2021
DOI: 10.3390/info12080328
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Cyber Attacks in Smart Grids Using Semi-Supervised Anomaly Detection and Deep Representation Learning

Abstract: Smart grids integrate advanced information and communication technologies (ICTs) into traditional power grids for more efficient and resilient power delivery and management, but also introduce new security vulnerabilities that can be exploited by adversaries to launch cyber attacks, causing severe consequences such as massive blackout and infrastructure damages. Existing machine learning-based methods for detecting cyber attacks in smart grids are mostly based on supervised learning, which need the instances o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(19 citation statements)
references
References 43 publications
0
14
1
Order By: Relevance
“…Table 3 depicts the comparison between OCC-PCA and TOCC models. Both [15] and [23]'s models employed the PCA classifier, although their findings were less conclusive than in this study. In [15], which provided the SIMCA and OCSVM models.…”
Section: Analysis and Evaluate The Resultscontrasting
confidence: 83%
See 1 more Smart Citation
“…Table 3 depicts the comparison between OCC-PCA and TOCC models. Both [15] and [23]'s models employed the PCA classifier, although their findings were less conclusive than in this study. In [15], which provided the SIMCA and OCSVM models.…”
Section: Analysis and Evaluate The Resultscontrasting
confidence: 83%
“…This model did not apply dimensionality reduction automatically on their datasets. Furthermore, in [23], a unique method for exploiting PMU data to detect cyberattacks on smart grids was suggested and built. It uses publicly accessible datasets on power system hacks and is based on semi-supervised anomaly identification.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The recall is also very high (it is actually perfect for cryptomining execution detection), while the FPR has a relatively low value of 0.014 for both of the evaluated attacks. For benchmarking, we compared our two-step method with a variety of classical one-step algorithms widely used for anomaly and novelty detection in general [42], [87]- [90], and for IoT attack detection in particular [19], [91]. Two of these algorithms are the building blocks of CADeSH (namely, AE and k-means clustering, which we used to implement F ilter m 1 and F ilter m 2 , respectively).…”
Section: Overall Results and Benchmarkingmentioning
confidence: 99%
“…A similar application [126] helps detect stealthy FDIA on four IEEE distribution network models. But in [127], compared with supervised learning algorithms, Isolation Forest shows worse performance with the higher false-positive rate on a reduced-dimension dataset which includes both natural contingencies and attack events.…”
Section: Data-driven Approach: Unsupervised Learning Methodsmentioning
confidence: 97%