Detecting Electricity Theft Cyber-Attacks in AMI Networks Using Deep Vector Embeddings

被引:37
|
作者
Takiddin, Abdulrahman [1 ]
Ismail, Muhammad [2 ]
Nabil, Mahmoud [3 ]
Mahmoud, Mohamed M. E. A. [4 ]
Serpedin, Erchin [5 ]
机构
[1] Texas A&M Univ Qatar, Dept Elect & Comp Engn, Doha 23874, Qatar
[2] Tennessee Technol Univ, Dept Comp Sci, Cookeville, TN 38505 USA
[3] North Carolina Agr & Tech State Univ, Dept Elect & Comp Engn, Greensboro, NC 27411 USA
[4] Tennessee Technol Univ, Dept Elect & Comp Engn, Cookeville, TN 38505 USA
[5] Texas A&M Univ, Dept Elect & Comp Engn, College Stn, TX 77843 USA
来源
IEEE SYSTEMS JOURNAL | 2021年 / 15卷 / 03期
关键词
Electricity theft; feed-forward; gate recurrent; hyperparameter optimization; vector embedding; NONTECHNICAL LOSSES;
D O I
10.1109/JSYST.2020.3030238
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Despite being equipped with advanced metering infrastructure (AMI), utility companies are subjected to electricity theft cyber-attacks. The existingmachine learning-based detectors do not capture well the complex patterns and the temporal correlation present in the time-series profile of energy consumption data. This article proposes a deep recurrent vector embedding model to identify electricity theft cyber-attacks. Vector embedding is a data representation method that we use to express energy consumption profiles as vectors of real numbers. Since the reported electricity readings may be benign ormalicious, vector embedding algorithms help in analyzing the relationships and capturing the patterns within the customer's reported readings. Furthermore, our model captures well the time-series nature of the data due to the adoption of gated recurrent units. We implement a sequential grid-search hyperparameter optimization algorithm to further improve the models detection performance. We test our model against two real datasets of benign and malicious readings. Results are 95.8% in detection rate (DR), 2.1% in false alarm (FA), and 93.7% in highest difference (HD). Our model outperforms shallow detectors by 3.5%-9.7% in DR, 3.1%-10% in FA, and 8.7%-21.8% inHD. It also outperforms deep detectors by 1.5%-3.2% in DR, 2%-4.3% in FA, and 5.6%-9.6% in HD.
引用
收藏
页码:4189 / 4198
页数:10
相关论文
共 50 条
  • [21] A Hybrid Framework for Detecting and Eliminating Cyber-Attacks in Power Grids
    Aflaki, Arshia
    Gitizadeh, Mohsen
    Razavi-Far, Roozbeh
    Palade, Vasile
    Ghasemi, Ali Akbar
    [J]. ENERGIES, 2021, 14 (18)
  • [22] Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters
    Nabil, Mahmoud
    Ismail, Muhammad
    Mahmoud, Mohamed
    Shahin, Mostafa
    Qaraqe, Khalid
    Serpedin, Erchin
    [J]. 2018 24TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR), 2018, : 740 - 745
  • [23] Deep Recurrent Electricity Theft Detection in AMI Networks with Evolutionary Hyper-parameter Tuning
    Nabil, Mahmoud
    Ismail, Muhammad
    Mahmoud, Mohamed
    Serpedin, Erchin
    [J]. 2019 INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2019, : 1002 - 1008
  • [24] An Ensemble of Deep Recurrent Neural Networks for Detecting IoT Cyber Attacks Using Network Traffic
    Saharkhizan, Mahdis
    Azmoodeh, Amin
    Dehghantanha, Ali
    Choo, Kim-Kwang Raymond
    Parizi, Reza M.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (09): : 8852 - 8859
  • [25] A Behavior-Based Online Engine for Detecting Distributed Cyber-Attacks
    Feng, Yaokai
    Hori, Yoshiaki
    Sakurai, Kouichi
    [J]. INFORMATION SECURITY APPLICATIONS, WISA 2016, 2017, 10144 : 79 - 89
  • [26] From Detecting Cyber-Attacks to Mitigating Risk Within a Hybrid Environment
    Foglietta, Chiara
    Masucci, Dario
    Palazzo, Cosimo
    Santini, Riccardo
    Panzieri, Stefano
    Rosa, Luis
    Cruz, Tiago
    Lev, Leonid
    [J]. IEEE SYSTEMS JOURNAL, 2019, 13 (01): : 424 - 435
  • [27] A Deep Neural Network Strategy to Distinguish and Avoid Cyber-Attacks
    Agarwal, Siddhant
    Tyagi, Abhay
    Usha, G.
    [J]. ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, 2020, 1056 : 673 - 681
  • [28] Predicting Cyber-Attacks Through the Use of Deep Learning Algorithms
    Chowdhury, Subrata
    Purushotham, E.
    Srinivasan, A.
    Sreeraman, Y.
    [J]. 2024 5TH INTERNATIONAL CONFERENCE ON INNOVATIVE TRENDS IN INFORMATION TECHNOLOGY, ICITIIT 2024, 2024,
  • [29] Detecting and Handling Cyber-Attacks in Model Predictive Control of Chemical Processes
    Wu, Zhe
    Albalawi, Fahad
    Zhang, Junfeng
    Zhang, Zhihao
    Durand, Helen
    Christofides, Panagiotis D.
    [J]. MATHEMATICS, 2018, 6 (10)
  • [30] Tiny Twins for detecting cyber-attacks at runtime using concise Rebeca time transition system
    Moradi, Fereidoun
    Pourvatan, Bahman
    Asadollah, Sara Abbaspour
    Sirjani, Marjan
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2024, 184