2023
DOI: 10.3390/math11040884
|View full text |Cite
|
Sign up to set email alerts
|

An Adoptive Miner-Misuse Based Online Anomaly Detection Approach in the Power System: An Optimum Reinforcement Learning Method

Abstract: Over the past few years, the Bitcoin-based financial trading system (BFTS) has created new challenges for the power system due to the high-risk consumption of mining devices. Briefly, such a problem would be a compelling incentive for cyber-attackers who intend to inflict significant infections on a power system. Simply put, an effort to phony up the consumption data of mining devices results in the furtherance of messing up the optimal energy management within the power system. Hence, this paper introduces a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 32 publications
0
1
0
Order By: Relevance
“…In general, there are two sorts of NIDS based on how they identify intrusions on a network. When a network's sequence of actions matches a recognized attack signature, the misuse detection systems are able to identify an attack on that system [36]. The anomaly detection approach, which is the approach applied in this work, identifies anomalous states in a system based on a significant departure from its normal states in the state transitions of the system.…”
Section: Methodsmentioning
confidence: 99%
“…In general, there are two sorts of NIDS based on how they identify intrusions on a network. When a network's sequence of actions matches a recognized attack signature, the misuse detection systems are able to identify an attack on that system [36]. The anomaly detection approach, which is the approach applied in this work, identifies anomalous states in a system based on a significant departure from its normal states in the state transitions of the system.…”
Section: Methodsmentioning
confidence: 99%