Classification of intrusion cyber-attacks in smart power grids using deep ensemble learning with metaheuristic-based optimization

被引:15
作者
Naeem, Hamad [1 ]
Ullah, Farhan [2 ]
Srivastava, Gautam [3 ,4 ,5 ]
机构
[1] King Faisal Univ, Coll Comp Sci & Informat Technol CCSIT, Dept Comp Sci, Al Hasa, Saudi Arabia
[2] Northwestern Polytech Univ, Sch Software, Xian, Peoples R China
[3] Lebanese Amer Univ, Dept Comp Sci & Math, Beirut, Lebanon
[4] China Med Univ, Res Ctr Interneural Comp, Taichung, Taiwan
[5] Brandon Univ, Dept Math & Comp Sci, Brandon, MB R7A 6A9, Canada
关键词
cyber-attack; ensemble learning; explainable artificial intelligence; Grey-Wolf optimizer; intrusion classification; smart cities; smart grids; FEATURE-SELECTION; SYSTEMS; CNN;
D O I
10.1111/exsy.13556
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The most advanced power grid design, known as a 'smart power grid', integrates information and communication technology (ICT) with a conventional grid system to enable remote management of electricity distribution. The intelligent cyber-physical architecture enables bidirectional, real-time data sharing between electricity suppliers and consumers through smart meters and advanced metering infrastructure (AMI). Data protection issues, such as data tampering, firmware exploitation, and the leakage of sensitive information arise due to the smart power grid's substantial reliance on ICT. To maintain reliable and efficient power distribution, these issues must be identified and resolved quickly. Intrusion detection is essential for providing secure services and alerting system administrators in the case of adversary attacks. This paper proposes an intrusion classification scheme that identifies several types of cyber attacks on modern smart power grids. Grey-Wolf metaheuristic optimization-based feature selection is used to learn non-linear, overlapping, and complex electrical grid properties. An extended deep-stacked ensemble technique is advanced by putting predictions from weak learners (CNNs) into a meta-learner (MLP). The outcomes of this approach are explained and confirmed using explainable AI (XAI). The publicly available dataset from Mississippi State University and Oak Ridge National Laboratory (MSU-ORNL) is used to conduct experiments. The experimental results show that the proposed method achieved a peak accuracy of 96.6% while scrutinizing the original MSU-ORNL data feature set and a maximum accuracy of 99% when analysing the selected feature set. Therefore, the proposed intrusion classification scheme may protect smart power grid systems against cyber security attacks.
引用
收藏
页数:25
相关论文
共 54 条
[21]  
Hsu J., 2014, Mississippi State University Project Report-SCADA Anomaly Detection
[22]   A Deep and Scalable Unsupervised Machine Learning System for Cyber-Attack Detection in Large-Scale Smart Grids [J].
Karimipour, Hadis ;
Dehghantanha, Ali ;
Parizi, Reza M. ;
Choo, Kim-Kwang Raymond ;
Leung, Henry .
IEEE ACCESS, 2019, 7 :80778-80788
[23]  
Karimipour H, 2017, 2017 5TH IEEE INTERNATIONAL CONFERENCE ON SMART ENERGY GRID ENGINEERING (SEGE), P388, DOI 10.1109/SEGE.2017.8052831
[24]   Intelligent intrusion detection system in smart grid using computational intelligence and machine learning [J].
Khan, Suleman ;
Kifayat, Kashif ;
Kashif Bashir, Ali ;
Gurtov, Andrei ;
Hassan, Mehdi .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (06)
[25]   Ensemble Learning Methods for Anomaly Intrusion Detection System in Smart Grid [J].
Khoei, Tala Talaei ;
Aissou, Ghilas ;
Hu, When Chen ;
Kaabouch, Naima .
2021 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY (EIT), 2021, :129-135
[26]   Improving Detection of False Data Injection Attacks Using Machine Learning with Feature Selection and Oversampling [J].
Kumar, Ajit ;
Saxena, Neetesh ;
Jung, Souhwan ;
Choi, Bong Jun .
ENERGIES, 2022, 15 (01)
[27]  
Kume R, 2012, IEEE ICC
[28]   Sustainable Ensemble Learning Driving Intrusion Detection Model [J].
Li, Xinghua ;
Zhu, Mengyao ;
Yang, Laurence T. ;
Xu, Mengfan ;
Ma, Zhuo ;
Zhong, Cheng ;
Li, Hui ;
Xiang, Yang .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (04) :1591-1604
[29]   A hierarchical intrusion detection model based on the PCA neural networks [J].
Liu, Guisong ;
Yi, Zhang ;
Yang, Shangming .
NEUROCOMPUTING, 2007, 70 (7-9) :1561-1568
[30]  
Manekar V., 2014, International Journal of Advanced Computer Research, V4, P808