Detecting Electricity Theft Cyber-Attacks in AMI Networks Using Deep Vector Embeddings

被引:37
|
作者
Takiddin, Abdulrahman [1 ]
Ismail, Muhammad [2 ]
Nabil, Mahmoud [3 ]
Mahmoud, Mohamed M. E. A. [4 ]
Serpedin, Erchin [5 ]
机构
[1] Texas A&M Univ Qatar, Dept Elect & Comp Engn, Doha 23874, Qatar
[2] Tennessee Technol Univ, Dept Comp Sci, Cookeville, TN 38505 USA
[3] North Carolina Agr & Tech State Univ, Dept Elect & Comp Engn, Greensboro, NC 27411 USA
[4] Tennessee Technol Univ, Dept Elect & Comp Engn, Cookeville, TN 38505 USA
[5] Texas A&M Univ, Dept Elect & Comp Engn, College Stn, TX 77843 USA
来源
IEEE SYSTEMS JOURNAL | 2021年 / 15卷 / 03期
关键词
Electricity theft; feed-forward; gate recurrent; hyperparameter optimization; vector embedding; NONTECHNICAL LOSSES;
D O I
10.1109/JSYST.2020.3030238
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Despite being equipped with advanced metering infrastructure (AMI), utility companies are subjected to electricity theft cyber-attacks. The existingmachine learning-based detectors do not capture well the complex patterns and the temporal correlation present in the time-series profile of energy consumption data. This article proposes a deep recurrent vector embedding model to identify electricity theft cyber-attacks. Vector embedding is a data representation method that we use to express energy consumption profiles as vectors of real numbers. Since the reported electricity readings may be benign ormalicious, vector embedding algorithms help in analyzing the relationships and capturing the patterns within the customer's reported readings. Furthermore, our model captures well the time-series nature of the data due to the adoption of gated recurrent units. We implement a sequential grid-search hyperparameter optimization algorithm to further improve the models detection performance. We test our model against two real datasets of benign and malicious readings. Results are 95.8% in detection rate (DR), 2.1% in false alarm (FA), and 93.7% in highest difference (HD). Our model outperforms shallow detectors by 3.5%-9.7% in DR, 3.1%-10% in FA, and 8.7%-21.8% inHD. It also outperforms deep detectors by 1.5%-3.2% in DR, 2%-4.3% in FA, and 5.6%-9.6% in HD.
引用
收藏
页码:4189 / 4198
页数:10
相关论文
共 50 条
  • [1] Efficient Detection of Electricity Theft Cyber Attacks in AMI Networks
    Ismail, Muhammad
    Shahin, Mostafa
    Shaaban, Mostafa F.
    Serpedin, Erchin
    Qaraqe, Khalid
    [J]. 2018 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2018,
  • [2] Deep Learning Detection of Electricity Theft Cyber-Attacks in Renewable Distributed Generation
    Ismail, Muhammad
    Shaaban, Mostafa F.
    Naidu, Mahesh
    Serpedin, Erchin
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2020, 11 (04) : 3428 - 3437
  • [3] Variational Auto-encoder-based Detection of Electricity Stealth Cyber-attacks in AMI Networks
    Takiddin, Abdulrahman
    Ismail, Muhammad
    Zafar, Usman
    Serpedin, Erchin
    [J]. 28TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO 2020), 2021, : 1590 - 1594
  • [4] Detecting network cyber-attacks using an integrated statistical approach
    Bouyeddou, Benamar
    Harrou, Fouzi
    Kadri, Benamar
    Sun, Ying
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (02): : 1435 - 1453
  • [5] Detecting network cyber-attacks using an integrated statistical approach
    Benamar Bouyeddou
    Fouzi Harrou
    Benamar Kadri
    Ying Sun
    [J]. Cluster Computing, 2021, 24 : 1435 - 1453
  • [6] A System for Detecting Targeted Cyber-Attacks Using Attack Patterns
    Herwono, Ian
    El-Moussa, Fadi Ali
    [J]. INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, 867 : 20 - 34
  • [7] A Proposal for Detecting Distributed Cyber-Attacks Using Automatic Thresholding
    Feng, Yaokai
    Hori, Yoshiaki
    Sakurai, Kouichi
    [J]. 2015 10TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2015, : 152 - 159
  • [8] Detecting Cyber-attacks in the Industrial Internet of Things using a Hybrid Deep Random Neural Network
    Pathak, Mrunal K.
    Bang, Arti
    Gawande, Ranjit M.
    Banait, Archana S.
    Sambare, G. B.
    Shaikh, Ashfaq Amir
    [J]. JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (01) : 165 - 174
  • [9] Securing Smart Grids: Deep Reinforcement Learning Approach for Detecting Cyber-Attacks
    El-Toukhy, Ahmed T.
    Elgarhy, Islam
    Badr, Mahmoud M.
    Mahmoud, Mohamed
    Fouda, Mostafa M.
    Ibrahem, Mohamed I.
    Amsaad, Fathi
    [J]. 2024 INTERNATIONAL CONFERENCE ON SMART APPLICATIONS, COMMUNICATIONS AND NETWORKING, SMARTNETS-2024, 2024,
  • [10] Detecting cyber-attacks using a CRPS-based monitoring approach
    Harrou, Fouzi
    Bouyeddou, Benamar
    Sun, Ying
    Kadri, Benamar
    [J]. 2018 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI), 2018, : 618 - 622