AI-Empowered Attack Detection and Prevention Scheme for Smart Grid System
Abstract
:1. Introduction
1.1. Motivation
- The state-of-the-art attack-detection approaches have various security concerns, like data-modification attacks, data integrity, and many more. They have focused on cyberattack detection by using conventional algorithms. However, it can easily be compromised by using a high-end computational system. Thus, there is a need for a mechanism that detects the attacks with very high accuracy and also prevents the SG system from being jeopardized.
- The existing approaches such as that by Bansal et al. [25] discussed various ML techniques for identifying distinct DoS attack types but didn’t consider the severe impact of data modification and SQL injection attack in the SG environment. Therefore, there is a requirement for detection and a prevention mechanism for the SG system.
- The nonmalicious data flow within the SG network is still strained from the data-modification attacks using modern computing capabilities. An attacker can target a particular sender to intercept the message request and compromise the entire SG system. Therefore, there is a need for strong cryptography technology like SHA-512 that securely stores data at the receiver and sender end to ensure data integrity.
- Motivated by this, we have explored the integration of AI-empowered approaches like XGBoost and SHA-512 to secure the data communication with the SG system and evaluate the performance of the proposed scheme.
1.2. Research Contributions
- This paper proposes an AI-empowered XGBoost method to detect cyberattacks based on binary classification problems in the SG system. The proposed model employed a nonlinear method in place of the traditional linear XGBoost method and used Taylor expansion with second-order approximation.
- We designed a data-integrity and attack-prevention algorithm for the SG system by including SHA-512 cryptography. This enables one to hash the data and lower the risk of data-manipulation attacks.
- We evaluated the performance of the proposed AI-ADP scheme by comparing it with the preexisting approaches based on various parameters such as detection accuracy, cycles used per byte, and total cycles used for hashing.
1.3. Organization of the Paper
2. Related Work
Approaches | Year | Short Description | Merits | Demerits |
---|---|---|---|---|
Kurt et al. [12] | 2018 | An RL-based solution for online detection of attacks. | Number of false alarms reduced compared to the existing approaches. | The presented solution needs to be expanded for multiple agents. |
Morstyn et al. [26] | 2018 | Developed XGboost model to forecast global solar radiation (GSR) | Temperature and precipitation in climates are included in this solution | For GSR forecasting, the authors employed only maximum/minimum values rather than the actual value. |
Bansal et al. [25] | 2018 | Various ML techniques for identifying distinct denial-of-service (DoS) attack types is discussed | Parameter tuning algorithm is highlighted for better performance. | The impact of data modification and SQL injection attacks in SG environment is not discussed. |
Cherif et al. [27] | 2019 | Proposed an XGBoost model for home network traffic classification. | On a dataset with real flows, the proposed model achieved 99.5% accuracy. | Proposed model needs to be improved for online traffic. |
Camana et al. [28] | 2020 | Proposed a dimension reduction-based ML algorithm to detect attack on SG. | The proposed approach takes the shortest execution time. | Data loss may arise as a result of dimension reduction. |
Alqahtani et al. [36] | 2020 | A successful and efficient method for detecting IoT botnet attacks using extreme gradient boosting (GXGBoost) model. | The GXGBoost model and the Fisher-score-based feature selection method is used for attack detection. | Prevention mechanism for data modification and SQL injection attacks need to be discussed. |
Su et al. [29] | 2021 | A dynamic load altering attack detection model for SG. | The proposed approach takes the shortest execution time. | There is no empirical foundation for selecting susceptible loads or other power system characteristics. |
Patnaik et al. [30] | 2021 | Presented a XGboost based classifier. | By using XGboost, over-fitting can be reduced. | For sparse and unstructured data presented method need to be improved. |
Khamaiseh et al. [31] | 2021 | A novel ML-based approach for DoS attack detection. | Better performance compare to similar approaches. | Emphasis only DoS, other attacks required to be included in this approach. |
Zivkovic et al. [33] | 2022 | Optimize XGBoost classifier for network intrusion detection. | Minimized false positives and false negatives in network intrusion detection systems. | Attack detection accuracy required to be improved. |
The proposed AI-ADP scheme | 2022 | The proposed scheme performs AI-based attack detection and prevention in SG system. | It obtained 99.12% accuracy while detecting attacks by using XGBoost and SHA-512 is incorporated to improve SG system security. | - |
3. System Model and Problem Formulation
3.1. System Model
3.2. Problem Formulation
4. AI-ADP: The Proposed Scheme
4.1. Data Preparation
4.2. AI-Based Modeling and Securing the System
Algorithm 1 XGBoost-based attack detection. |
Input:, Output: Hashed_file
|
Algorithm 2 Recommend to implement SHA-512 for attack prevention. |
|
5. Performance Evaluation
5.1. Dataset Descriptions
5.2. Experimental Setup and Tools
- Intel(R) Core(TM) CPU (Intel Core i7 @ 2.6 GHz);
- 16 GB memory;
- 250 GB SSD; and
- 1 Gbit/s network.
6. Discussion
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Hossain, E.; Khan, I.; Un-Noor, F.; Sikander, S.S.; Sunny, M.S.H. Application of Big Data and Machine Learning in Smart Grid, and Associated Security Concerns: A Review. IEEE Access 2019, 7, 13960–13988. [Google Scholar] [CrossRef]
- Tan, S.; De, D.; Song, W.Z.; Yang, J.; Das, S.K. Survey of Security Advances in Smart Grid: A Data Driven Approach. IEEE Commun. Surv. Tutor. 2017, 19, 397–422. [Google Scholar] [CrossRef]
- Kumari, A.; Tanwar, S. A Data Analytics Scheme for Security-aware Demand Response Management in Smart Grid System. In Proceedings of the 2020 IEEE 7th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON), Prayagraj, India, 27–29 November 2020; pp. 1–6. [Google Scholar] [CrossRef]
- Ericsson, G.N. Cyber Security and Power System Communication—Essential Parts of a Smart Grid Infrastructure. IEEE Trans. Power Deliv. 2010, 25, 1501–1507. [Google Scholar] [CrossRef]
- Kumari, A.; Patel, M.M.; Shukla, A.; Tanwar, S.; Kumar, N.; Rodrigues, J.J.P.C. ArMor: A Data Analytics Scheme to identify malicious behaviors on Blockchain-based Smart Grid System. In Proceedings of the GLOBECOM 2020—2020 IEEE Global Communications Conference, Taipei, Taiwan, 8–10 December 2020; pp. 1–6. [Google Scholar] [CrossRef]
- Hu, C.; Yan, J.; Wang, C. Advanced Cyber-Physical Attack Classification with eXtreme Gradient Boosting for Smart Transmission Grids. In Proceedings of the 2019 IEEE Power & Energy Society General Meeting (PESGM), Atlanta, GA, USA, 4–8 August 2019; pp. 1–5. [Google Scholar]
- Kumari, A.; Tanwar, S. A Reinforcement-Learning-Based Secure Demand Response Scheme for Smart Grid System. IEEE Internet Things J. 2022, 9, 2180–2191. [Google Scholar] [CrossRef]
- Oliveira, N.; Praça, I.; Maia, E.; Sousa, O. Intelligent Cyber Attack Detection and Classification for Network-Based Intrusion Detection Systems. Appl. Sci. 2021, 11, 1674. [Google Scholar] [CrossRef]
- Farrukh, Y.A.; Khan, I.; Ahmad, Z.; Elavarasan, R.M. A Sequential Supervised Machine Learning Approach for Cyber Attack Detection in a Smart Grid System. arXiv 2021, arXiv:2108.00476. [Google Scholar]
- Khan, A.A.; Kumar, V.; Ahmad, M. An Elliptic Curve Cryptography Based Mutual Authentication Scheme for Smart Grid Communications Using Biometric Approach. J. King Saud Univ.-Comput. Inf. Sci. 2019, 34, 698–705. [Google Scholar] [CrossRef]
- Manandhar, K.; Cao, X.; Hu, F.; Liu, Y. Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter. IEEE Trans. Control Netw. Syst. 2014, 1, 370–379. [Google Scholar] [CrossRef]
- Kurt, M.N.; Ogundijo, O.; Li, C.; Wang, X. Online Cyber-Attack Detection in Smart Grid: A Reinforcement Learning Approach. IEEE Trans. Smart Grid 2019, 10, 5174–5185. [Google Scholar] [CrossRef] [Green Version]
- Kumari, A.; Tanwar, S. A secure data analytics scheme for multimedia communication in a decentralized smart grid. Multimed. Tools Appl. 2021, 1–26. [Google Scholar] [CrossRef]
- Mitali, V.K.; Sharma, A. A Survey on Various Cryptography Techniques. Int. J. Emerg. Trends Technol. Comput. Sci. 2014, 3, 307–312. [Google Scholar]
- Gupta, B.; Agrawal, D.P.; Yamaguchi, S. Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security; IGI Global: Hershey, PA, USA, 2016; pp. 1–589. [Google Scholar]
- Sadhukhan, D.; Ray, S.; Obaidat, M.S.; Dasgupta, M. A Secure and Privacy Preserving Lightweight Authentication Scheme for Smart-Grid Communication using Elliptic Curve Cryptography. J. Syst. Archit. 2021, 114, 101938. [Google Scholar] [CrossRef]
- Rezaimehr, F.; Dadkhah, C. A survey of Attack Detection Approaches in Collaborative Filtering Recommender Systems. Artif. Intell. Rev. 2021, 54, 2011–2066. [Google Scholar] [CrossRef]
- Rubio, J.E.; Alcaraz, C.; Lopez, J. Recommender System for Privacy-Preserving Solutions in Smart Metering. Pervasive Mob. Comput. 2017, 41, 205–218. [Google Scholar] [CrossRef]
- Patel, R.K.; Kumari, A.; Tanwar, S.; Hong, W.C.; Sharma, R. AI-Empowered Recommender System for Renewable Energy Harvesting in Smart Grid System. IEEE Access 2022, 10, 24316–24326. [Google Scholar] [CrossRef]
- Yan, Y.; Qian, Y.; Sharif, H.; Tipper, D. A Survey on Cyber Security for Smart Grid Communications. IEEE Commun. Surv. Tutor. 2012, 14, 998–1010. [Google Scholar] [CrossRef] [Green Version]
- Liu, J.; Xiao, Y.; Li, S.; Liang, W.; Chen, C.L.P. Cyber Security and Privacy Issues in Smart Grids. IEEE Commun. Surv. Tutor. 2012, 14, 981–997. [Google Scholar] [CrossRef]
- Wang, S.; Bi, S.; Zhang, Y.J.A.; Huang, J. Electrical Vehicle Charging Station Profit Maximization: Admission, Pricing, and Online Scheduling. IEEE Trans. Sustain. Energy 2018, 9, 1722–1731. [Google Scholar] [CrossRef] [Green Version]
- Inayat, U.; Zia, M.F.; Mahmood, S.; Khalid, H.M.; Benbouzid, M. Learning-Based Methods for Cyber Attacks Detection in IoT Systems: A Survey on Methods, Analysis, and Future Prospects. Electronics 2022, 11, 1502. [Google Scholar] [CrossRef]
- Dobraunig, C.; Eichlseder, M.; Mendel, F. Analysis of SHA-512/224 and SHA-512/256. In Advances in Cryptology—ASIACRYPT 2015; Iwata, T., Cheon, J.H., Eds.; Springer: Berlin/Heidelberg, Germany, 2015; pp. 612–630. [Google Scholar]
- Bansal, A.; Kaur, S. Extreme Gradient Boosting Based Tuning for Classification in Intrusion Detection Systems. In International Conference on Advances in Computing and Data Sciences; Springer: Berlin/Heidelberg, Germany, 2018; pp. 372–380. [Google Scholar]
- Fan, J.; Wang, X.; Wu, L.; Zhou, H.; Zhang, F.; Yu, X.; Lu, X.; Xiang, Y. Comparison of Support Vector Machine and Extreme Gradient Boosting for Predicting Daily Global Solar Radiation Using Temperature and Precipitation in Humid Subtropical climates: A case Study in China. Energy Convers. Manag. 2018, 164, 102–111. [Google Scholar] [CrossRef]
- Cherif, I.L.; Kortebi, A. On Using eXtreme Gradient Boosting (XGBoost) Machine Learning Algorithm for Home Network Traffic Classification. In Proceedings of the 2019 Wireless Days (WD), Manchester, UK, 24–26 April 2019; pp. 1–6. [Google Scholar] [CrossRef]
- Camana Acosta, M.R.; Ahmed, S.; Garcia, C.E.; Koo, I. Extremely Randomized Trees-Based Scheme for Stealthy Cyber-Attack Detection in Smart Grid Networks. IEEE Access 2020, 8, 19921–19933. [Google Scholar] [CrossRef]
- Su, Q.; Li, S.; Gao, Y.; Huang, X.; Li, J. Observer-Based Detection and Reconstruction of Dynamic Load Altering Attack in Smart Grid. J. Frankl. Inst. 2021, 358, 4013–4027. [Google Scholar] [CrossRef]
- Patnaik, B.; Mishra, M.; Bansal, R.C.; Jena, R.K. MODWT-XGBoost Based Smart Energy Solution for Fault Detection and Classification in a Smart Microgrid. Appl. Energy 2021, 285, 116457. [Google Scholar] [CrossRef]
- Khamaiseh, S.Y.; Alsmadi, I.; Al-Alaj, A. Deceiving Machine Learning-Based Saturation Attack Detection Systems in SDN. In Proceedings of the 2020 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), Leganes, Spain, 10–12 November 2020; pp. 44–50. [Google Scholar] [CrossRef]
- Ashraf, S.; Shawon, M.H.; Khalid, H.M.; Muyeen, S.M. Denial-of-Service Attack on IEC 61850-Based Substation Automation System: A Crucial Cyber Threat towards Smart Substation Pathways. Sensors 2021, 21, 6415. [Google Scholar] [CrossRef]
- Zivkovic, M.; Tair, M.; Venkatachalam, K.; Bacanin, N.; Hubálovskỳ, Š.; Trojovskỳ, P. Novel Hybrid Firefly Algorithm: An Application to Enhance XGBoost Tuning for Intrusion Detection Classification. PeerJ Comput. Sci. 2022, 8, e956. [Google Scholar] [CrossRef] [PubMed]
- Kumari, A.; Tanwar, S. RAKSHAK: Resilient and Scalable Demand Response Management Scheme for Smart Grid Systems. In Proceedings of the 2021 11th International Conference on Cloud Computing, Data Science and Engineering (Confluence), Noida, India, 28–29 January 2021; pp. 309–314. [Google Scholar] [CrossRef]
- Chehri, A.; Fofana, I.; Yang, X. Security Risk Modeling in Smart Grid Critical Infrastructures in the Era of Big Data and Artificial Intelligence. Sustainability 2021, 13, 3196. [Google Scholar] [CrossRef]
- Alqahtani, M.; Mathkour, H.; Ben Ismail, M.M. IoT Botnet Attack Detection Based on Optimized Extreme Gradient Boosting and Feature Selection. Sensors 2020, 20, 6336. [Google Scholar] [CrossRef]
- Blu, T.; Thevenaz, P.; Unser, M. Linear Interpolation Revitalized. IEEE Trans. Image Process. 2004, 13, 710–719. [Google Scholar] [CrossRef] [Green Version]
- Li, H.; Cao, Y.; Li, S.; Zhao, J.; Sun, Y. XGBoost Model and Its Application to Personal Credit Evaluation. IEEE Intell. Syst. 2020, 35, 52–61. [Google Scholar] [CrossRef]
- Martino, R.; Cilardo, A. SHA-2 Acceleration Meeting the Needs of Emerging Applications: A Comparative Survey. IEEE Access 2020, 8, 28415–28436. [Google Scholar] [CrossRef]
- OpenEI. Open Energy Information: Smart Meters Data from Houses. Available online: https://openei.org/datasets/files/961/pub (accessed on 5 January 2022).
- Adhikari, U.; Morris, T.H.; Pan, S. Applying Non-Nested Generalized Exemplars Classification for Cyber-Power Event and Intrusion Detection. IEEE Trans. Smart Grid 2016, 9, 3928–3941. [Google Scholar] [CrossRef]
- Adhikari, U.; Morris, T.H.; Pan, S. Applying Hoeffding Adaptive Trees for Real-Time Cyber-Power Event and Intrusion Classification. IEEE Trans. Smart Grid 2017, 9, 4049–4060. [Google Scholar] [CrossRef]
- Pal, A.; Jolfaei, A.; Kant, K. A Fast Prekeying-Based Integrity Protection for Smart Grid Communications. IEEE Trans. Ind. Inform. 2021, 17, 5751–5758. [Google Scholar] [CrossRef]
- Aghapour, S.; Kaveh, M.; Martín, D.; Mosavi, M.R. An Ultra-Lightweight and Provably Secure Broadcast Authentication Protocol for Smart Grid Communications. IEEE Access 2020, 8, 125477–125487. [Google Scholar] [CrossRef]
Symbol | Description |
---|---|
The predicted data value of ith sample | |
The actual data value of ith sample | |
Features information of the ith sample, ∈ dataset | |
The loss function of the ith sample | |
Regular term of objective function to prevent over-fitting | |
Shows result of the decision tree | |
T | No. of leaf nodes of Tree |
Contraction coefficient of T | |
N | Total number of area with smart meters. |
m | Total number of residential houses with smart meters in each area. |
threshold value of m | |
Energy consumption Data | |
n | Total number of energy data |
Represents the tth decision tree | |
First derivative of loss function | |
Second derivative of loss function | |
Sum of first derivatives after splitting of node | |
Sum of second derivatives after node splitting | |
penalty coefficient of the score of leaf node | |
coefficient of the regularization term | |
L | Left node |
R | Right node |
Minimum number of characters in a data file |
Parameters | Configuration |
---|---|
Size of hash value | 512 |
Message block size | 1024 |
Internal state size | 512 |
Maximum message size | |
Complexity of the best attack | |
Word size | 64 |
Number of words | 8 |
Number of digest rounds | 80 |
Constants Kt number | 80 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kumari, A.; Patel, R.K.; Sukharamwala, U.C.; Tanwar, S.; Raboaca, M.S.; Saad, A.; Tolba, A. AI-Empowered Attack Detection and Prevention Scheme for Smart Grid System. Mathematics 2022, 10, 2852. https://doi.org/10.3390/math10162852
Kumari A, Patel RK, Sukharamwala UC, Tanwar S, Raboaca MS, Saad A, Tolba A. AI-Empowered Attack Detection and Prevention Scheme for Smart Grid System. Mathematics. 2022; 10(16):2852. https://doi.org/10.3390/math10162852
Chicago/Turabian StyleKumari, Aparna, Rushil Kaushikkumar Patel, Urvi Chintukumar Sukharamwala, Sudeep Tanwar, Maria Simona Raboaca, Aldosary Saad, and Amr Tolba. 2022. "AI-Empowered Attack Detection and Prevention Scheme for Smart Grid System" Mathematics 10, no. 16: 2852. https://doi.org/10.3390/math10162852
APA StyleKumari, A., Patel, R. K., Sukharamwala, U. C., Tanwar, S., Raboaca, M. S., Saad, A., & Tolba, A. (2022). AI-Empowered Attack Detection and Prevention Scheme for Smart Grid System. Mathematics, 10(16), 2852. https://doi.org/10.3390/math10162852