2023
DOI: 10.1109/access.2023.3247193
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Security in Power Systems Using Meta-Heuristic and Deep Learning Algorithms

Abstract: Supervisory Control and Data Acquisition system linked to Intelligent Electronic Devices over a communication network keeps an eye on smart grids' performance and safety. The lack of algorithms protecting the power system communication protocols makes them vulnerable to cyberattacks, which can result in a hacker introducing false data into the operational network. This can result in delayed attack detection, which might harm the infrastructure, cause financial loss, or even result in fatalities. Similarly, att… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(4 citation statements)
references
References 56 publications
0
4
0
Order By: Relevance
“…DL algorithms, unlike shallow ML algorithms, possess the advantage of automatic feature extraction without the need for explicit feature engineering. Numerous studies [18], [20], [31], [33], [43]- [47] consistently demonstrate the promising potential of DL, consistently showcasing its superiority over shallow ML algorithms. This superiority is reflected in the higher detection accuracy achieved by DL models, making them a crucial and effective approach for detecting malicious power consumption readings.…”
Section: ) Machine Learning-based Methodsmentioning
confidence: 76%
See 2 more Smart Citations
“…DL algorithms, unlike shallow ML algorithms, possess the advantage of automatic feature extraction without the need for explicit feature engineering. Numerous studies [18], [20], [31], [33], [43]- [47] consistently demonstrate the promising potential of DL, consistently showcasing its superiority over shallow ML algorithms. This superiority is reflected in the higher detection accuracy achieved by DL models, making them a crucial and effective approach for detecting malicious power consumption readings.…”
Section: ) Machine Learning-based Methodsmentioning
confidence: 76%
“…Various statistical and analytical techniques have been proposed as countermeasures against electricity theft attacks. These methodologies utilize various approaches such as metaheuristic methods [32], [33], game theory [34]- [36], data mining, state estimation [37], clustering, principal component analysis (PCA), and local outlier factor (LOF). For instance, Singh et al [38] propose an innovative approach that employs PCA to detect anomalies by calculating an anomaly score and comparing it to a predefined threshold.…”
Section: ) Statistical and Analytical-based Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Dagoumas [ 80 ] has used IEEE RTS 96 power system, and the author highlighted that a combination of operating conditions and cyber-attacks should be used to evaluate system stability. Diaba et al [ 81 ] highlighted that power system communication protocols are prone to cyber-attacks by hackers. The authors have proposed an algorithm outperforming conventional deep learning approaches using SVM, ANN, and CNN.…”
Section: Resultsmentioning
confidence: 99%