Detecting Electricity Theft Cyber-Attacks in AMI Networks Using Deep Vector Embeddings

被引:37
|
作者
Takiddin, Abdulrahman [1 ]
Ismail, Muhammad [2 ]
Nabil, Mahmoud [3 ]
Mahmoud, Mohamed M. E. A. [4 ]
Serpedin, Erchin [5 ]
机构
[1] Texas A&M Univ Qatar, Dept Elect & Comp Engn, Doha 23874, Qatar
[2] Tennessee Technol Univ, Dept Comp Sci, Cookeville, TN 38505 USA
[3] North Carolina Agr & Tech State Univ, Dept Elect & Comp Engn, Greensboro, NC 27411 USA
[4] Tennessee Technol Univ, Dept Elect & Comp Engn, Cookeville, TN 38505 USA
[5] Texas A&M Univ, Dept Elect & Comp Engn, College Stn, TX 77843 USA
来源
IEEE SYSTEMS JOURNAL | 2021年 / 15卷 / 03期
关键词
Electricity theft; feed-forward; gate recurrent; hyperparameter optimization; vector embedding; NONTECHNICAL LOSSES;
D O I
10.1109/JSYST.2020.3030238
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Despite being equipped with advanced metering infrastructure (AMI), utility companies are subjected to electricity theft cyber-attacks. The existingmachine learning-based detectors do not capture well the complex patterns and the temporal correlation present in the time-series profile of energy consumption data. This article proposes a deep recurrent vector embedding model to identify electricity theft cyber-attacks. Vector embedding is a data representation method that we use to express energy consumption profiles as vectors of real numbers. Since the reported electricity readings may be benign ormalicious, vector embedding algorithms help in analyzing the relationships and capturing the patterns within the customer's reported readings. Furthermore, our model captures well the time-series nature of the data due to the adoption of gated recurrent units. We implement a sequential grid-search hyperparameter optimization algorithm to further improve the models detection performance. We test our model against two real datasets of benign and malicious readings. Results are 95.8% in detection rate (DR), 2.1% in false alarm (FA), and 93.7% in highest difference (HD). Our model outperforms shallow detectors by 3.5%-9.7% in DR, 3.1%-10% in FA, and 8.7%-21.8% inHD. It also outperforms deep detectors by 1.5%-3.2% in DR, 2%-4.3% in FA, and 5.6%-9.6% in HD.
引用
收藏
页码:4189 / 4198
页数:10
相关论文
共 50 条
  • [11] Efficient and Privacy-Preserving ConvLSTM-Based Detection of Electricity Theft Cyber-Attacks in Smart Grids
    Anin, Johnson
    Jahanzeb Khan, Muhammad
    Abdelsalam, Omar
    Nabil, Mahmoud
    Hu, Fei
    Alsharif, Ahmad
    [J]. IEEE Access, 2024, 12 : 153089 - 153104
  • [12] Predicting Cyber-Attacks on IoT Networks Using Deep-Learning and Different Variants of SMOTE
    Akash, Bathini Sai
    Yannam, Pavan Kumar Reddy
    Ruthvik, Bokkasam Venkata Sai
    Kumar, Lov
    Murthy, Lalita Bhanu
    Krishna, Aneesh
    [J]. ADVANCED INFORMATION NETWORKING AND APPLICATIONS, AINA-2022, VOL 2, 2022, 450 : 243 - 255
  • [13] Detecting Cyber-Attacks on Wireless Mobile Networks Using Multicriterion Fuzzy Classifier with Genetic Attribute Selection
    El-Alfy, El-Sayed M.
    Al-Obeidat, Feras N.
    [J]. MOBILE INFORMATION SYSTEMS, 2015, 2015
  • [14] A Method of Synchrophasor Technology for Detecting and Analyzing Cyber-Attacks
    Al-Sarray, Muthanna
    McCann, Roy A.
    [J]. 2016 NORTH AMERICAN POWER SYMPOSIUM (NAPS), 2016,
  • [15] A Linguistic Analysis Metric in Detecting Ransomware Cyber-attacks
    Florea, Diana
    Patterson, Wayne
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (11) : 517 - 522
  • [16] Analysis of Cyber-Attacks on IEC 61850 Networks
    Elgargouri, Ahmed
    Elmusrati, Mohammed
    [J]. 2017 11TH IEEE INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT 2017), 2017, : 252 - 255
  • [17] Development of Deep Learning Model to Detect Cyber-Attacks within Vehicular Networks
    Sandakelum, R. D.
    Liyanage, V. H.
    Chandrasekara, P. M.
    Logeeshan, V
    Kumarawadu, S.
    Wanigasekara, C.
    [J]. 2024 IEEE 5TH ANNUAL WORLD AI IOT CONGRESS, AIIOT 2024, 2024, : 0569 - 0574
  • [18] A two stage approach to electricity theft detection in AMI using deep learning
    Emadaleslami, Mahdi
    Haghifam, Mahmoud-Reza
    Zangiabadi, Mansoureh
    [J]. INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2023, 150
  • [19] Deep Learning Strategies for Detecting and Mitigating Cyber-Attacks Targeting Water-Energy Nexus
    Abughali, Ahmed
    Alansari, Mohamad
    Al-Sumaiti, Ameena S.
    [J]. IEEE ACCESS, 2024, 12 : 129690 - 129704
  • [20] A Feasibility Study of Autonomically Detecting In-process Cyber-Attacks
    Sun, Fangzhou
    Zhang, Peng
    White, Jules
    Schmidt, Douglas C.
    Staples, Jacob
    Krause, Lee
    [J]. 2017 3RD IEEE INTERNATIONAL CONFERENCE ON CYBERNETICS (CYBCONF), 2017, : 407 - 414