A machine learning-based detection framework against intermittent electricity theft attack

被引:9
|
作者
Fang, Hongliang [1 ,2 ]
Xiao, Jiang-Wen [1 ,2 ]
Wang, Yan-Wu [1 ,2 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Artificial Intelligence & Automat, Wuhan 430074, Peoples R China
[2] Huazhong Univ Sci & Technol, Key Lab Image Proc & Intelligent Control, Minist Educ, Wuhan 430074, Peoples R China
基金
中国国家自然科学基金;
关键词
Advanced metering infrastructure Intermittent; electricity theft; Light gradient boosting method Disperse; degree; Variational Bayesian Gaussian mixture model; ENERGY THEFT; NONTECHNICAL LOSSES; INTRUSION DETECTION; NETWORKS; METERS; FRAUDS;
D O I
10.1016/j.ijepes.2023.109075
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The widespread installation of advanced metering infrastructure (AMI) brings convenience to applications including but not limited to load management and demand response. However, AMI is also at risk of electricity theft and non-technical loss. Using the smart meter data provided by AMI to dig out user electricity consumption behavior is an effective way to construct electricity theft detectors. In this paper, a new intermittent electricity theft attack behavior is presented which switches between committing electricity theft and honestly consuming electricity alternately to skillfully evade the existing detectors. Based on the assumption that the labels of intermittent adversaries are unavailable, a new machine learning-based detection framework is proposed to detect this attack. Initially electricity features are constructed based on time intervals divided by a numerical iteration method. Then light gradient boosting method (LightGBM) is used to classify the normal users and adversaries. Further, the disperse degree of users is designed for capturing the differences between the intermittent adversaries and others. A new 2D label set is then constructed by combining the predicted labels of LightGBM and the disperse degree. Finally, a variational Bayesian Gaussian mixture model is employed based on the 2D label set to sort the users into the normal users and adversaries visually. Results of the case studies show that the presented attack can evade state-of-the-art detectors but still gain high profits. In addition, the proposed machine learning-based detector outperforms state-of-the-art detectors on both persistent attacks and intermittent attacks.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] A Covert Electricity-Theft Cyberattack Against Machine Learning-Based Detection Models
    Cui, Lei
    Guo, Lei
    Gao, Longxiang
    Cai, Borui
    Qu, Youyang
    Zhou, Yipeng
    Yu, Shui
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (11) : 7824 - 7833
  • [2] FUSE: a federated learning and U-shape split learning-based electricity theft detection framework
    Xuan LI
    Naiyu WANG
    Liehuang ZHU
    Shuai YUAN
    Zhitao GUAN
    [J]. Science China(Information Sciences), 2024, 67 (04) : 339 - 340
  • [3] FUSE: a federated learning and U-shape split learning-based electricity theft detection framework
    Xuan Li
    Naiyu Wang
    Liehuang Zhu
    Shuai Yuan
    Zhitao Guan
    [J]. Science China Information Sciences, 2024, 67
  • [4] FUSE: a federated learning and U-shape split learning-based electricity theft detection framework
    Li, Xuan
    Wang, Naiyu
    Zhu, Liehuang
    Yuan, Shuai
    Guan, Zhitao
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2024, 67 (04)
  • [5] Machine learning-based phishing attack detection
    Hossain, Sohrab
    Sarma, Dhiman
    Chakma, Rana Joyti
    [J]. International Journal of Advanced Computer Science and Applications, 2020, 11 (09): : 378 - 388
  • [6] Machine Learning-Based Phishing Attack Detection
    Hossain, Sohrab
    Sarma, Dhiman
    Chakma, Rana Joyti
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (09) : 378 - 388
  • [7] Electricity Theft Detection using Machine Learning
    Petrlik, Ivan
    Lezama, Pedro
    Rodriguez, Ciro
    Inquilla, Ricardo
    Elizabeth Reyna-Gonzalez, Julissa
    Esparza, Roberto
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (12) : 420 - 425
  • [8] A machine learning-based Anomaly Detection Framework for building electricity consumption data
    Mascali, Lorenzo
    Schiera, Daniele Salvatore
    Eiraudo, Simone
    Barbierato, Luca
    Giannantonio, Roberta
    Patti, Edoardo
    Bottaccioli, Lorenzo
    Lanzini, Andrea
    [J]. SUSTAINABLE ENERGY GRIDS & NETWORKS, 2023, 36
  • [9] A novel feature engineered-CatBoost-based supervised machine learning framework for electricity theft detection
    Hussain, Saddam
    Mustafa, Mohd Wazir
    Jumani, Touqeer A.
    Baloch, Shadi Khan
    Alotaibi, Hammad
    Khan, Ilyas
    Khan, Afrasyab
    [J]. ENERGY REPORTS, 2021, 7 : 4425 - 4436
  • [10] Machine Learning-Based Attack Detection Method in Hadoop
    Li, Ningwei
    Gao, Hang
    Liu, Liang
    Peng, Jianfei
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2020, PT III, 2020, 12454 : 184 - 196