Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
129 tokens/sec
GPT-4o
28 tokens/sec
Gemini 2.5 Pro Pro
42 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Anomaly-based Framework for Detecting Power Overloading Cyberattacks in Smart Grid AMI (2407.03264v1)

Published 3 Jul 2024 in cs.CR and eess.SP

Abstract: The Advanced Metering Infrastructure (AMI) is one of the key components of the smart grid. It provides interactive services for managing billing and electricity consumption, but it also introduces new vectors for cyberattacks. Although, the devastating and severe impact of power overloading cyberattacks on smart grid AMI, few researches in the literature have addressed them. In the present paper, we propose a two-level anomaly detection framework based on regression decision trees. The introduced detection approach leverages the regularity and predictability of energy consumption to build reference consumption patterns for the whole neighborhood and each household within it. Using a reference consumption pattern enables detecting power overloading cyberattacks regardless of the attacker's strategy as they cause a drastic change in the consumption pattern. The continuous two-level monitoring of energy consumption load allows efficient and early detection of cyberattacks. We carried out an extensive experiment on a real-world publicly available energy consumption dataset of 500 customers in Ireland. We extracted, from the raw data, the relevant attributes for training the energy consumption patterns. The evaluation shows that our approach achieves a high detection rate, a low false alarm rate, and superior performances compared to existing solutions.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (25)
  1. doi:10.1109/ICC.2013.6655271. URL http://ieeexplore.ieee.org/document/6655271/
  2. doi:10.1109/ICCAD.2014.7001350. URL http://ieeexplore.ieee.org/document/7001350/
  3. doi:10.1109/TDSC.2015.2427841. URL http://ieeexplore.ieee.org/document/7115920/
  4. doi:10.1109/TII.2016.2591911. URL http://ieeexplore.ieee.org/document/7515006/
  5. doi:https://doi.org/10.1016/j.future.2013.06.030. URL http://www.sciencedirect.com/science/article/pii/S0167739X13001441
  6. doi:10.1109/TSG.2016.2521339.
  7. doi:10.1049/iet-cps.2017.0013.
  8. doi:10.1109/TETC.2015.2484841.
  9. doi:10.1109/TSG.2015.2425222. URL http://ieeexplore.ieee.org/document/7108042/
  10. doi:10.1109/TCSS.2016.2519506.
  11. doi:https://doi.org/10.1016/j.ijepes.2017.04.005. URL http://www.sciencedirect.com/science/article/pii/S0142061516316386
  12. doi:10.1109/MCS.2014.2364711.
  13. doi:https://doi.org/10.1016/j.ijepes.2018.03.025.
  14. doi:10.1109/CIASG.2014.7011557.
  15. doi:10.1109/ICMLA.2015.80.
  16. Irish social science data archive. [online]. available:. URL http://www.ucd.ie/issda/data/commissionforenergyregulationcer/
  17. doi:10.1109/JSYST.2013.2294120. URL http://ieeexplore.ieee.org/document/6720175/
  18. doi:10.1109/TSG.2011.2159818. URL http://ieeexplore.ieee.org/document/5963752/
  19. Kdd cup 1999 data, 1999. [online]. available:. URL http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
  20. doi:10.1109/TSG.2015.2453342. URL http://ieeexplore.ieee.org/document/7182779/
  21. doi:10.1109/COMST.2014.2320093. URL http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6805165
  22. arXiv:arXiv:1011.1669v3, doi:10.1002/1521-3773(20010316)40:6<9823::AID-ANIE9823>3.3.CO;2-C. URL http://www.cs.waikato.ac.nz/{~}ml/weka/book.html{%}5Cnhttp://www.amazon.com/Data-Mining-Practical-Techniques-Management/dp/0123748569
  23. doi:10.1023/A:1010933404324. URL https://doi.org/10.1023/A:1010933404324
  24. doi:10.1016/j.asoc.2014.07.015. URL http://linkinghub.elsevier.com/retrieve/pii/S1568494614003469
  25. The university of waikato, “weka 3: Data mining software in java” cs.waikato.ac.nz. [online]. [accessed: February 3, 2018]. URL https://www.cs.waikato.ac.nz/ml/weka/citing.html
Citations (22)

Summary

We haven't generated a summary for this paper yet.