2020
DOI: 10.1002/ett.4062
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent intrusion detection system in smart grid using computational intelligence and machine learning

Abstract: Smart grid systems enhanced the capability of traditional power networks while being vulnerable to different types of cyber-attacks. These vulnerabilities could cause attackers to crash into the network breaching the integrity and confidentiality of the smart grid systems. Therefore, an intrusion detection system (IDS) becomes an important way to provide a secure and reliable services in a smart grid environment. This article proposes a feature-based IDS for smart grid systems. The proposed system performance … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 34 publications
(15 citation statements)
references
References 50 publications
0
8
0
Order By: Relevance
“…These performance metrics are based on the True positive (TP), True Negative (TN), False positive (FP), and False Negative (FN). The analysis is compared with existing techniques to validate proposed system efficiency [21]. Tab.…”
Section: Performance Analysis Of Anomaly Detection In Smart Gridmentioning
confidence: 99%
“…These performance metrics are based on the True positive (TP), True Negative (TN), False positive (FP), and False Negative (FN). The analysis is compared with existing techniques to validate proposed system efficiency [21]. Tab.…”
Section: Performance Analysis Of Anomaly Detection In Smart Gridmentioning
confidence: 99%
“…Many advanced solutions provide successful intrusion detection with the support of machine learning. Such solutions are widely deployed for different applications such as auditing applications and smart grid and IoT [ 31 , 32 , 33 ] Some of the solutions provide virtual machine learning-based DDoS detection systems for SDN-enabled networking, but still demand significant enhancements to develop industrial level security solution [ 28 ].…”
Section: Related Workmentioning
confidence: 99%
“…The signature-based ML-NIDS method generally assumes that pre-labeled attack traffic data are made available in advance, and learns those known intrusion patterns using supervised learning algorithms [ 7 , 8 ], such as SVM [ 9 , 10 ] and Decision Tree [ 11 ]. Khan et al [ 12 ] used a particle swarm optimization method to select the optimal feature subset from a given dataset in terms of detection accuracy. The authors then evaluated several machine-learning algorithms such as random forest and neural network as classifiers using KDD Cup 99 [ 13 ] and NSL-KDD [ 14 ] datasets.…”
Section: Introductionmentioning
confidence: 99%