Abstract
As a highly automated power transmission network, the smart grid can monitor each user and grid node and connect different devices to improve the function of conventional power network significantly, but this heterogeneous network also brings greater security risks, attackers can use vulnerabilities existing in smart grids. Intrusion Detection System (IDS) constitutes an important means to protect critical information from being leaked. in a smart grid environment. In this paper, we proposed an AMI intrusion detection model for smart grid, which is widely distributed in the three-layer architecture of the grid system through particle swarm algorithm combined with random forest method. To improve the model’s accuracy, this paper adopts the dynamic weight formula and various adaptive mutation methods to optimize the iterative process of the algorithm. Besides, we use parallel strategy to make up for the lack of precision in the mutation of the algorithm. The AM-PPSO algorithm proposed in this paper performs well in the CEC2017 benchmark function test, effectively ensuring the improvement of the RF classifier. Finally, we use NPL-KDD, UNSW-UB15, and X-IIoTID standard intrusion detection datasets to simulate, results show that our model achieves 97–99% classification of the three datasets.














Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Data Availability Statement
References
Al-Hawawreh M, Sitnikova E, Aboutorab N (2021) X-IIoTID: a connectivity-and device-agnostic intrusion dataset for industrial internet of things. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2021.3102056
Breiman L (1996) Bagging predictors. Mach Learn 24(2):123–140. https://doi.org/10.3390/risks8030083
Breiman LEO (2001) Random forests. Mach Learn 5–32
Chang JF, Chu SC, Roddick JF, Pan JS (2005) A parallel particle swarm optimization algorithm with communication strategies. J Inf Sci Eng 21(4):809–818
Chen TY, Chi TM (2010) On the improvements of the particle swarm optimization algorithm. Adv Eng Softw 41(2):229–239. https://doi.org/10.1016/j.advengsoft.2009.08.003
Chu S-C, Tsai P, Pan J-S (2006) Cat swarm optimization. In: Pacific rim int conf artif intell, pp 854–858. https://doi.org/10.1007/978-3-540-36668-3_94
Dhanabal L, Shantharajah SP (2015) A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. Int J Adv Res Comput Commun Eng 4(6):446–452. https://doi.org/10.17148/IJARCCE.2015.4696
Fang X, Misra S, Xue G, Yang D (2012) Smart grid—the new and improved power grid: a survey. IEEE Commun Surv Tutorials 14(4):944–980. https://doi.org/10.1109/SURV.2011.101911.00087
Gates GW (1972) The reduced nearest neighbor rule. IEEE Trans Inf Theory 18(3):431–433. https://doi.org/10.1109/TIT.1972.1054809
Glover F, L M (1998) Tabu search. Springer, Boston
Guan Z, Zhang Y, Zhu L, Wu L, Yu S (2019) Effect: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid. Sci China Inf Sci 62(3):1–14. https://doi.org/10.1007/s11432-018-9451-y
Haghiri S, Garreau D, Luxburg U (2018) Comparison-based random forests. In: Int conf mach learn, pp 1871–1880
Hammid AT, Sulaiman M, Bin H (2018) Series division method based on PSO and FA to optimize long-term hydro generation scheduling. Sustain Energy Technol Assess 29:106–118. https://doi.org/10.1016/j.seta.2018.06.001
Han M, Fan J, Wang J (2011) A dynamic feedforward neural network based on gaussian particle swarm optimization and its application for predictive control. IEEE Trans Neural Netw 22(9):1457–1468. https://doi.org/10.1109/TNN.2011.2162341
Hancock PJB (1994) An empirical comparison of selection methods in evolutionary algorithms. In: Lect notes comput sci (including subser lect notes artif intell lect notes bioinformatics), LNCS, vol 865, pp 80–94. https://doi.org/10.1007/3-540-58483-8_7
Ho TK (1998) The random subspace method for constructing decision forests. IEEE Trans Pattern Anal Mach Intell 20(8):832–844. https://doi.org/10.1109/34.709601
Imran M, Hashim R, Khalid NEA (2013) An overview of particle swarm optimization variants. Procedia Eng 53(1):491–496. https://doi.org/10.1016/j.proeng.2013.02.063
Kennedy J, Eberhart RC (1997) Discrete binary version of the particle swarm algorithm. In: Proc IEEE int conf syst man cybern. vol 5, pp 4104–4108. https://doi.org/10.1109/icsmc.1997.637339
Komal Kumar N, Vigneswari D, Vamsi Krishna M, Phanindra Reddy GV (2019) An optimized random forest classifier for diabetes mellitus. Springer Singapore, vol 813. https://doi.org/10.1007/978-981-13-1498-8_67
Lateef AAA, Al-Janabi STF, Al-Khateeb B (2019) Survey on intrusion detection systems based on deep learning. Period Eng Nat Sci 7(3):1074–1095. https://doi.org/10.21533/pen.v7i3.635
Latinne P, Debeir O, Decaestecker C (2001) Limiting the number of trees in random forests. In: Lect notes comput sci (including subser lect notes Artif intell lect notes bioinformatics) 2001, 2096, pp 178–187. https://doi.org/10.1007/3-540-48219-9_18
LaTorre A, Pena JM (2017) A comparison of three large-scale global optimizers on the CEC 2017 single objective real parameter numerical optimization benchmark. In: 2017 IEEE congr evol comput CEC 2017-proc, pp 1063–1070. https://doi.org/10.1109/CEC.2017.7969425
Lee W, Stolfo SJ, Mok KW (1999) A data mining framework for building intrusion detection models. In: Proceedings of the 1999 IEEE symposium on security and privacy. Elsevier, pp 120–132. https://doi.org/10.1109/SECPRI.1999.766909
Li X, Liang X, Lu R, Shen X, Lin X, Zhu H (2012) Securing smart grid: cyber attacks, countermeasures, and challenges. IEEE Commun Mag 50(8):38–45. https://doi.org/10.1109/MCOM.2012.6257525
Liao HJ, Richard Lin CH, Lin YC, Tung KY (2013) Intrusion detection system: a comprehensive review. J Netw Comput Appl 36(1):16–24. https://doi.org/10.1016/j.jnca.2012.09.004
Meng Z, Pan JS, Xu H (2016) QUasi-Affine TRansformation Evolutionary (QUATRE) algorithm: a cooperative swarm based algorithm for global optimization. Knowl-Based Syst 109:104–121. https://doi.org/10.1016/j.knosys.2016.06.029
Mirjalili S (2016) SCA: a sine cosine algorithm for solving optimization problems. Knowl-Based Syst 96:120–133. https://doi.org/10.1016/j.knosys.2015.12.022
Mirjalili S (2019) Ant colony optimisation. Stud Comput Intell 780(November):33–42. https://doi.org/10.1007/978-3-319-93025-1_3
Mirjalili S, Lewis A (2016) The whale optimization algorithm. Adv Eng Softw 95:51–67. https://doi.org/10.1016/j.advengsoft.2016.01.008
Moustafa N, Slay J (2015) UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data Set). In: 2015 mil commun inf syst conf MilCIS 2015-proc. https://doi.org/10.1109/MilCIS.2015.7348942
Naidu Kommula B, Reddy Kota V (2021) Design of MFA-PSO based fractional order PID controller for effective torque controlled BLDC motor. Sustain Energy Technol Assess 2022(49):101644. https://doi.org/10.1016/j.seta.2021.101644
Nitti D, Ravkic I, Davis J, De Raedt L (2016) Learning the structure of dynamic hybrid relational models. Front Artif Intell Appl 285:1283–1290. https://doi.org/10.3233/978-1-61499-672-9-1283
Pankaja K, Suma V (2020) Plant leaf recognition and classification based on the whale optimization algorithm (WOA) and random forest (RF). J Inst Eng Ser B 101(5):597–607. https://doi.org/10.1007/s40031-020-00470-9
Quincozes SE, Albuquerque C, Passos D, Mossé D (2020) A survey on intrusion detection and prevention systems in digital substations. Comput Netw 2021(184):107679. https://doi.org/10.1016/j.comnet.2020.107679
Radha R, Gopalakrishnan R (2020) A medical analytical system using intelligent fuzzy level set brain image segmentation based on improved quantum particle swarm optimization. Microprocess Microsyst 79(September):103283. https://doi.org/10.1016/j.micpro.2020.103283
Reka SS, Dragicevic T (2018) Future effectual role of energy delivery: a comprehensive review of internet of things and smart grid. Renew Sustain Energy Rev 91(April):90–108. https://doi.org/10.1016/j.rser.2018.03.089
Rish I (2001) An empirical study of the naive Bayes classifier. In: IJCAI 2001 work empir methods artif intell, vol 3, no 22, pp 4863–4869. https://doi.org/10.1039/b104835j
Safavian SR, Landgrebe D (1991) A survey of decision tree classifier methodology. IEEE Trans Syst Man Cybern 21(3):660–674. https://doi.org/10.1109/21.97458
Shapsough S, Qatan F, Aburukba R, Aloul F, Al Ali AR (2016) Smart grid cyber security: challenges and solutions. In: Proc—2015 int conf smart grid clean energy technol. ICSGCE 2015 2016, pp 170–175. https://doi.org/10.1109/ICSGCE.2015.7454291
Upadhyay D, Manero J, Zaman M, Sampalli S (2021) Intrusion detection in SCADA based power grids: recursive feature elimination model with majority vote ensemble algorithm. IEEE Trans Netw Sci Eng 8(3):2559–2574. https://doi.org/10.1109/TNSE.2021.3099371
Vijayalakshmi K, Anandan P (2019) A multi objective Tabu particle swarm optimization for effective cluster head selection in WSN. Cluster Comput 22(s5):12275–12282. https://doi.org/10.1007/s10586-017-1608-7
Wang H, Li C, Liu Y, Zeng S (2007) A hybrid particle swarm algorithm with cauchy mutation. In: Proc 2007 IEEE swarm intell symp, pp 356–360. https://doi.org/10.1109/SIS.2007.367959
Yang X, Deb S, Behaviour ACB (2009) Cuckoo search via Lévy flights. In: World congress on nature & biologically inspired computing (NaBIC). IEEE, Coimbatore, pp 210–214. https://doi.org/10.1109/NABIC.2009.5393690
Yang Y, McLaughlin K, Gao L, Sezer S, Yuan Y, Gong Y (2016) Intrusion detection system for IEC 61850 based smart substations. In: IEEE power energy soc. gen. meet. 2016-Nov (608224), pp 6–10. https://doi.org/10.1109/PESGM.2016.7741668
Yang Y, Xu HQ, Gao L, Yuan YB, McLaughlin K, Sezer S (2017) Multidimensional intrusion detection system for IEC 61850-based SCADA networks. IEEE Trans Power Deliv 32(2):1068–1078. https://doi.org/10.1109/TPWRD.2016.2603339
Yu Z, Shi X, Qiu X, Zhou J, Chen X, Gou Y (2021) Optimization of postblast ore boundary determination using a novel sine cosine algorithm-based random forest technique and monte carlo simulation. Eng Optim 53(9):1467–1482. https://doi.org/10.1080/0305215X.2020.1801668
Zambrano-Bigiarini M, Clerc M, Standard Rojas R (2013) Optimisation particle swarm, 2011 at CEC-2013: a baseline for future PSO improvements. IEEE Congr Evol Comput. CEC 2013, pp 2337–2344. https://doi.org/10.1109/CEC.2013.6557848
Zhan Z-H, Zhang J, Li Y, Chung HS-H (2009) Adaptive particle swarm optimization. IEEE Trans Syst Man Cybern Part B 36(6):1362–1381. https://doi.org/10.25103/jestr.062.37
Acknowledgements
Thanks to Prof. Huiqi Zhao for project funding support Major Scientific and Technological Innovation Projects of Shandong Province, China, No. 2019JZZY01013.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Zhao, H., Liu, G., Sun, H. et al. An enhanced intrusion detection method for AIM of smart grid. J Ambient Intell Human Comput 14, 4827–4839 (2023). https://doi.org/10.1007/s12652-023-04538-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-023-04538-4