Deep Learning Detection of Electricity Theft Cyber-Attacks in Renewable Distributed Generation

被引:151
作者
Ismail, Muhammad [1 ]
Shaaban, Mostafa F. [2 ]
Naidu, Mahesh [3 ]
Serpedin, Erchin [3 ]
机构
[1] Tennessee Technol Univ, Dept Comp Sci, Cookeville, TN 38505 USA
[2] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
[3] Texas A&M Univ, Dept Elect & Comp Engn, College Stn, TX 77843 USA
关键词
Smart meters; Detectors; Companies; Meters; Machine learning; Monitoring; Distributed power generation; Distributed generation; electricity theft; deep machine learning; hyper-parameter optimization;
D O I
10.1109/TSG.2020.2973681
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Unlike the existing research that focuses on detecting electricity theft cyber-attacks in the consumption domain, this paper investigates electricity thefts at the distributed generation (DG) domain. In this attack, malicious customers hack into the smart meters monitoring their renewable-based DG units and manipulate their readings to claim higher supplied energy to the grid and hence falsely overcharge the utility company. Deep machine learning is investigated to detect such a malicious behavior. We aim to answer three main questions in this paper: a) What are the cyber-attack functions that can be applied by malicious customers to the generation data in order to falsely overcharge the utility company? b) What sources of data can be used in order to detect these cyber-attacks by the utility company? c) Which deep machine learning-model should be used in order to detect these cyber-attacks? Our investigation revealed that integrating various data from the DG smart meters, meteorological reports, and SCADA metering points in the training of a deep convolutional-recurrent neural network offers the highest detection rate (99.3%) and lowest false alarm (0.22%).
引用
收藏
页码:3428 / 3437
页数:10
相关论文
共 25 条
[1]  
[Anonymous], FEED IN TARIFF MICRO
[2]  
[Anonymous], SEQUENTIAL MODEL API
[3]  
[Anonymous], GETTING STARTED KERA
[4]  
Cárdenas AA, 2012, ANN ALLERTON CONF, P1830, DOI 10.1109/Allerton.2012.6483444
[5]   Detection and Identification of Abnormalities in Customer Consumptions in Power Distribution Systems [J].
dos Angelos, Eduardo Werley S. ;
Saavedra, Osvaldo R. ;
Carmona Cortes, Omar A. ;
de Souza, Andre Nunes .
IEEE TRANSACTIONS ON POWER DELIVERY, 2011, 26 (04) :2436-2442
[6]  
Goodfellow I, 2016, ADAPT COMPUT MACH LE, P1
[7]   ADASYN: Adaptive Synthetic Sampling Approach for Imbalanced Learning [J].
He, Haibo ;
Bai, Yang ;
Garcia, Edwardo A. ;
Li, Shutao .
2008 IEEE INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1-8, 2008, :1322-1328
[8]   Real-Time Detection of False Data Injection Attacks in Smart Grid: A Deep Learning-Based Intelligent Mechanism [J].
He, Youbiao ;
Mendis, Gihan J. ;
Wei, Jin .
IEEE TRANSACTIONS ON SMART GRID, 2017, 8 (05) :2505-2516
[9]   Decision Tree and SVM-Based Data Analytics for Theft Detection in Smart Grid [J].
Jindal, Anish ;
Dua, Amit ;
Kaur, Kuljeet ;
Singh, Mukesh ;
Kumar, Neeraj ;
Mishra, S. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2016, 12 (03) :1005-1016
[10]   Electricity Theft Detection in AMI Using Customers' Consumption Patterns [J].
Jokar, Paria ;
Arianpoo, Nasim ;
Leung, Victor C. M. .
IEEE TRANSACTIONS ON SMART GRID, 2016, 7 (01) :216-226