training substitute models. In Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, Dallas, TX, USA, 3 November 2017; pp. 15–26. [Google Scholar]
- Moosavi-Dezfooli, S.M.; Fawzi, A.; Frossard, P. DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, Nevada, USA, 27–30 June 2016. [Google Scholar]
- Papernot, N.; McDaniel, P.; Goodfellow, I. Transferability in machine learning: From phenomena to black-box attacks using adversarial samples. arXiv 2016, arXiv:1605.07277. [Google Scholar]
- Tanay, T.; Griffin, L. A boundary tilting persepective on the phenomenon of adversarial examples. arXiv 2016, arXiv:1608.07690. [Google Scholar]
- Deniz, O.; Pedraza, A.; Vallez, N.; Salido, J.; Bueno, G. Robustness to adversarial examples can be improved with overfitting. Int. J. Mach. Learn. Cybern. 2020, 11, 935–944. [Google Scholar] [CrossRef]
- Principi, E.; Rossetti, D.; Squartini, S.; Piazza, F. Unsupervised electric motor fault detection by using deep autoencoders. IEEE/CAA J. Autom. Sin. 2019, 6, 441–451. [Google Scholar] [CrossRef]
- Kim, C.; Chang, S.Y.; Kim, J.; Lee, D.; Kim, J. Automated, reliable zero-day malware detection based on autoencoding architecture. IEEE Trans. Netw. Serv. Manag. 2023, 20, 3900–3914. [Google Scholar] [CrossRef]
- Commission for Energy Regulation (CER). CER Smart Metering Project—Electricity Customer Behaviour Trial, 2009–2010 [Dataset], 1st ed.; SN: 0012-00; Irish Social Science Data Archive: Dublin, Ireland, 2012; Available online: https://www.ucd.ie/issda/data/commissionforenergyregulationcer/ (accessed on 25 October 2024).
- Nadeem, A.; Arshad, N. PRECON: Pakistan Residential Electricity Consumption Dataset. In Proceedings of the Tenth ACM International Conference on Future Energy Systems, E-Energy ’19, New York, NY, USA, 25–28 June 2019; pp. 52–57. [Google Scholar] [CrossRef]
- Breunig, M.M.; Kriegel, H.P.; Ng, R.T.; Sander, J. LOF: Identifying density-based local outliers. In Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, Dallas, TX, USA, 16–18 May 2000; pp. 93–104. [Google Scholar]
- Yan, Z.; Wen, H. Electricity Theft Detection Base on Extreme Gradient Boosting in AMI. IEEE Trans. Instrum. Meas. 2021, 70, 2504909. [Google Scholar] [CrossRef]
- Zheng, Z.; Yang, Y.; Niu, X.; Dai, H.N.; Zhou, Y. Wide and Deep Convolutional Neural Networks for Electricity-Theft Detection to Secure Smart Grids. IEEE Trans. Ind. Inform. 2018, 14, 1606–1615. [Google Scholar] [CrossRef]
- Pedregosa, F.; Varoquaux, G.; Gramfort, A.; Michel, V.; Thirion, B.; Grisel, O.; Blondel, M.; Prettenhofer, P.; Weiss, R.; Dubourg, V.; et al. Scikit-learn: Machine Learning in Python. J. Mach. Learn. Res. 2011, 12, 2825–2830. [Google Scholar]
- Hunter, J.D. Matplotlib: A 2D graphics environment. Comput. Sci. Eng. 2007, 9, 90–95. [Google Scholar] [CrossRef]
- The Functional API. Available online: https://keras.io/guides/functional_api/ (accessed on 25 October 2024).
DAE | FFNN | CNN |
---|---|---|
Input, 48, Linear | Input, 48, Linear | Input, 48, Linear |
Dense, 200, Tanh/ReLU | Dense, 96, Linear | Conv1D, 128, ReLU |
Dense, 100, Tanh/ReLU | Dense, 192, ReLU | Dense, 256, ReLU |
Dense, 50, Tanh/ReLU | Dense, 387, ReLU | Dense, 128, ReLU |
Dense, 32, Tanh/ReLU | Dense, 768, ReLU | Dense, 64, Sigmoid |
Dense, 50, Tanh/ReLU | Dense, 192, ReLU | Output, 2, Softmax |
Dense, 100, Tanh/ReLU | Dense, 200, ReLU | |
Dense, 200, Tanh/ReLU | Output, 2, Softmax | |
Output, 48, Linear |
Model Type | ACC | DR | FA | PR | F1 | HD |
---|---|---|---|---|---|---|
DAE [15,24] (With-malicious) | 91.63 | 92.92 | 9.67 | 90.58 | 91.74 | 83.25 |
DAE [15,24] (No-malicious) | 51.32 | 3.33 | 0.67 | 83.29 | 6.41 | 2.66 |
DAE+OCSVM (No-malicious) | 93.61 | 96.74 | 9.51 | 91.05 | 93.81 | 87.23 |
ACC | DR | PR | F1 | HD | ||
---|---|---|---|---|---|---|
No Evasion | 93.22 | 97.48 | 89.82 | 93.49 | 86.43 | |
CNN-based Attacker | FGSM | 70.21 | 51.47 | 82.33 | 63.34 | 40.38 |
BIM | 67.80 | 46.65 | 80.85 | 59.16 | 35.56 | |
FFNN-based Attacker | FGSM | 71.47 | 53.99 | 83.01 | 65.43 | 42.09 |
BIM | 68.46 | 47.96 | 81.28 | 60.32 | 38.87 |
Dataset | ACC | DR | FA | PR | F1 | HD | |
---|---|---|---|---|---|---|---|
IRISH | No Defense | 93.61 | 96.74 | 9.51 | 91.05 | 93.81 | 87.23 |
Proposed (C1-XAI) | 97.75 | 100.00 | 4.49 | 95.70 | 97.80 | 95.51 | |
Proposed (C2-XAI) | 97.28 | 100.00 | 5.45 | 94.83 | 97.35 | 95.55 | |
Proposed (C3-XAI) | 97.60 | 100.00 | 4.80 | 95.42 | 97.65 | 95.20 | |
Proposed (C4-XAI) | 97.79 | 100.00 | 4.41 | 95.78 | 97.84 | 95.59 | |
Proposed (C5-XAI) | 97.75 | 100.00 | 4.49 | 95.70 | 97.80 | 95.51 | |
PRECON | No Defense | 85.31 | 86.41 | 15.75 | 83.99 | 85.18 | 70.66 |
Proposed (C-XAI) | 92.69 | 96.88 | 11.34 | 89.13 | 92.84 | 85.54 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Elgarhy, I.; Badr, M.M.; Mahmoud, M.; Alsabaan, M.; Alshawi, T.; Alsaqhan, M. XAI-Based Accurate Anomaly Detector That Is Robust Against Black-Box Evasion Attacks for the Smart Grid. Appl. Sci. 2024, 14, 9897. https://doi.org/10.3390/app14219897
Elgarhy I, Badr MM, Mahmoud M, Alsabaan M, Alshawi T, Alsaqhan M. XAI-Based Accurate Anomaly Detector That Is Robust Against Black-Box Evasion Attacks for the Smart Grid. Applied Sciences. 2024; 14(21):9897. https://doi.org/10.3390/app14219897
Chicago/Turabian StyleElgarhy, Islam, Mahmoud M. Badr, Mohamed Mahmoud, Maazen Alsabaan, Tariq Alshawi, and Muteb Alsaqhan. 2024. "XAI-Based Accurate Anomaly Detector That Is Robust Against Black-Box Evasion Attacks for the Smart Grid" Applied Sciences 14, no. 21: 9897. https://doi.org/10.3390/app14219897
APA StyleElgarhy, I., Badr, M. M., Mahmoud, M., Alsabaan, M., Alshawi, T., & Alsaqhan, M. (2024). XAI-Based Accurate Anomaly Detector That Is Robust Against Black-Box Evasion Attacks for the Smart Grid. Applied Sciences, 14(21), 9897. https://doi.org/10.3390/app14219897