skip to main content
10.1145/3590003.3590060acmotherconferencesArticle/Chapter ViewAbstractPublication PagescacmlConference Proceedingsconference-collections
research-article

Federated Learning-Based Intrusion Detection Method for Smart Grid

Published:29 May 2023Publication History

ABSTRACT

Power systems have revealed serious security problems in the process of gradual opening, and intrusion detection as an important security defense measure can detect potential intrusions in a timely manner. In the big data environment of electric power, there are information silos between different electric power data owners, and in order to obtain intrusion detection models with better performance, traditional methods need to fuse data from all parties, which often brings difficulties in information security and data privacy protection. In this paper, we propose a distributed intrusion detection framework based on federated learning and apply it to network traffic data analysis. The framework aims to ensure the information security of each local power data while establishing a collection of decentralized data and completing the joint training of models from multiple data sources. The experimental results show that the scheme achieves 98.1% accuracy on the simulated data set, which is better than other commonly used intrusion detection algorithms. In addition, the method well ensures the security and privacy of data because the data are not interoperable among each participant under the federated learning mechanism.

References

  1. Andresini, Giuseppina, Annalisa Appice and Donato Malerba, 2021. Nearest cluster-based intrusion detection through convolutional neural networks. Knowledge-Based Systems 216:106798 doi:https://doi.org/10.1016/j.knosys.2021.106798.Google ScholarGoogle ScholarCross RefCross Ref
  2. Yufei Liu and Dechang Pi. 2017. A Novel Kernel SVM Algorithm with Game Theory for Network Intrusion Detection. KSII Transactions on Internet and Information Systems, 11, 8, (2017), 4043-4060. DOI: 10.3837/tiis.2017.08.016.Google ScholarGoogle ScholarCross RefCross Ref
  3. Siniosoglou, Ilias, Panagiotis Radoglou-Grammatikis, Georgios Efstathopoulos, Panagiotis Fouliras and Panagiotis Sarigiannidis, 2021. A Unified Deep Learning Anomaly Detection and Classification Approach for Smart Grid Environments. IEEE Transactions on Network and Service Management 18(2):1137-1151 doi:10.1109/TNSM.2021.3078381.Google ScholarGoogle ScholarCross RefCross Ref
  4. Mendonça, Robson V., Arthur A. M. Teodoro, Renata L. Rosa, Muhammad Saadi, Dick Carrillo Melgarejo, Pedro H. J. Nardelli and Demóstenes Z. Rodríguez, 2021. Intrusion Detection System Based on Fast Hierarchical Deep Convolutional Neural Network. IEEE Access 9:61024-61034 doi:10.1109/ACCESS.2021.3074664.Google ScholarGoogle ScholarCross RefCross Ref
  5. Wu, Kehe, Zuge Chen and Wei Li, 2018. A Novel Intrusion Detection Model for a Massive Network Using Convolutional Neural Networks. IEEE Access 6:50850-50859 doi:10.1109/ACCESS.2018.2868993.Google ScholarGoogle ScholarCross RefCross Ref
  6. Liu, Yi, Neeraj Kumar, Zehui Xiong, Wei Yang Bryan Lim, Jiawen Kang & Dusit Niyato, 2020. Communication-Efficient Federated Learning for Anomaly Detection in Industrial Internet of Things.Google ScholarGoogle Scholar
  7. Abdel-Basset, Mohamed, Nour Moustafa, Hossam Hawash, Imran Razzak, Karam M. Sallam and Osama M. Elkomy, 2022. Federated Intrusion Detection in Blockchain-Based Smart Transportation Systems. IEEE Transactions on Intelligent Transportation Systems 23(3):2523-2537 doi:10.1109/TITS.2021.3119968.Google ScholarGoogle ScholarCross RefCross Ref
  8. Murat, Kuzlu, Pipattanasomporn Manisa and Rahman Saifur, 2014. Communication network requirements for major smart grid applications in HAN, NAN and WAN. Computer Networks 67:74-88 doi:https://doi.org/10.1016/j.comnet.2014.03.029.Google ScholarGoogle ScholarCross RefCross Ref
  9. Simonyan, Karen and Andrew Zisserman, 2014. Very Deep Convolutional Networks for Large-Scale Image Recognition. arXiv e-prints:arXiv:1409.1556.Google ScholarGoogle Scholar
  10. Brendan McMahan, H., Eider Moore, Daniel Ramage, Seth Hampson and Blaise Agüera y Arcas, 2016. Communication-Efficient Learning of Deep Networks from Decentralized Data. arXiv e-prints:arXiv:1602.05629.Google ScholarGoogle Scholar
  11. Tavallaee, Mahbod, Ebrahim Bagheri, Wei Lu and Ali A. Ghorbani, 2009. A detailed analysis of the KDD CUP 99 data set.Google ScholarGoogle Scholar
  12. Han, Hui, Wen-Yuan Wang and Bing-Huan Mao, Borderline-SMOTE: A New Over-Sampling Method in Imbalanced Data Sets Learning. In: Huang, D.-S., X.-P. Zhang & G.-B. Huang (eds) Advances in Intelligent Computing, Berlin, Heidelberg, 2005// 2005. Springer Berlin Heidelberg, p 878-887.Google ScholarGoogle Scholar
  13. Singh, Praneet, Jishnu Jaykumar P, Akhil Pankaj and Reshmi Mitra, 2021. Edge-Detect: Edge-Centric Network Intrusion Detection using Deep Neural Network.Google ScholarGoogle Scholar

Index Terms

  1. Federated Learning-Based Intrusion Detection Method for Smart Grid
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            CACML '23: Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning
            March 2023
            598 pages
            ISBN:9781450399449
            DOI:10.1145/3590003

            Copyright © 2023 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 29 May 2023

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed limited

            Acceptance Rates

            CACML '23 Paper Acceptance Rate93of241submissions,39%Overall Acceptance Rate93of241submissions,39%
          • Article Metrics

            • Downloads (Last 12 months)63
            • Downloads (Last 6 weeks)5

            Other Metrics

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format