skip to main content
10.1145/3207677.3278054acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsaeConference Proceedingsconference-collections
research-article

Cyber-Attack Classification in Smart Grid via Deep Neural Network

Authors Info & Claims
Published:22 October 2018Publication History

ABSTRACT

Smart grid1 is a modern power transmission network. With its development, the computing, communication and physical processes is getting more and more connected. However, an adversary can destroy power production by attacking the power secondary equipment. Accurate and fast response to cyber-attacks is a prerequisite for stable grid operation. Therefore, it is critical to identify and classify attacks in the smart grid. In this paper, we propose a novel approach that utilizes machine learning algorithms to help classify cyber-attacks. We built a deep neural network (DNN) model and select the global optimal parameters to achieve high generalization performance. The evaluation result demonstrates that the proposed method can effectively identify cyber-attacks in smart grid with an accuracy as high as 96%.

References

  1. Gungor V C, Sahin D, and Kocak T, et al. 2013. A survey on smart grid potential applications and communication requirements. IEEE Transactions on industrial informatics, 9(1), 28--42.Google ScholarGoogle ScholarCross RefCross Ref
  2. Flick T, and Morehouse J. 2010. Securing the smart grid: next generation power grid security. Elsevier. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Case D U. 2016. Analysis of the cyber attack on the Ukrainian power grid. Electricity Information Sharing and Analysis Center (E-ISAC).Google ScholarGoogle Scholar
  4. Mo Y, Kim T H J, and Brancik K, et al. 2012. Cyber--physical security of a smart grid infrastructure. Proceedings of the IEEE, 100(1), 195--209.Google ScholarGoogle ScholarCross RefCross Ref
  5. Holmgren Å J. 2006. Using graph models to analyze the vulnerability of electric power networks. Risk analysis, 26(4), 955--969.Google ScholarGoogle Scholar
  6. Andrews F, Morgan J, and Sonquist J. 1967. Multiple classification analysis: A report on a computer program for multiple regression using categorical predictors.Google ScholarGoogle Scholar
  7. Zhang Y, Wang L, and Sun W, et al. 2011. Distributed intrusion detection system in a multi-layer network architecture of smart grid. IEEE Trans. Smart Grid, 2(4), 796--808.Google ScholarGoogle ScholarCross RefCross Ref
  8. Hagan M T, Demuth H B, and Beale M H, et al. 1996. Neural network design. Boston: Pws Pub.. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Hinton G, Deng L, and Yu D, et al. 2012. Deep neural networks for acoustic modeling in speech recognition: The shared views of four research groups{J}. IEEE Signal processing magazine, 29(6), 82--97.Google ScholarGoogle Scholar
  10. LeCun Y, Bengio Y, and Hinton G. 2015. Deep learning. nature, 521(7553): 436.Google ScholarGoogle Scholar
  11. Ozay M, Esnaola I, and Vural F T Y, et al. 2016.Machine learning methods for attack detection in the smart grid. IEEE transactions on neural networks and learning systems, 27(8), 1773--1786.Google ScholarGoogle Scholar
  12. Esmalifalak M, Liu L, and Nguyen N, et al. 2014. Detecting stealthy false data injection using machine learning in smart grid IEEE Systems Journal.Google ScholarGoogle Scholar
  13. Wei J, Mendis G J. 2016. A deep learning-based cyber-physical strategy to mitigate false data injection attack in smart grids//Cyber-Physical Security and Resilience in Smart Grids (CPSR-SG), Joint Workshop on. IEEE, 2016, 1--6.Google ScholarGoogle Scholar
  14. He Y, Mendis G J, and Wei J. 2017. Real-time detection of false data injection attacks in smart grid: A deep learning-based intelligent mechanism. IEEE Transactions on Smart Grid, 8(5), 2505--2516.Google ScholarGoogle ScholarCross RefCross Ref
  15. Ouyang X, Ma Z. 2017. Using LSTM Networks to Identify False Data of Smart Terminals in the Smart Grid{C}//Parallel and Distributed Systems (ICPADS), 2017 IEEE 23rd International Conference on. IEEE, 2017, 765--768.Google ScholarGoogle Scholar
  16. Jie_yu W U, Zhe Z, and Xiang_gen Y, et al. 2002. Study on condition-based maintenance of electrical secondary equipment. Relay, 30(2), 22--24.Google ScholarGoogle Scholar
  17. Vincent P, Larochelle H, and Lajoie I, et al. 2010. Stacked denoising autoencoders: Learning useful representations in a deep network with a local denoising criterion. Journal of machine learning research, 11(Dec): 3371--3408. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Hinton G E, Osindero S, and Teh Y W. 2006. A fast learning algorithm for deep belief nets. Neural computation, 18(7), 1527--1554. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Chollet F. Keras. 2015.Google ScholarGoogle Scholar
  20. Abadi M, Barham P, and Chen J, et al. 2016. Tensorflow: a system for large-scale machine learning{C}//OSDI. 16, 265--283. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Cyber-Attack Classification in Smart Grid via Deep Neural Network

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      CSAE '18: Proceedings of the 2nd International Conference on Computer Science and Application Engineering
      October 2018
      1083 pages
      ISBN:9781450365123
      DOI:10.1145/3207677

      Copyright © 2018 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 22 October 2018

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      CSAE '18 Paper Acceptance Rate189of383submissions,49%Overall Acceptance Rate368of770submissions,48%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader