2021
DOI: 10.1016/j.energy.2020.119505
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection of cyber physical energy system based on multivariate ensemble classification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 32 publications
(6 citation statements)
references
References 36 publications
0
6
0
Order By: Relevance
“…The same scheme was used in [19] to build a framework to secure fog-to-things environment by gathering the classifiers DT, K-NN and RF. Likewise, the authors of [20] chose to uphold the protection of the cyber physical energy systems with a majority voting scheme. To do so, they aggregate the results of three individual classifiers: LightGBM, extreme learning machine (ELM), and XGBoost.…”
Section: Distribution Of Papers By Types Of Ensemble Learning Methodsmentioning
confidence: 99%
“…The same scheme was used in [19] to build a framework to secure fog-to-things environment by gathering the classifiers DT, K-NN and RF. Likewise, the authors of [20] chose to uphold the protection of the cyber physical energy systems with a majority voting scheme. To do so, they aggregate the results of three individual classifiers: LightGBM, extreme learning machine (ELM), and XGBoost.…”
Section: Distribution Of Papers By Types Of Ensemble Learning Methodsmentioning
confidence: 99%
“…As an alternative to FDI detection, machine learning has been proposed. Injection attacks can also lead to the security breach of an entire web server, resulting in a denial-ofservice attack [39,40] .…”
Section: Research Backgroundmentioning
confidence: 99%
“…Previous work discussed various ways to detect attacks and malicious activities on the grid. For instance, in [18,19,20], the authors proposed deep learning algorithms to create intrusion detection models based on readings obtained from various input sources such as the Phasor Measurement Unit (PMU), control panel logs, snort network alerts, and relay logs. While these mechanisms mainly depend on monitoring the power grid performance and state estimation to detect abnormal behaviors, they may fail to detect covert and stealthy attacks that are hidden or rendered as normal [21].…”
Section: Introductionmentioning
confidence: 99%