An Adoptive Miner-Misuse Based Online Anomaly Detection Approach in the Power System: An Optimum Reinforcement Learning Method

被引:5
作者
Almalaq, Abdulaziz [1 ]
Albadran, Saleh [1 ]
Mohamed, Mohamed A. [2 ]
机构
[1] Univ Hail, Engn Coll, Dept Elect Engn, Hail 55476, Saudi Arabia
[2] Minia Univ, Fac Engn, Elect Engn Dept, Al Minya 61519, Egypt
关键词
reinforcement learning; FDI attack; mining device; power system; UT method; attack detection; CYBER SECURITY; SMART; ATTACK; HYBRID;
D O I
10.3390/math11040884
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Over the past few years, the Bitcoin-based financial trading system (BFTS) has created new challenges for the power system due to the high-risk consumption of mining devices. Briefly, such a problem would be a compelling incentive for cyber-attackers who intend to inflict significant infections on a power system. Simply put, an effort to phony up the consumption data of mining devices results in the furtherance of messing up the optimal energy management within the power system. Hence, this paper introduces a new cyber-attack named miner-misuse for power systems equipped by transaction tech. To overwhelm this dispute, this article also addresses an online coefficient anomaly detection approach with reliance on the reinforcement learning (RL) concept for the power system. On account of not being sufficiently aware of the system, we fulfilled the Observable Markov Decision Process (OMDP) idea in the RL mechanism in order to barricade the miner attack. The proposed method would be enhanced in an optimal and punctual way if the setting parameters were properly established in the learning procedure. So to speak, a hybrid mechanism of the optimization approach and learning structure will not only guarantee catching in the best and most far-sighted solution but also become the high converging time. To this end, this paper proposes an Intelligent Priority Selection (IPS) algorithm merging with the suggested RL method to become more punctual and optimum in the way of detecting miner attacks. Additionally, to conjure up the proposed detection approach's effectiveness, mathematical modeling of the energy consumption of the mining devices based on the hashing rate within BFTS is provided. The uncertain fluctuation related to the needed energy of miners makes energy management unpredictable and needs to be dealt with. Hence, the unscented transformation (UT) method can obtain a high chance of precisely modeling the uncertain parameters within the system. All in all, the F-score value and successful probability of attack inferred from results revealed that the proposed anomaly detection method has the ability to identify the miner attacks as real-time-short as possible compared to other approaches.
引用
收藏
页数:22
相关论文
共 43 条
[1]   A comprehensive review on uncertainty modeling techniques in power system studies [J].
Aien, Morteza ;
Hajebrahimi, Ali ;
Fotuhi-Firuzabad, Mahmud .
RENEWABLE & SUSTAINABLE ENERGY REVIEWS, 2016, 57 :1077-1089
[2]   Hybrid Wind/PV/Battery Energy Management-Based Intelligent Non-Integer Control for Smart DC-Microgrid of Smart University [J].
Alahmadi, Ahmad Aziz Al ;
Belkhier, Youcef ;
Ullah, Nasim ;
Abeida, Habti ;
Soliman, Mohamed S. ;
Khraisat, Yahya Salameh Hassan ;
Alharbi, Yasser Mohammed .
IEEE ACCESS, 2021, 9 :98948-98961
[3]   Deep Machine Learning Model-Based Cyber-Attacks Detection in Smart Power Systems [J].
Almalaq, Abdulaziz ;
Albadran, Saleh ;
Mohamed, Mohamed A. .
MATHEMATICS, 2022, 10 (15)
[4]   An Effective Hybrid-Energy Framework for Grid Vulnerability Alleviation under Cyber-Stealthy Intrusions [J].
Almalaq, Abdulaziz ;
Albadran, Saleh ;
Alghadhban, Amer ;
Jin, Tao ;
Mohamed, Mohamed A. .
MATHEMATICS, 2022, 10 (14)
[5]   Effective Energy Management via False Data Detection Scheme for the Interconnected Smart Energy Hub-Microgrid System under Stochastic Framework [J].
Alnowibet, Khalid ;
Annuk, Andres ;
Dampage, Udaya ;
Mohamed, Mohamed A. .
SUSTAINABILITY, 2021, 13 (21)
[6]   A Malware Attack Enabled an Online Energy Strategy for Dynamic Wireless EVs within Transportation Systems [J].
Alsokhiry, Fahad ;
Annuk, Andres ;
Kabanen, Toivo ;
Mohamed, Mohamed A. .
MATHEMATICS, 2022, 10 (24)
[7]  
[Anonymous], 2010, NIPS
[8]  
[Anonymous], 2016, Cryptology ePrint Archive, Report 2016/889
[9]   Impact of Distributed Denial-of-Service Attack on Advanced Metering Infrastructure [J].
Asri, Satin ;
Pranggono, Bernardi .
WIRELESS PERSONAL COMMUNICATIONS, 2015, 83 (03) :2211-2223
[10]   Reinforcement Learning and Its Applications in Modern Power and Energy Systems: A Review [J].
Cao, Di ;
Hu, Weihao ;
Zhao, Junbo ;
Zhang, Guozhou ;
Zhang, Bin ;
Liu, Zhou ;
Chen, Zhe ;
Blaabjerg, Frede .
JOURNAL OF MODERN POWER SYSTEMS AND CLEAN ENERGY, 2020, 8 (06) :1029-1042