2023
DOI: 10.35833/mpce.2021.000279
|View full text |Cite
|
Sign up to set email alerts
|

An Intrusion Detection Method for Advanced Metering Infrastructure System Based on Federated Learning

Abstract: An advanced metering infrastructure (AMI) system plays a key role in the smart grid (SG), but it is vulnerable to cyberattacks. Current detection methods for AMI cyberattacks mainly focus on the data center or a distributed independent node. On one hand, it is difficult to train an excellent detection intrusion model on a self-learning independent node. On the other hand, large amounts of data are shared over the network and uploaded to a central node for training. These processes may compromise data privacy, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 37 publications
0
6
0
Order By: Relevance
“…Another research article by Zhao et al proposed [36] an IDS using FL for IoT environments. Liang et al proposed an IDS to detect cyber-attacks in advanced metering infrastructure (AMI) systems [37]. They used DNN as a training model with FL in their proposed model.…”
Section: ) Federated Learningmentioning
confidence: 99%
“…Another research article by Zhao et al proposed [36] an IDS using FL for IoT environments. Liang et al proposed an IDS to detect cyber-attacks in advanced metering infrastructure (AMI) systems [37]. They used DNN as a training model with FL in their proposed model.…”
Section: ) Federated Learningmentioning
confidence: 99%
“…Data heterogeneity [4], [17], [18], [25], [27], [31], [32], [33], [34], [35], [36], [37], [38], [39], [40], [41], [42], [43], [44] x x [45] x x [46], [47], [48], [49], [50], [51], [52], [53], [54], [55], [56], [57], [58], [59], [60] x [61] x x x [28], [62], [63] x x [64] x x [7], [20] x x x x [8], [9], [19], [65], [66], [67], [68], [69], [70], [71],…”
Section: Model Generalization Abilitymentioning
confidence: 99%
“…Energy management systems [28], [37], [41], [46], [49], [58], [62], [78], [89] Preserving Anomaly detection [39], [43], [80], [87] High detection accuracy; improve the privacy; high communication efficiency; good scalability.…”
Section: Potential Model Inversion Attackmentioning
confidence: 99%
See 2 more Smart Citations