Papers
Topics
Authors
Recent
Search
2000 character limit reached

Anomaly-based Framework for Detecting Power Overloading Cyberattacks in Smart Grid AMI

Published 3 Jul 2024 in cs.CR and eess.SP | (2407.03264v1)

Abstract: The Advanced Metering Infrastructure (AMI) is one of the key components of the smart grid. It provides interactive services for managing billing and electricity consumption, but it also introduces new vectors for cyberattacks. Although, the devastating and severe impact of power overloading cyberattacks on smart grid AMI, few researches in the literature have addressed them. In the present paper, we propose a two-level anomaly detection framework based on regression decision trees. The introduced detection approach leverages the regularity and predictability of energy consumption to build reference consumption patterns for the whole neighborhood and each household within it. Using a reference consumption pattern enables detecting power overloading cyberattacks regardless of the attacker's strategy as they cause a drastic change in the consumption pattern. The continuous two-level monitoring of energy consumption load allows efficient and early detection of cyberattacks. We carried out an extensive experiment on a real-world publicly available energy consumption dataset of 500 customers in Ireland. We extracted, from the raw data, the relevant attributes for training the energy consumption patterns. The evaluation shows that our approach achieves a high detection rate, a low false alarm rate, and superior performances compared to existing solutions.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (25)
  1. doi:10.1109/ICC.2013.6655271. URL http://ieeexplore.ieee.org/document/6655271/
  2. doi:10.1109/ICCAD.2014.7001350. URL http://ieeexplore.ieee.org/document/7001350/
  3. doi:10.1109/TDSC.2015.2427841. URL http://ieeexplore.ieee.org/document/7115920/
  4. doi:10.1109/TII.2016.2591911. URL http://ieeexplore.ieee.org/document/7515006/
  5. doi:https://doi.org/10.1016/j.future.2013.06.030. URL http://www.sciencedirect.com/science/article/pii/S0167739X13001441
  6. doi:10.1109/TSG.2016.2521339.
  7. doi:10.1049/iet-cps.2017.0013.
  8. doi:10.1109/TETC.2015.2484841.
  9. doi:10.1109/TSG.2015.2425222. URL http://ieeexplore.ieee.org/document/7108042/
  10. doi:10.1109/TCSS.2016.2519506.
  11. doi:https://doi.org/10.1016/j.ijepes.2017.04.005. URL http://www.sciencedirect.com/science/article/pii/S0142061516316386
  12. doi:10.1109/MCS.2014.2364711.
  13. doi:https://doi.org/10.1016/j.ijepes.2018.03.025.
  14. doi:10.1109/CIASG.2014.7011557.
  15. doi:10.1109/ICMLA.2015.80.
  16. Irish social science data archive. [online]. available:. URL http://www.ucd.ie/issda/data/commissionforenergyregulationcer/
  17. doi:10.1109/JSYST.2013.2294120. URL http://ieeexplore.ieee.org/document/6720175/
  18. doi:10.1109/TSG.2011.2159818. URL http://ieeexplore.ieee.org/document/5963752/
  19. Kdd cup 1999 data, 1999. [online]. available:. URL http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
  20. doi:10.1109/TSG.2015.2453342. URL http://ieeexplore.ieee.org/document/7182779/
  21. doi:10.1109/COMST.2014.2320093. URL http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6805165
  22. arXiv:arXiv:1011.1669v3, doi:10.1002/1521-3773(20010316)40:6<9823::AID-ANIE9823>3.3.CO;2-C. URL http://www.cs.waikato.ac.nz/{~}ml/weka/book.html{%}5Cnhttp://www.amazon.com/Data-Mining-Practical-Techniques-Management/dp/0123748569
  23. doi:10.1023/A:1010933404324. URL https://doi.org/10.1023/A:1010933404324
  24. doi:10.1016/j.asoc.2014.07.015. URL http://linkinghub.elsevier.com/retrieve/pii/S1568494614003469
  25. The university of waikato, “weka 3: Data mining software in java” cs.waikato.ac.nz. [online]. [accessed: February 3, 2018]. URL https://www.cs.waikato.ac.nz/ml/weka/citing.html
Citations (22)

Summary

Paper to Video (Beta)

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.