Deep Machine Learning Model-Based Cyber-Attacks Detection in Smart Power Systems
Abstract
:1. Introduction
1.1. Necessity of the Research
1.2. Literature Review
1.3. Contributions
- (1)
- A new classification model based on the Decision Tree (DT) and auto-encoder technique has been proposed as a binary classifier to detect attacks with the aim of increasing the detection accuracy and decreasing the false positive index.
- (2)
- A Principal Component Analysis (PCA) applied to the raw data of PMUs as an effective feature selection model reduces feature redundancy and learning time while minimizing the loss of data information. This approach has been shown to be effective in various evaluations as it significantly improves the performance of models.
- (3)
- A new process for handling abnormal data, such as non-numbers and infinity values in data sets, is proposed. This approach could significantly enhance accuracy in comparison to the conventional processes of processing abnormal data.
2. Model Structure
2.1. Introduction to Power System Framework Configuration
- (a)
- SLG fault: A fault occurs whenever the current, voltage frequency of the system changes abnormally, and many faults in electrical systems occur in line-to-ground and line-to-line (LL). The simulated SLG faults are represented as short circuits at diverse points along the TL in the data set.
- (b)
- Line maintenance: This type of attack is caused when one or more relays have been deactivated on a particular line to maintain.
- (c)
- Data injection: More research is being conducted into false data injection state estimation in electrical networks. False data injection attacks are one of the main forms of network attacks, which could affect the power system estimation method. Attackers alter phase angles in order to create false sensor signals. The objective of such attacks is to blind the operators and to avoid raising an alarm, which could lead to economic or physical damage to the electrical systems. Attackers synchronize the phasor measurement with the fault’s SLG and next send a relay trip command on the affected lines. A data set modeled the conditions by varying variables, such as current, voltage, and sequence components, which caused faults on various levels of the TLs.
- (d)
- Remote tripping command injection attack: This occurs when a computer on the communications network uses unexpected relay trip commands to relay at the end of a TL. For achieving attacks, command injection has been applied versus single relays or double relays.
- (e)
- Relay adjusting variation attack: The relay is configured with a distance protection layout. Attackers change the setting, so the relay responds badly to authentic faults. In the data sets, faults were caused via deactivating the relay functions at diverse parts of TLs with relays deactivated and faults.
2.2. Methodology
2.3. Feature Selection Based on PCA
2.4. Diagnosing Attack Behavior Model Structure
2.5. In-Depth Explanation of the Attack-Diagnosing Layout
2.5.1. Properties Making
2.5.2. Data Processing
2.5.3. Establish Classifier Layouts
2.5.4. Proposed Machine Learning
3. Experiment and Evaluation
3.1. Data Set
3.2. Experiment Outcome
3.2.1. Machine Learning Model
3.2.2. Outcomes
4. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Almalaq, A.; Albadran, S.; Alghadhban, A.; Jin, T.; Mohamed, M.A. An Effective Hybrid-Energy Framework for Grid Vulnerability Alleviation under Cyber-Stealthy Intrusions. Mathematics 2022, 10, 2510. [Google Scholar] [CrossRef]
- Al-Abassi, A.; Karimipour, H.; Dehghantanha, A.; Parizi, R.M. An ensemble deep learning-based cyber-attack detection in industrial control system. IEEE Access 2020, 8, 83965–83973. [Google Scholar] [CrossRef]
- Zhang, F.; Kodituwakku, H.A.; Hines, J.W.; Coble, J. Multilayer data-driven cyber-attack detection system for industrial control systems based on network, system, and process data. IEEE Trans. Ind. Inform. 2019, 15, 4362–4369. [Google Scholar] [CrossRef]
- Cyber-Attack against Ukrainian Critical Infrastructure. 2016. Available online: https://www.cisa.gov/news-events/ics-alerts/ir-alert-h-16-056-01 (accessed on 11 January 2024).
- Reich, J.; Schneider, D.; Sorokos, I.; Papadopoulos, Y.; Kelly, T.; Wei, R.; Armengaud, E.; Kaypmaz, C. Engineering of Runtime Safety Monitors for Cyber-Physical Systems with Digital Dependability Identities. In Proceedings of the International Conference on Computer Safety, Reliability, and Security, Lisbon, Portugal, 15 September 2020; Springer: Cham, Switzerland, 2020; pp. 3–17. [Google Scholar]
- Li, Y.; Wang, B.; Wang, H.; Ma, F.; Zhang, J.; Ma, H.; Mohamed, M.A. Importance Assessment of Communication Equipment in Cyber-Physical Coupled Distribution Network Based on Dynamic Node Failure Mechanism. Front. Energy Res. 2022, 10, 911985. [Google Scholar] [CrossRef]
- Zhang, L.; Cheng, L.; Alsokhiry, F.; Mohamed, M.A. A Novel Stochastic Blockchain-Based Energy Management in Smart Cities Using V2S and V2G. IEEE Trans. Intell. Transp. Syst. 2022, 24, 915–922. [Google Scholar] [CrossRef]
- Chen, J.; Alnowibet, K.; Annuk, A.; Mohamed, M.A. An effective distributed approach based machine learning for energy negotiation in networked microgrids. Energy Strategy Rev. 2021, 38, 100760. [Google Scholar] [CrossRef]
- Al-Mhiqani, M.N.; Ahmad, R.; Yassin, W.; Hassan, A.; Abidin, Z.Z.; Ali, N.S.; Abdulkareem, K.H. Cyber-security incidents: A review cases in cyber-physical systems. Int. J. Adv. Comput. Sci. Appl. 2018, 1, 499–508. [Google Scholar]
- Luo, Y.; Cheng, L.; Liang, Y.; Fu, J.; Peng, G. Deepnoise: Learning sensor and process noise to detect data integrity attacks in CPS. China Commun. 2021, 18, 192–209. [Google Scholar] [CrossRef]
- Kaouk, M.; Flaus, J.M.; Potet, M.L.; Groz, R. A review of intrusion detection systems for industrial control systems. In Proceedings of the 2019 6th International Conference on Control, Decision and Information Technologies (CoDIT), Paris, France, 23 April 2019; IEEE: Toulouse, France, 2019; pp. 1699–1704. [Google Scholar]
- Dehghani, M.; Kavousi-Fard, A.; Dabbaghjamanesh, M.; Avatefipour, O. Deep learning based method for false data injection attack detection in AC smart islands. IET Gener. Transm. Distrib. 2020, 14, 5756–5765. [Google Scholar] [CrossRef]
- Taormina, R.; Galelli, S.; Tippenhauer, N.O.; Salomons, E.; Ostfeld, A.; Eliades, D.G.; Aghashahi, M.; Sundararajan, R.; Pourahmadi, M.; Banks, M.K.; et al. Battle of the attack detection algorithms: Disclosing cyber-attacks on water distribution networks. J. Water Resour. Plan. Manag. 2018, 144, 04018048. [Google Scholar] [CrossRef]
- Chang, Q.; Ma, X.; Chen, M.; Gao, X.; Dehghani, M. A deep learning based secured energy management framework within a smart island. Sustain. Cities Soc. 2021, 70, 102938. [Google Scholar] [CrossRef]
- Keshk, M.; Sitnikova, E.; Moustafa, N.; Hu, J.; Khalil, I. An integrated framework for privacy-preserving based anomaly detection for cyber-physical systems. IEEE Trans. Sustain. Comput. 2019, 6, 66–79. [Google Scholar] [CrossRef]
- Huang, Y.; He, T.; Chaudhuri, N.R.; la Porta, T. Preventing Outages under Coordinated Cyber-Physical Attack with Secured PMUs. IEEE Trans. Smart Grid 2022, 13, 3160–3173. [Google Scholar] [CrossRef]
- Alexopoulos, T.A.; Korres, G.N.; Manousakis, N.M. Complementarity reformulations for false data injection attacks on pmu-only state estimation. Electr. Power Syst. Res. 2020, 189, 106796. [Google Scholar] [CrossRef]
- Alexopoulos, T.A.; Manousakis, N.M.; Korres, G.N. Fault location observability using phasor measurements units via semidefinite programming. IEEE Access 2016, 4, 5187–5195. [Google Scholar] [CrossRef]
- Mamuya, Y.D.; Lee, Y.-D.; Shen, J.-W.; Shafiullah, M.; Kuo, C.-C. Application of Machine Learning for Fault Classification and Location in a Radial Distribution Grid. Appl. Sci. 2020, 10, 4965. [Google Scholar] [CrossRef]
- Chaithanya, P.S.; Priyanga, S.; Pravinraj, S.; Sriram, V.S. SSO-IF: An Outlier Detection Approach for Intrusion Detection in SCADA Systems. In Inventive Communication and Computational Technologies; Springer: Singapore, 2020; pp. 921–929. [Google Scholar]
- Chen, J.; Mohamed, M.A.; Dampage, U.; Rezaei, M.; Salmen, S.H.; Obaid, S.A.; Annuk, A. A multi-layer security scheme for mitigating smart grid vulnerability against faults and cyber-attacks. Appl. Sci. 2021, 11, 9972. [Google Scholar] [CrossRef]
- Avatefipour, O.; Al-Sumaiti, A.S.; El-Sherbeeny, A.M.; Awwad, E.M.; Elmeligy, M.A.; Mohamed, M.A.; Malik, H. An intelligent secured framework for cyberattack detection in electric vehicles’ CAN bus using machine learning. IEEE Access 2019, 7, 127580–127592. [Google Scholar] [CrossRef]
- Wang, B.; Ma, F.; Ge, L.; Ma, H.; Wang, H.; Mohamed, M.A. Icing-EdgeNet: A pruning lightweight edge intelligent method of discriminative driving channel for ice thickness of transmission lines. IEEE Trans. Instrum. Meas. 2020, 70, 1–12. [Google Scholar] [CrossRef]
- Wang, D.; Wang, X.; Zhang, Y.; Jin, L. Detection of power grid disturbances and cyber-attacks based on machine learning. J. Inf. Secur. Appl. 2019, 46, 42–52. [Google Scholar] [CrossRef]
- Alnowibet, K.; Annuk, A.; Dampage, U.; Mohamed, M.A. Effective energy management via false data detection scheme for the interconnected smart energy hub–microgrid system under stochastic framework. Sustainability 2021, 13, 11836. [Google Scholar] [CrossRef]
- Chen, L.; Liu, Z.; Tong, L.; Jiang, Z.; Wang, S.; Dong, J.; Zhou, H. Underwater object detection using Invert Multi-Class Adaboost with deep learning. In Proceedings of the 2020 International Joint Conference on Neural Networks (IJCNN), Glasgow, UK, 19 July 2020; IEEE: Toulouse, France, 2020; pp. 1–8. [Google Scholar]
- Gonzales, R.C.; Wintz, P. Digital Image Processing; Addison-Wesley Longman Publishing Co., Inc.: Upper Saddle River, NJ, USA, 1987. [Google Scholar]
- Goodfellow, I.; Bengio, Y.; Courville, A. Deep Learning; MIT Press: Cambridge, MA, USA, 2016. [Google Scholar]
- Shafizadeh-Moghadam, H. Fully component selection: An efficient combination of feature selection and principal component analysis to increase model performance. Expert Syst. Appl. 2021, 186, 115678. [Google Scholar] [CrossRef]
- Roshan, K.; Zafar, A. Deep Learning Approaches for Anomaly and Intrusion Detection in Computer Network: A Review. Cyber Secur. Digit. Forensics 2022, 73, 551–563. [Google Scholar]
- Jahromi, A.N.; Karimipour, H.; Dehghantanha, A.; Choo, K.-K.R. Toward detection and attribution of cyber-attacks in IoT-enabled cyber–physical systems. IEEE Internet Things J. 2021, 8, 13712–13722. [Google Scholar] [CrossRef]
- Pham, B.T.; Bui, D.T.; Prakash, I.; Nguyen, L.H.; Dholakia, M.B. A comparative study of sequential minimal optimization-based support vector machines, vote feature intervals, and logistic regression in landslide susceptibility assessment using GIS. Environ. Earth Sci. 2017, 76, 371. [Google Scholar] [CrossRef]
- Jena, M.; Dehuri, S. Decision tree for classification and regression: A state-of-the art review. Informatica 2020, 44, 405–420. [Google Scholar] [CrossRef]
- Chen, R.C.; Caraka, R.E.; Arnita, N.E.; Pomalingo, S.; Rachman, A.; Toharudin, T.; Tai, S.K.; Pardamean, B. An end to end of scalable tree boosting system. Sylwan 2020, 164, 140–151. [Google Scholar]
- Zhang, Z.; Zhang, Y.; Guo, D.; Song, M. A scalable network intrusion detection system towards detecting, discovering, and learning unknown attacks. Int. J. Mach. Learn. Cybern. 2021, 12, 1649–1665. [Google Scholar] [CrossRef]
Technique | Characteristics | |
---|---|---|
Entire | Split | |
Accuracy | 0.9344 | 0.9387 |
Method | Zero | Mean | Log-Mean |
---|---|---|---|
Accuracy | 0.9361 | 0.9342 | 0.9387 |
Method | PCA | PSO Algorithm | K-Means Clustering | SVM |
---|---|---|---|---|
Accuracy | 0.9387 | 0.8741 | 0.9134 | 0.902 |
Characteristics | Only New Characteristics | 25% Main Characteristics and New Characteristics | 50% Main Characteristics and New Characteristics |
Mean accuracy | 0.7492 | 0.9349 | 0.9334 |
Characteristics | 75% Main Characteristics and New Characteristics | 100% Main Characteristics and New Characteristics | |
Mean accuracy | 0.933 | 0.9353 |
Data set | Data 1 | Data 2 | Data 3 | Data 4 | Data 5 | Data 6 | Data 7 | Data 8 |
Data number | 0.8894 | 0.8699 | 0.9097 | 0.8830 | 0.9092 | 0.9096 | 0.9066 | 0.9193 |
Data set | Data 9 | Data 10 | Data 11 | Data 12 | Data 13 | Data 14 | Data 15 | Entire |
Data number | 0.9083 | 0.9229 | 0.9241 | 0.9007 | 0.9016 | 0.8966 | 0.9130 | 0.9043 |
Actual Value | |||
---|---|---|---|
Detection Scheme Response | Positives | Negatives | |
Positives | True Positive | False Positive | |
Negatives | False Negative | True Negative |
Label | Number of Testing Data | Identified to Be Compromised | Identified to Be Normal | Detection Accuracy (%) |
---|---|---|---|---|
Compromised | 1759 | 1651 | 108 | 93.87 |
Normal | 1394 | 81 | 1313 | 94.17 |
Actual Value | |||
---|---|---|---|
Detection Scheme Response | Positives | Negatives | |
Positives | 93.87% | 5.83% | |
Negatives | 6.13% | 94.17% |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Almalaq, A.; Albadran, S.; Mohamed, M.A. Deep Machine Learning Model-Based Cyber-Attacks Detection in Smart Power Systems. Mathematics 2022, 10, 2574. https://doi.org/10.3390/math10152574
Almalaq A, Albadran S, Mohamed MA. Deep Machine Learning Model-Based Cyber-Attacks Detection in Smart Power Systems. Mathematics. 2022; 10(15):2574. https://doi.org/10.3390/math10152574
Chicago/Turabian StyleAlmalaq, Abdulaziz, Saleh Albadran, and Mohamed A. Mohamed. 2022. "Deep Machine Learning Model-Based Cyber-Attacks Detection in Smart Power Systems" Mathematics 10, no. 15: 2574. https://doi.org/10.3390/math10152574
APA StyleAlmalaq, A., Albadran, S., & Mohamed, M. A. (2022). Deep Machine Learning Model-Based Cyber-Attacks Detection in Smart Power Systems. Mathematics, 10(15), 2574. https://doi.org/10.3390/math10152574