Data-centric explainable artificial intelligence techniques for cyber-attack detection in microgrid networks

被引:0
|
作者
Trivedi, Rohit [1 ]
Patra, Sandipan [1 ]
Khadem, Shafi [1 ]
机构
[1] UCC, Tyndall Natl Inst, Int Energy Res Ctr, Cork, Ireland
关键词
Cyber security; Explainable AI; Machine learning; Deep learning; Neural network; CIGRE; Microgrid; Data Augmentation; Feature engineering; NEURAL-NETWORK; SMART GRIDS;
D O I
10.1016/j.egyr.2024.11.075
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
This article presents a strategy for pre-processing data and interpreting the performance of advanced machine learning (ML) models to improve data quality and modify the models based on identified problems during the iterative development of classification models. The process consists of three main stages aimed at maximizing the performance of ML models. Stage-1 involves data collection and preprocessing. Stage-2 focuses on improving data quality and extracting features. The extracted features are further refined using hyperparameters in Stage-3. Additionally, the framework utilizes SHapley Additive exPlanations (SHAP) for explainable artificial intelligence (XAI) to elucidate the learning process of ML models and, therefore, make the model's behavior interpretable. As an example, this innovative process has been applied to cyber-attack detection in microgrid networks. In Stages- 1, a CIGRE low-voltage microgrid network is simulated for data collection during cyber-attacks, followed by data pre-processing. In Stage-2, data augmentation is performed using SMOTE and ENN, and feature extraction is carried out using the Boruta Python package. In Stage-3, hyperparameters are tuned using the TPE algorithm. The results demonstrate the effectiveness of this approach, enabling the model to progressively enhance its predictive capacity through each stage.
引用
收藏
页码:217 / 229
页数:13
相关论文
共 50 条
  • [1] Data-Centric Artificial Intelligence
    Jakubik, Johannes
    Voessing, Michael
    Kuehl, Niklas
    Walk, Jannis
    Satzger, Gerhard
    BUSINESS & INFORMATION SYSTEMS ENGINEERING, 2024, 66 (04) : 507 - 515
  • [2] Data-centric Artificial Intelligence: A Survey
    Zha, Daochen
    Bhat, Zaid Pervaiz
    Lai, Kwei-Herng
    Yang, Fan
    Jiang, Zhimeng
    Zhong, Shaochen
    Hu, Xia
    ACM COMPUTING SURVEYS, 2025, 57 (05)
  • [3] Data-Centric Green Artificial Intelligence: A Survey
    Salehi S.
    Schmeink A.
    IEEE Transactions on Artificial Intelligence, 2024, 5 (05): : 1973 - 1989
  • [4] Data Mining Based Cyber-Attack Detection
    TIANFIELD Huaglory
    系统仿真技术, 2017, 13 (02) : 90 - 104
  • [5] Technical Analysis of Data-Centric and Model-Centric Artificial Intelligence
    Majeed, Abdul
    Hwang, Seong Oun
    IT PROFESSIONAL, 2023, 25 (06) : 62 - 70
  • [6] Performance evaluation of unsupervised techniques in cyber-attack anomaly detection
    Meira, Jorge
    Andrade, Rui
    Praca, Isabel
    Carneiro, Joao
    Bolon-Canedo, Veronica
    Alonso-Betanzos, Amparo
    Marreiros, Goreti
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (11) : 4477 - 4489
  • [7] Performance evaluation of unsupervised techniques in cyber-attack anomaly detection
    Jorge Meira
    Rui Andrade
    Isabel Praça
    João Carneiro
    Verónica Bolón-Canedo
    Amparo Alonso-Betanzos
    Goreti Marreiros
    Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 4477 - 4489
  • [8] Data-Centric Artificial Intelligence, Preprocessing, and the Quest for Transformative Artificial Intelligence Systems Development
    Majeed, Abdul
    Hwang, Seong Oun
    COMPUTER, 2023, 56 (05) : 109 - 115
  • [9] Data-centric automated approach to predict autism spectrum disorder based on selective features and explainable artificial intelligence
    Aldrees, Asma
    Ojo, Stephen
    Wanliss, James
    Umer, Muhammad
    Khan, Muhammad Attique
    Alabdullah, Bayan
    Alsubai, Shtwai
    Innab, Nisreen
    FRONTIERS IN COMPUTATIONAL NEUROSCIENCE, 2024, 18
  • [10] A Data-Centric Approach to Insider Attack Detection in Database Systems
    Mathew, Sunu
    Petropoulos, Michalis
    Ngo, Hung Q.
    Upadhyaya, Shambhu
    RECENT ADVANCES IN INTRUSION DETECTION, 2010, 6307 : 382 - +