Machine Learning in Generation, Detection, and Mitigation of
Cyberattacks in Smart Grid: A Survey
- URL: http://arxiv.org/abs/2010.00661v1
- Date: Tue, 1 Sep 2020 05:16:51 GMT
- Title: Machine Learning in Generation, Detection, and Mitigation of
Cyberattacks in Smart Grid: A Survey
- Authors: Nur Imtiazul Haque, Md Hasan Shahriar, Md Golam Dastgir, Anjan
Debnath, Imtiaz Parvez, Arif Sarwat, Mohammad Ashiqur Rahman
- Abstract summary: Smart grid (SG) is a complex cyber-physical system that utilizes modern cyber and physical equipment to run at an optimal operating point.
Cyberattacks are the principal threats confronting the usage and advancement of the state-of-the-art systems.
Machine learning (ML) is being used to exploit and defend the cyberattacks in SG by the attackers and system operators.
- Score: 1.3299946892361474
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Smart grid (SG) is a complex cyber-physical system that utilizes modern cyber
and physical equipment to run at an optimal operating point. Cyberattacks are
the principal threats confronting the usage and advancement of the
state-of-the-art systems. The advancement of SG has added a wide range of
technologies, equipment, and tools to make the system more reliable, efficient,
and cost-effective. Despite attaining these goals, the threat space for the
adversarial attacks has also been expanded because of the extensive
implementation of the cyber networks. Due to the promising computational and
reasoning capability, machine learning (ML) is being used to exploit and defend
the cyberattacks in SG by the attackers and system operators, respectively. In
this paper, we perform a comprehensive summary of cyberattacks generation,
detection, and mitigation schemes by reviewing state-of-the-art research in the
SG domain. Additionally, we have summarized the current research in a
structured way using tabular format. We also present the shortcomings of the
existing works and possible future research direction based on our
investigation.
Related papers
- Countering Autonomous Cyber Threats [40.00865970939829]
Foundation Models present dual-use concerns broadly and within the cyber domain specifically.
Recent research has shown the potential for these advanced models to inform or independently execute offensive cyberspace operations.
This work evaluates several state-of-the-art FMs on their ability to compromise machines in an isolated network and investigates defensive mechanisms to defeat such AI-powered attacks.
arXiv Detail & Related papers (2024-10-23T22:46:44Z) - Generative AI in Cybersecurity [0.0]
Generative Artificial Intelligence (GAI) has been pivotal in reshaping the field of data analysis, pattern recognition, and decision-making processes.
As GAI rapidly progresses, it outstrips the current pace of cybersecurity protocols and regulatory frameworks.
The study highlights the critical need for organizations to proactively identify and develop more complex defensive strategies to counter the sophisticated employment of GAI in malware creation.
arXiv Detail & Related papers (2024-05-02T19:03:11Z) - Towards Automated Generation of Smart Grid Cyber Range for Cybersecurity Experiments and Training [8.492135678037787]
We have developed a framework for modelling a smart grid cyber range using an XML-based language, called SG-ML.
The framework aims at making a smart grid cyber range available to broader user bases to facilitate cybersecurity R&D and hands-on exercises.
arXiv Detail & Related papers (2024-04-01T02:34:53Z) - The Role of Deep Learning in Advancing Proactive Cybersecurity Measures
for Smart Grid Networks: A Survey [1.0589208420411014]
This study explores proactive cyber defense strategies utilizing Deep Learning (DL) in Smart Grids.
A significant focus is placed on DL-enabled proactive defenses, highlighting their roles and relevance in the proactive security of SG.
The survey lists the challenges associated with deploying DL-based security systems within SG, followed by an outlook on future developments in this key field.
arXiv Detail & Related papers (2024-01-11T13:14:40Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Artificial Intelligence-Based Smart Grid Vulnerabilities and Potential
Solutions for Fake-Normal Attacks: A Short Review [0.0]
Smart grid systems are critical to the power industry, however their sophisticated architectural design and operations expose them to a number of cybersecurity threats.
Artificial Intelligence (AI)-based technologies are becoming increasingly popular for detecting cyber assaults in a variety of computer settings.
The present AI systems are being exposed and vanquished because of the recent emergence of sophisticated adversarial systems such as Generative Adversarial Networks (GAN)
arXiv Detail & Related papers (2022-02-14T21:41:36Z) - Fixed Points in Cyber Space: Rethinking Optimal Evasion Attacks in the
Age of AI-NIDS [70.60975663021952]
We study blackbox adversarial attacks on network classifiers.
We argue that attacker-defender fixed points are themselves general-sum games with complex phase transitions.
We show that a continual learning approach is required to study attacker-defender dynamics.
arXiv Detail & Related papers (2021-11-23T23:42:16Z) - A Framework for Evaluating the Cybersecurity Risk of Real World, Machine
Learning Production Systems [41.470634460215564]
We develop an extension to the MulVAL attack graph generation and analysis framework to incorporate cyberattacks on ML production systems.
Using the proposed extension, security practitioners can apply attack graph analysis methods in environments that include ML components.
arXiv Detail & Related papers (2021-07-05T05:58:11Z) - A System for Efficiently Hunting for Cyber Threats in Computer Systems
Using Threat Intelligence [78.23170229258162]
We build ThreatRaptor, a system that facilitates cyber threat hunting in computer systems using OSCTI.
ThreatRaptor provides (1) an unsupervised, light-weight, and accurate NLP pipeline that extracts structured threat behaviors from unstructured OSCTI text, (2) a concise and expressive domain-specific query language, TBQL, to hunt for malicious system activities, and (3) a query synthesis mechanism that automatically synthesizes a TBQL query from the extracted threat behaviors.
arXiv Detail & Related papers (2021-01-17T19:44:09Z) - Review: Deep Learning Methods for Cybersecurity and Intrusion Detection
Systems [6.459380657702644]
Artificial Intelligence (AI) and Machine Learning (ML) can be leveraged as key enabling technologies for cyber-defense.
In this paper, we are concerned with the investigation of the various deep learning techniques employed for network intrusion detection.
arXiv Detail & Related papers (2020-12-04T23:09:35Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.