A Performance Comparison of Data Mining Algorithms Based Intrusion
Detection System for Smart Grid
- URL: http://arxiv.org/abs/2001.00917v1
- Date: Tue, 31 Dec 2019 20:48:13 GMT
- Title: A Performance Comparison of Data Mining Algorithms Based Intrusion
Detection System for Smart Grid
- Authors: Zakaria El Mrabet, Hassan El Ghazi, Naima Kaabouch
- Abstract summary: Intrusion detection system (IDS) plays an important role in securing smart grid networks and detecting malicious activity.
This paper presents an overview of four data mining algorithms used by IDS in Smart Grid.
Results show that Random Forest outperforms the other three algorithms in detecting attacks with higher probability of detection, lower probability of false alarm, lower probability of miss detection, and higher accuracy.
- Score: 0.6445605125467573
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Smart grid is an emerging and promising technology. It uses the power of
information technologies to deliver intelligently the electrical power to
customers, and it allows the integration of the green technology to meet the
environmental requirements. Unfortunately, information technologies have its
inherent vulnerabilities and weaknesses that expose the smart grid to a wide
variety of security risks. The Intrusion detection system (IDS) plays an
important role in securing smart grid networks and detecting malicious
activity, yet it suffers from several limitations. Many research papers have
been published to address these issues using several algorithms and techniques.
Therefore, a detailed comparison between these algorithms is needed. This paper
presents an overview of four data mining algorithms used by IDS in Smart Grid.
An evaluation of performance of these algorithms is conducted based on several
metrics including the probability of detection, probability of false alarm,
probability of miss detection, efficiency, and processing time. Results show
that Random Forest outperforms the other three algorithms in detecting attacks
with higher probability of detection, lower probability of false alarm, lower
probability of miss detection, and higher accuracy.
Related papers
- Towards Robust IoT Defense: Comparative Statistics of Attack Detection in Resource-Constrained Scenarios [1.3812010983144802]
Resource constraints pose a significant cybersecurity threat to IoT smart devices.
We conduct an extensive statistical analysis of cyberattack detection algorithms under resource constraints to identify the most efficient one.
arXiv Detail & Related papers (2024-10-10T10:58:03Z) - Benchmark Evaluation of Anomaly-Based Intrusion Detection Systems in the Context of Smart Grids [2.479074862022315]
Anomaly detection has emerged as a key technology for cybersecurity in smart grids.
We present an evaluation environment for anomaly detection methods in smart grids.
arXiv Detail & Related papers (2023-12-21T10:17:36Z) - AI-Based Energy Transportation Safety: Pipeline Radial Threat Estimation
Using Intelligent Sensing System [52.93806509364342]
This paper proposes a radial threat estimation method for energy pipelines based on distributed optical fiber sensing technology.
We introduce a continuous multi-view and multi-domain feature fusion methodology to extract comprehensive signal features.
We incorporate the concept of transfer learning through a pre-trained model, enhancing both recognition accuracy and training efficiency.
arXiv Detail & Related papers (2023-12-18T12:37:35Z) - Machine-learned Adversarial Attacks against Fault Prediction Systems in
Smart Electrical Grids [17.268321134222667]
This study investigates the challenges associated with the security of machine learning (ML) applications in the smart grid scenario.
We demonstrate first that the deep neural network method used in the smart grid is susceptible to adversarial perturbation.
Then, we highlight how studies on fault localization and type classification illustrate the weaknesses of present ML algorithms in smart grids to various adversarial attacks.
arXiv Detail & Related papers (2023-03-28T10:19:03Z) - Sparsity May Cry: Let Us Fail (Current) Sparse Neural Networks Together! [100.19080749267316]
"Sparsity May Cry" Benchmark (SMC-Bench) is a collection of carefully-curated 4 diverse tasks with 10 datasets.
SMC-Bench is designed to favor and encourage the development of more scalable and generalizable sparse algorithms.
arXiv Detail & Related papers (2023-03-03T18:47:21Z) - Effective Metaheuristic Based Classifiers for Multiclass Intrusion
Detection [0.0]
Intrusion detection plays an important role in the security of information systems or networks devices.
Having a large amount of data is one of the key problems in detecting attacks.
A feature selection method plays a key role to select best features to achieve maximum accuracy.
arXiv Detail & Related papers (2022-10-06T04:56:01Z) - A Robust and Explainable Data-Driven Anomaly Detection Approach For
Power Electronics [56.86150790999639]
We present two anomaly detection and classification approaches, namely the Matrix Profile algorithm and anomaly transformer.
The Matrix Profile algorithm is shown to be well suited as a generalizable approach for detecting real-time anomalies in streaming time-series data.
A series of custom filters is created and added to the detector to tune its sensitivity, recall, and detection accuracy.
arXiv Detail & Related papers (2022-09-23T06:09:35Z) - An Ensemble Deep Convolutional Neural Network Model for Electricity
Theft Detection in Smart Grids [2.281079191664481]
Electricity Theft Detection (EDT) algorithms are typically used for such purpose since this Non-Technical Loss (NTL) may lead to significant challenges in the power system.
In this paper, an Ensemble Deep Convolutional Neural Network (EDCNN) algorithm for ETD in smart grids has been proposed.
arXiv Detail & Related papers (2021-02-10T18:27:13Z) - Increasing the Confidence of Deep Neural Networks by Coverage Analysis [71.57324258813674]
This paper presents a lightweight monitoring architecture based on coverage paradigms to enhance the model against different unsafe inputs.
Experimental results show that the proposed approach is effective in detecting both powerful adversarial examples and out-of-distribution inputs.
arXiv Detail & Related papers (2021-01-28T16:38:26Z) - Bayesian Optimization with Machine Learning Algorithms Towards Anomaly
Detection [66.05992706105224]
In this paper, an effective anomaly detection framework is proposed utilizing Bayesian Optimization technique.
The performance of the considered algorithms is evaluated using the ISCX 2012 dataset.
Experimental results show the effectiveness of the proposed framework in term of accuracy rate, precision, low-false alarm rate, and recall.
arXiv Detail & Related papers (2020-08-05T19:29:35Z) - Adaptive Anomaly Detection for IoT Data in Hierarchical Edge Computing [71.86955275376604]
We propose an adaptive anomaly detection approach for hierarchical edge computing (HEC) systems to solve this problem.
We design an adaptive scheme to select one of the models based on the contextual information extracted from input data, to perform anomaly detection.
We evaluate our proposed approach using a real IoT dataset, and demonstrate that it reduces detection delay by 84% while maintaining almost the same accuracy as compared to offloading detection tasks to the cloud.
arXiv Detail & Related papers (2020-01-10T05:29:17Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.