Analysis of Cyber Security Attacks and Its Solutions for the Smart grid Using Machine Learning and Blockchain Methods
Abstract
:1. Introduction
2. Literature Review
3. Methods and Materials
3.1. Research Method
3.2. Exclusion and Inclusion
3.3. Objective of the Study
- To know about the smart grid and its security issues.
- To know about the different types of attacks on smart grid.
- To know about the different methods to overcome these issues.
- To know about the Open Issues, Challenges, and Future Research Directions.
3.4. Smart Grid Communication Challenges
3.4.1. Interference
3.4.2. Transmission of Data Rate
3.4.3. Regulation
4. Results
4.1. Cyber-Attacks and Security Risks
- It prevents essential network elements.
- To spy using malware itself, it installs extra harmful software.
- It receives information and has access to personal data.
- It interferes with some components, rendering the system unusable for users.
- Public Wi-Fi that isn’t secure when unauthorized users place their devices in between a visitor’s device and the network.
- If an attacker’s virus successfully infiltrates the victim’s PC, they can install software to obtain the victim’s secure information.
4.2. ML and DL Algorithms for Cybersecurity
4.2.1. Support Vector Machine Support Vector Machine
4.2.2. K-Nearest Neighbor
4.2.3. Deep Belief Network
4.2.4. Recurrent Neural Networks
4.2.5. Convolutional Neural Networks
4.2.6. Deep Reinforcement Learning
4.2.7. Cloud-Based Detection and Mitigation
4.3. Blockchain-Based Detection and Mitigation
4.4. Hardware-Based Security
4.5. Future Improvements and Challenges
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Ding, J.; Qammar, A.; Zhang, Z.; Karim, A.; Ning, H. Cyber Threats to Smart Grids: Review, Taxonomy, Potential Solutions, and Future Directions. Energies 2022, 15, 6799. [Google Scholar] [CrossRef]
- Mololoth, V.K.; Saguna, S.; Åhlund, C. Blockchain and Machine Learning for Future Smart Grids: A Review. Energies 2023, 16, 528. [Google Scholar] [CrossRef]
- Moreno-Munoz, A.; Bellido-Outeirino, F.; Siano, P.; Gomez-Nieto, M. Mobile social media for smart grids customer engagement: Emerging trends and challenges. Renew. Sustain. Energy Rev. 2016, 53, 1611–1616. [Google Scholar] [CrossRef]
- Abrahamsen, F.E.; Ai, Y.; Cheffena, M. Communication technologies for smart grid: A comprehensive survey. Sensors 2021, 21, 8087. [Google Scholar] [CrossRef]
- Ugwu, J.; Odo, K.C.; Ohanu, C.P.; García, J.; Georgious, R. Comprehensive Review of Renewable Energy Communication Modeling for Smart Systems. Energies 2022, 16, 409. [Google Scholar] [CrossRef]
- Jaiswal, D.M.; Thakre, M.P. Modeling & designing of smart energy meter for smart grid applications. Glob. Transit. Proc. 2022, 3, 311–316. [Google Scholar]
- Kim, Y.; Hakak, S.; Ghorbani, A. Smart grid security: Attacks and defence techniques. IET Smart Grid 2022. [Google Scholar] [CrossRef]
- Appasani, B.; Mishra, S.K.; Jha, A.V.; Mishra, S.K.; Enescu, F.M.; Sorlei, I.S.; Bîrleanu, F.G.; Takorabet, N.; Thounthong, P.; Bizon, N. Blockchain-enabled smart grid applications: Architecture, challenges, and solutions. Sustainability 2022, 14, 8801. [Google Scholar] [CrossRef]
- Mollah, M.B.; Zhao, J.; Niyato, D.; Lam, K.-Y.; Zhang, X.; Ghias, A.M.; Koh, L.H.; Yang, L. Blockchain for future smart grid: A comprehensive survey. IEEE Internet Things J. 2020, 8, 18–43. [Google Scholar] [CrossRef]
- Takiddin, A.; Ismail, M.; Zafar, U.; Serpedin, E. Deep autoencoder-based anomaly detection of electricity theft cyberattacks in smart grids. IEEE Syst. J. 2022, 16, 4106–4117. [Google Scholar] [CrossRef]
- Abed, A.K.; Anupam, A. Review of security issues in Internet of Things and artificial intelligence-driven solutions. Secur. Priv. 2022, e285. [Google Scholar] [CrossRef]
- Vatsyayan, V.; Chakraborty, A.; Rajarajan, G.; Fernandez, A.L. A Detailed Investigation of Popular Attacks on Cyber Physical Systems. In Cyber Security Applications for Industry 4.0; Chapman and Hall/CRC: Boca Raton, FL, USA, 2023; pp. 1–42. [Google Scholar]
- Ghiasi, M.; Niknam, T.; Wang, Z.; Mehrandezh, M.; Dehghani, M.; Ghadimi, N. A comprehensive review of cyber-attacks and defense mechanisms for improving security in smart grid energy systems: Past, present and future. Electr. Power Syst. Res. 2023, 215, 108975. [Google Scholar] [CrossRef]
- Khoei, T.T.; Slimane, H.O.; Kaabouch, N. A Comprehensive Survey on the Cyber-Security of Smart Grids: Cyber-Attacks, Detection, Countermeasure Techniques, and Future Directions. arXiv 2022, arXiv:2207.07738. [Google Scholar]
- Zeng, H.; Ng, Z.W.; Zhou, P.; Lou, X.; Yau, D.K.; Winslett, M. Detecting Cyber Attacks in Smart Grids with Massive Unlabeled Sensing Data. In Proceedings of the 2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Singapore, 25–28 October 2022; pp. 1–7. [Google Scholar]
- Berghout, T.; Benbouzid, M.; Muyeen, S. Machine learning for cybersecurity in smart grids: A comprehensive review-based study on methods, solutions, and prospects. Int. J. Crit. Infrastruct. Prot. 2022, 38, 100547. [Google Scholar] [CrossRef]
- Shah, S.F.A.; Iqbal, M.; Aziz, Z.; Rana, T.A.; Khalid, A.; Cheah, Y.-N.; Arif, M. The role of machine learning and the internet of things in smart buildings for energy efficiency. Appl. Sci. 2022, 12, 7882. [Google Scholar] [CrossRef]
- Luo, J. A Bibliometric Review on Artificial Intelligence for Smart Buildings. Sustainability 2022, 14, 10230. [Google Scholar] [CrossRef]
- Mazhar, T.; Irfan, H.M.; Haq, I.; Ullah, I.; Ashraf, M.; Shloul, T.A.; Ghadi, Y.Y.; Elkamchouchi, D.H. Analysis of Challenges and Solutions of IoT in Smart Grids Using AI and Machine Learning Techniques: A Review. Electronics 2023, 12, 242. [Google Scholar] [CrossRef]
- Szczepaniuk, H.; Szczepaniuk, E.K. Applications of Artificial Intelligence Algorithms in the Energy Sector. Energies 2023, 16, 347. [Google Scholar] [CrossRef]
- Zamponi, M.E.; Barbierato, E. The Dual Role of Artificial Intelligence in Developing Smart Cities. Smart Cities 2022, 5, 728–755. [Google Scholar] [CrossRef]
- Aguilar, J.; Garces-Jimenez, A.; R-Moreno, M.; García, R. A systematic literature review on the use of artificial intelligence in energy self-management in smart buildings. Renew. Sustain. Energy Rev. 2021, 151, 111530. [Google Scholar] [CrossRef]
- Yılmaz, Y.; Uludag, S. Timely detection and mitigation of IoT-based cyberattacks in the smart grid. J. Frankl. Inst. 2021, 358, 172–192. [Google Scholar] [CrossRef]
- Farrukh, Y.A.; Ahmad, Z.; Khan, I.; Elavarasan, R.M. A sequential supervised machine learning approach for cyber attack detection in a smart grid system. In Proceedings of the 2021 North American Power Symposium (NAPS), College Station, TX, USA, 14–16 November 2021; pp. 1–6. [Google Scholar]
- Haque, N.I.; Shahriar, M.H.; Dastgir, M.G.; Debnath, A.; Parvez, I.; Sarwat, A.; Rahman, M.A. Machine learning in generation, detection, and mitigation of cyberattacks in smart grid: A survey. arXiv 2020, arXiv:2010.00661. [Google Scholar]
- Gumaei, A.; Hassan, M.M.; Huda, S.; Hassan, M.R.; Camacho, D.; Del Ser, J.; Fortino, G. A robust cyberattack detection approach using optimal features of SCADA power systems in smart grids. Appl. Soft Comput. 2020, 96, 106658. [Google Scholar] [CrossRef]
- Khazaei, J.; Amini, M.H. Protection of large-scale smart grids against false data injection cyberattacks leading to blackouts. Int. J. Crit. Infrastruct. Prot. 2021, 35, 100457. [Google Scholar] [CrossRef]
- Bertone, F.; Lubrano, F.; Goga, K. Artificial intelligence techniques to prevent cyber attacks on smart grids. Ann. Disaster Risk Sci. ADRS 2020, 3, 208. [Google Scholar] [CrossRef]
- Deepa, N.; Pham, Q.-V.; Nguyen, D.C.; Bhattacharya, S.; Prabadevi, B.; Gadekallu, T.R.; Maddikunta, P.K.R.; Fang, F.; Pathirana, P.N. A survey on blockchain for big data: Approaches, opportunities, and future directions. Future Gener. Comput. Syst. 2022, 131, 209–226. [Google Scholar] [CrossRef]
- Tufail, S.; Batool, S.; Sarwat, A.I. False data injection impact analysis in ai-based smart grid. In Proceedings of the SoutheastCon 2021, Atlanta, GA, USA, 10–13 March 2021; pp. 1–7. [Google Scholar]
- Acharya, S.; Dvorkin, Y.; Karri, R. Causative cyberattacks on online learning-based automated demand response systems. IEEE Trans. Smart Grid 2021, 12, 3548–3559. [Google Scholar] [CrossRef]
- Kumari, A.; Patel, R.K.; Sukharamwala, U.C.; Tanwar, S.; Raboaca, M.S.; Saad, A.; Tolba, A. AI-Empowered Attack Detection and Prevention Scheme for Smart Grid System. Mathematics 2022, 10, 2852. [Google Scholar] [CrossRef]
- Yamin, M.M.; Ullah, M.; Ullah, H.; Katt, B. Weaponized AI for cyber attacks. J. Inf. Secur. Appl. 2021, 57, 102722. [Google Scholar] [CrossRef]
- Li, Y.; Yan, J. Cybersecurity of smart inverters in the smart grid: A survey. IEEE Trans. Power Electron. 2022, 38, 2364–2383. [Google Scholar]
- De Dutta, S.; Prasad, R. Cybersecurity for microgrid. In Proceedings of the 2020 23rd International Symposium on Wireless Personal Multimedia Communications (WPMC), Okayama, Japan, 19–26 October 2020; pp. 1–5. [Google Scholar]
- Mohammadi, E.; Alizadeh, M.; Asgarimoghaddam, M.; Wang, X.; Simões, M.G. A review on application of artificial intelligence techniques in microgrids. IEEE J. Emerg. Sel. Top. Ind. Electron. 2022, 3, 878–890. [Google Scholar] [CrossRef]
- Naderi, E.; Asrari, A. Toward detecting cyberattacks targeting modern power grids: A deep learning framework. In Proceedings of the 2022 IEEE World AI IoT Congress (AIIoT), Seattle, WA, USA, 6–9 June 2022; pp. 357–363. [Google Scholar]
- Wang, W.; Harrou, F.; Bouyeddou, B.; Senouci, S.-M.; Sun, Y. Cyber-attacks detection in industrial systems using artificial intelligence-driven methods. Int. J. Crit. Infrastruct. Prot. 2022, 38, 100542. [Google Scholar] [CrossRef]
- Hassani, H.; Beneki, C.; Unger, S.; Mazinani, M.T.; Yeganegi, M.R. Text mining in big data analytics. Big Data Cogn. Comput. 2020, 4, 1. [Google Scholar] [CrossRef] [Green Version]
- Bonfanti, M.E. Artificial intelligence and the offence-defence balance in cyber security. In Cyber Security: Socio-Technological Uncertainty and Political Fragmentation; Routledge: London, UK, 2022; pp. 64–79. [Google Scholar]
- Kurt, M.N.; Ogundijo, O.; Li, C.; Wang, X. Online cyber-attack detection in smart grid: A reinforcement learning approach. IEEE Trans. Smart Grid 2018, 10, 5174–5185. [Google Scholar] [CrossRef] [Green Version]
- Ahmed, S.; Lee, Y.; Hyun, S.-H.; Koo, I. Feature selection–based detection of covert cyber deception assaults in smart grid communications networks using machine learning. IEEE Access 2018, 6, 27518–27529. [Google Scholar] [CrossRef]
- Li, X.; Ma, J.; Zhu, Y.; Liu, Y. Extraction of Abnormal Points from On-line Operation Data of Intelligent Meter Based on LSTM. In Proceedings of the 2019 IEEE 9th Annual International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER), Suzhou, China, 29 July–2 August 2019; pp. 586–591. [Google Scholar]
- Singh, S.; Yassine, A.; Benlamri, R. Towards hybrid energy consumption prediction in smart grids with machine learning. In Proceedings of the 2018 4th International Conference on Big Data Innovations and Applications (Innovate-Data), Barcelona, Spain, 6–8 August 2018; pp. 44–50. [Google Scholar]
- Sengan, S.; Subramaniyaswamy, V.; Indragandhi, V.; Velayutham, P.; Ravi, L. Detection of false data cyber-attacks for the assessment of security in smart grid using deep learning. Comput. Electr. Eng. 2021, 93, 107211. [Google Scholar] [CrossRef]
- Yetis, Y.; Tehrani, K.; JamshidI, M. A Machine Learning Approach for Wind Speed Forecasting in Microgrids. In Proceedings of the 2022 World Automation Congress (WAC), San Antonio, TX, USA, 11–15 October 2022; pp. 12–17. [Google Scholar]
- Ghenai, C.; Al-Mufti, O.A.A.; Al-Isawi, O.A.M.; Amirah, L.H.L.; Merabet, A. Short-term building electrical load forecasting using adaptive neuro-fuzzy inference system (ANFIS). J. Build. Eng. 2022, 52, 104323. [Google Scholar] [CrossRef]
- Zhang, T.; Ji, X.; Xu, W. Jamming-resilient backup nodes selection for RPL-based routing in smart grid AMI networks. Mob. Netw. Appl. 2022, 27, 329–342. [Google Scholar] [CrossRef]
- Ortega-Fernandez, I.; Liberati, F. A Review of Denial of Service Attack and Mitigation in the Smart Grid Using Reinforcement Learning. Energies 2023, 16, 635. [Google Scholar] [CrossRef]
- Rouzbahani, H.M.; Karimipour, H.; Lei, L. Multi-layer defense algorithm against deep reinforcement learning-based intruders in smart grids. Int. J. Electr. Power Energy Syst. 2023, 146, 108798. [Google Scholar] [CrossRef]
- Khoei, T.T.; Kaabouch, N. Densely Connected Neural Networks for Detecting Denial of Service Attacks on Smart Grid Network. In Proceedings of the 2022 IEEE 13th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY, USA, 26–29 October 2022; pp. 0207–0211. [Google Scholar]
- Chahal, A.; Gulia, P.; Gill, N.S.; Chatterjee, J.M. Performance Analysis of an Optimized ANN Model to Predict the Stability of Smart Grid. Complexity 2022, 2022, 7319010. [Google Scholar] [CrossRef]
- Starke, A.; Nagaraj, K.; Ruben, C.; Aljohani, N.; Zou, S.; Bretas, A.; McNair, J.; Zare, A. Cross-layered distributed data-driven framework for enhanced smart grid cyber-physical security. IET Smart Grid 2022, 5, 398–416. [Google Scholar] [CrossRef]
- Hadjidemetriou, L.; Tertytchny, G.; Karbouj, H.; Charalambous, C.; Michael, M.K.; Sazos, M.; Maniatakos, M. Demonstration of man in the middle attack on a feeder power factor correction unit. In Proceedings of the 2020 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe), The Hague, The Netherlands, 26–28 October 2020; pp. 126–130. [Google Scholar]
- Mohammadpourfard, M.; Khalili, A.; Genc, I.; Konstantinou, C. Cyber-resilient smart cities: Detection of malicious attacks in smart grids. Sustain. Cities Soc. 2021, 75, 103116. [Google Scholar] [CrossRef]
- Radoglou Grammatikis, P.; Sarigiannidis, P.; Efstathopoulos, G.; Panaousis, E. ARIES: A novel multivariate intrusion detection system for smart grid. Sensors 2020, 20, 5305. [Google Scholar] [CrossRef]
- Gunduz, M.Z.; Das, R. Cyber-security on smart grid: Threats and potential solutions. Comput. Netw. 2020, 169, 107094. [Google Scholar] [CrossRef]
- Chen, J.; Mohamed, M.A.; Dampage, U.; Rezaei, M.; Salmen, S.H.; Obaid, S.A.; Annuk, A. A multi-layer security scheme for mitigating smart grid vulnerability against faults and cyber-attacks. Appl. Sci. 2021, 11, 9972. [Google Scholar] [CrossRef]
- Chhaya, L.; Sharma, P.; Bhagwatikar, G.; Kumar, A. Wireless sensor network based smart grid communications: Cyber attacks, intrusion detection system and topology control. Electronics 2017, 6, 5. [Google Scholar] [CrossRef]
- Zhang, H.; Liu, B.; Wu, H. Smart grid cyber-physical attack and defense: A review. IEEE Access 2021, 9, 29641–29659. [Google Scholar] [CrossRef]
- Musleh, A.S.; Yao, G.; Muyeen, S. Blockchain applications in smart grid–review and frameworks. IEEE Access 2019, 7, 86746–86757. [Google Scholar] [CrossRef]
- Nabil, M.; Ismail, M.; Mahmoud, M.; Shahin, M.; Qaraqe, K.; Serpedin, E. Deep learning-based detection of electricity theft cyber-attacks in smart grid AMI networks. In Deep Learning Applications for Cyber Security; Springer: Cham, Switzerland, 2019; pp. 73–102. [Google Scholar]
- Zhang, K.; Hu, Z.; Zhan, Y.; Wang, X.; Guo, K. A smart grid AMI intrusion detection strategy based on extreme learning machine. Energies 2020, 13, 4907. [Google Scholar] [CrossRef]
- Ismail, M.; Shahin, M.; Shaaban, M.F.; Serpedin, E.; Qaraqe, K. Efficient detection of electricity theft cyber attacks in AMI networks. In Proceedings of the 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, Spain, 15–18 April 2018; pp. 1–6. [Google Scholar]
- Goranović, A.; Meisel, M.; Fotiadis, L.; Wilker, S.; Treytl, A.; Sauter, T. Blockchain applications in microgrids an overview of current projects and concepts. In Proceedings of the IECON 2017-43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, 29 October–1 November 2017; pp. 6153–6158. [Google Scholar]
- Ahl, A.; Yarime, M.; Tanaka, K.; Sagawa, D. Review of blockchain-based distributed energy: Implications for institutional development. Renew. Sustain. Energy Rev. 2019, 107, 200–211. [Google Scholar] [CrossRef]
- Mylrea, M.; Gourisetti, S.N.G. Blockchain for smart grid resilience: Exchanging distributed energy at speed, scale and security. In Proceedings of the 2017 Resilience Week (RWS), Wilmington, DE, USA, 18–22 September 2017; pp. 18–23. [Google Scholar]
- Pop, C.; Cioara, T.; Antal, M.; Anghel, I.; Salomie, I.; Bertoncini, M. Blockchain based decentralized management of demand response programs in smart energy grids. Sensors 2018, 18, 162. [Google Scholar] [CrossRef] [Green Version]
- Hossain, E.; Khan, I.; Un-Noor, F.; Sikander, S.S.; Sunny, M.S.H. Application of big data and machine learning in smart grid, and associated security concerns: A review. IEEE Access 2019, 7, 13960–13988. [Google Scholar] [CrossRef]
- De Dutta, S.; Prasad, R. Security for smart grid in 5G and beyond networks. Wirel. Pers. Commun. 2019, 106, 261–273. [Google Scholar] [CrossRef]
- Van Cutsem, O.; Dac, D.H.; Boudou, P.; Kayal, M. Cooperative energy management of a community of smart-buildings: A Blockchain approach. Int. J. Electr. Power Energy Syst. 2020, 117, 105643. [Google Scholar] [CrossRef]
- Mengelkamp, E.; Notheisen, B.; Beer, C.; Dauer, D.; Weinhardt, C. A blockchain-based smart grid: Towards sustainable local energy markets. Comput. Sci.-Res. Dev. 2018, 33, 207–214. [Google Scholar] [CrossRef]
- Ahsan, M.; Nygard, K.E.; Gomes, R.; Chowdhury, M.M.; Rifat, N.; Connolly, J.F. Cybersecurity threats and their mitigation approaches using Machine Learning—A Review. J. Cybersecur. Priv. 2022, 2, 527–555. [Google Scholar] [CrossRef]
- Fischer, E. Cybersecurity Issues and Challenges; Library of Congress: Washington, DC, USA, 2017. [Google Scholar]
- Fakiha, B. Business organization security strategies to cyber security threats. Int. J. Saf. Secur. Eng 2021, 11, 101–104. [Google Scholar] [CrossRef]
- Sun, N.; Zhang, J.; Gao, S.; Zhang, L.Y.; Camtepe, S.; Xiang, Y. Data analytics of crowdsourced resources for cybersecurity intelligence. In Proceedings of the Network and System Security: 14th International Conference, NSS 2020, Proceedings 14, Melbourne, VIC, Australia, 25–27 November 2020; pp. 3–21. [Google Scholar]
- Singh, H.; Pallagani, V.; Khandelwal, V.; Venkanna, U. IoT based smart home automation system using sensor node. In Proceedings of the 2018 4th International Conference on Recent Advances in Information Technology (RAIT), Dhanbad, India, 15–17 March 2018; pp. 1–5. [Google Scholar]
- Muslih, M.; Supardi, D.; Multipi, E.; Nyaman, Y.M.; Rismawan, A. Developing smart workspace based IOT with artificial intelligence using telegram chatbot. In Proceedings of the 2018 International Conference on Computing, Engineering, and Design (ICCED), Bangkok, Thailand, 6–8 September 2018; pp. 230–234. [Google Scholar]
- Nur Asyik, H.; Dirvi Eko, J. Design and Application of Internet of Things (IoT) for smart grid power system. In Electrical Engineering and Computer Control; Politeknik Negeri Madiun: Madiun, Indonesia, 2017. [Google Scholar]
- Junfitrhana, A.P.; Langlangbuana, M.L.; Fatah, W.A. Developing potential agriculture land detector for determine suitable plant using Raspberry-Pi. In Proceedings of the 2017 International Conference on Computing, Engineering, and Design (Icced), Kuala Lumpur, Malaysia, 23–25 November 2017; pp. 1–4. [Google Scholar]
- Kishore, P.; Veeramanikandasamy, T.; Sambath, K.; Veerakumar, S. Internet of things based low-cost real-time home automation and smart security system. Int. J. Adv. Res. Comput. Commun. Eng. 2017, 6, 505–509. [Google Scholar]
- Geetha, A.; Sreenath, N. Byzantine attacks and its security measures in mobile adhoc networks. Int’l J. Comput. Commun. Instrum. Eng. (IJCCIE 2016) 2016, 3, 42–47. [Google Scholar]
- Ding, G.; Wang, J.; Wu, Q.; Zhang, L.; Zou, Y.; Yao, Y.-D.; Chen, Y. Robust spectrum sensing with crowd sensors. IEEE Trans. Commun. 2014, 62, 3129–3143. [Google Scholar] [CrossRef]
- Arani, M.F.; Jahromi, A.A.; Kundur, D.; Kassouf, M. Modeling and simulation of the aurora attack on microgrid point of common coupling. In Proceedings of the 2019 7th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES), Montreal, QC, Canada, 15 April 2019; pp. 1–6. [Google Scholar]
- Generation, D.; Storage, E. IEEE Standard for Interconnection and Interoperability of Distributed Energy Resources with Associated Electric Power Systems Interfaces Amendment 1: To Provide More; IEEE: Piscataway, NJ, USA, 2020. [Google Scholar]
- Giraldo, J.; Cárdenas, A.; Quijano, N. Integrity attacks on real-time pricing in smart grids: Impact and countermeasures. IEEE Trans. Smart Grid 2016, 8, 2249–2257. [Google Scholar] [CrossRef]
- Maharjan, S.; Zhu, Q.; Zhang, Y.; Gjessing, S.; Basar, T. Dependable demand response management in the smart grid: A Stackelberg game approach. IEEE Trans. Smart Grid 2013, 4, 120–132. [Google Scholar] [CrossRef]
- Zhang, Y.; Krishnan, V.; Pi, J.; Kaur, K.; Srivastava, A.; Hahn, A.; Suresh, S. Cyber physical security analytics for transactive energy systems. IEEE Trans. Smart Grid 2019, 11, 931–941. [Google Scholar] [CrossRef]
- Tan, R.; Nguyen, H.H.; Foo, E.Y.; Yau, D.K.; Kalbarczyk, Z.; Iyer, R.K.; Gooi, H.B. Modeling and mitigating impact of false data injection attacks on automatic generation control. IEEE Trans. Inf. Secur. 2017, 12, 1609–1624. [Google Scholar] [CrossRef]
- Sun, G.; Cong, Y.; Dong, J.; Wang, Q.; Lyu, L.; Liu, J. Data poisoning attacks on federated machine learning. IEEE Internet Things J. 2021, 9, 11365–11375. [Google Scholar] [CrossRef]
- Dunn, C.; Moustafa, N.; Turnbull, B. Robustness evaluations of sustainable machine learning models against data poisoning attacks in the internet of things. Sustainability 2020, 12, 6434. [Google Scholar] [CrossRef]
- Velliangiri, S.; Kasaraneni, K.K. Machine learning and deep learning in cyber security for IoT. In Proceedings of the ICDSMLA 2019: Proceedings of the 1st International Conference on Data Science, Machine Learning and Applications; Springer: Singapore, 2020; pp. 975–981. [Google Scholar]
- Handa, A.; Sharma, A.; Shukla, S.K. Machine learning in cybersecurity: A review. Wiley Interdiscip. Rev. Data Min. Knowl. Discov. 2019, 9, e1306. [Google Scholar] [CrossRef]
- Chen, C.; Wang, Y.; Cui, M.; Zhao, J.; Bi, W.; Chen, Y.; Zhang, X. Data-driven detection of stealthy false data injection attack against power system state estimation. IEEE Trans. Ind. Inform. 2022, 18, 8467–8476. [Google Scholar] [CrossRef]
- Bi, J.; Luo, F.; Liang, G.; Yang, X.; He, S.; Dong, Z.Y. Impact Assessment and Defense for Smart Grids with FDIA Against AMI. IEEE Trans. Netw. Sci. Eng. 2022, 1–13. [Google Scholar] [CrossRef]
- Saber, A.M.; Youssef, A.; Svetinovic, D.; Zeineldin, H.H.; El-Saadany, E.F. Anomaly-Based Detection of Cyberattacks on Line Current Differential Relays. IEEE Trans. Smart Grid 2022, 13, 4787–4800. [Google Scholar] [CrossRef]
- Abdel-Basset, M.; Moustafa, N.; Hawash, H. Privacy-Preserved Generative Network for Trustworthy Anomaly Detection in Smart Grids: A Federated Semisupervised Approach. IEEE Trans. Ind. Inform. 2022, 19, 995–1005. [Google Scholar] [CrossRef]
- Luo, H.; Zhu, H.; Liu, S.; Liu, Y.; Zhu, X.; Lai, J. 3-D Auxiliary Classifier GAN for Hyperspectral Anomaly Detection via Weakly Supervised Learning. IEEE Geosci. Remote Sens. Lett. 2022, 19, 6009805. [Google Scholar] [CrossRef]
- Zheng, X.; Xu, N.; Trinh, L.; Wu, D.; Huang, T.; Sivaranjani, S.; Liu, Y.; Xie, L. A multi-scale time-series dataset with benchmark for machine learning in decarbonized energy grids. Sci. Data 2022, 9, 359. [Google Scholar] [CrossRef]
- Cao, J.; Wang, D.; Wang, Q.-M.; Yuan, X.-L.; Wang, K.; Chen, C.-L. Network Attack Detection Method of the Cyber-Physical Power System Based on Ensemble Learning. Appl. Sci. 2022, 12, 6498. [Google Scholar] [CrossRef]
- Zhang, Q.; Bai, J.; Liu, Y.; Zhou, Y. Classifying Dynamic Motor Imagery with the Locals-Balanced Extreme Learning Machine. SSRN 2022, 10. [Google Scholar] [CrossRef]
- Gui, Y.; Siddiqui, A.S.; Tamore, S.M.; Saqib, F. Security vulnerabilities of smart meters in smart grid. In Proceedings of the IECON 2019-45th Annual Conference of the IEEE Industrial Electronics Society, Lisbon, Portugal, 14–17 October 2019; pp. 3018–3023. [Google Scholar]
- Konstantinou, C.; Maniatakos, M. Hardware-layer intelligence collection for smart grid embedded systems. J. Hardw. Syst. Secur. 2019, 3, 132–146. [Google Scholar] [CrossRef]
- Siddiqui, A.S.; Gui, Y.; Lawrence, D.; Laval, S.; Plusquellic, J.; Manjrekar, M.; Chowdhury, B.; Saqib, F. Hardware assisted security architecture for smart grid. In Proceedings of the IECON 2018-44th Annual Conference of the IEEE Industrial Electronics Society, Washington, DC, USA, 21–23 October 2018; pp. 2890–2895. [Google Scholar]
- Nath, A.P.D.; Amsaad, F.; Choudhury, M.; Niamat, M. Hardware-based novel authentication scheme for advanced metering infrastructure. In Proceedings of the 2016 IEEE National Aerospace and Electronics Conference (NAECON) and Ohio Innovation Summit (OIS), Dayton, OH, USA, 25–29 July 2016; pp. 364–371. [Google Scholar]
- He, H.; Yan, J. Cyber-physical attacks and defences in the smart grid: A survey. IET Cyber-Phys. Syst. Theory Appl. 2016, 1, 13–27. [Google Scholar] [CrossRef] [Green Version]
- Xin, Y.; Kong, L.; Liu, Z.; Chen, Y.; Li, Y.; Zhu, H.; Gao, M.; Hou, H.; Wang, C. Machine learning and deep learning methods for cybersecurity. IEEE Access 2018, 6, 35365–35381. [Google Scholar] [CrossRef]
- Javed, A.R.; Usman, M.; Rehman, S.U.; Khan, M.U.; Haghighi, M.S. Anomaly detection in automated vehicles using multistage attention-based convolutional neural network. IEEE Trans. Intell. Transp. Syst. 2020, 22, 4291–4300. [Google Scholar] [CrossRef]
- Zhou, A.; Li, Z.; Shen, Y. Anomaly detection of CAN bus messages using a deep neural network for autonomous vehicles. Appl. Sci. 2019, 9, 3174. [Google Scholar] [CrossRef] [Green Version]
- Papernot, N.; McDaniel, P. Deep k-nearest neighbors: Towards confident, interpretable and robust deep learning. arXiv 2018, arXiv:1803.04765. [Google Scholar]
- Sheatsley, R.; Durbin, M.; Lintereur, A.; McDaniel, P. Improving radioactive material localization by leveraging cyber-security model optimizations. IEEE Sens. J. 2021, 21, 9994–10006. [Google Scholar] [CrossRef]
- Larriva-Novo, X.; Vega-Barbas, M.; Villagra, V.A.; Rivera, D.; Alvarez-Campana, M.; Berrocal, J. Efficient distributed preprocessing model for machine learning-based anomaly detection over large-scale cybersecurity datasets. Appl. Sci. 2020, 10, 3430. [Google Scholar] [CrossRef]
- Podder, P.; Bharati, S.; Mondal, M.; Paul, P.K.; Kose, U. Artificial neural network for cybersecurity: A comprehensive review. arXiv 2021, arXiv:2107.01185. [Google Scholar]
- Mathai, K.J. Performance comparison of intrusion detection system between deep belief network (DBN) algorithm and state preserving extreme learning machine (SPELM) algorithm. In Proceedings of the 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), Coimbatore, India, 20–22 February 2019; pp. 1–7. [Google Scholar]
- Huda, S.; Yearwood, J.; Hassan, M.M.; Almogren, A. Securing the operations in SCADA-IoT platform based industrial control system using ensemble of deep belief networks. Appl. Soft Comput. 2018, 71, 66–77. [Google Scholar] [CrossRef]
- Nguyen, G.N.; Le Viet, N.H.; Elhoseny, M.; Shankar, K.; Gupta, B.; Abd El-Latif, A.A. Secure blockchain enabled Cyber–physical systems in healthcare using deep belief network with ResNet model. J. Parallel Distrib. Comput. 2021, 153, 150–160. [Google Scholar] [CrossRef]
- Habibi, M.R.; Baghaee, H.R.; Dragičević, T.; Blaabjerg, F. Detection of false data injection cyber-attacks in DC microgrids based on recurrent neural networks. IEEE J. Emerg. Sel. Top. Power Electron. 2020, 9, 5294–5310. [Google Scholar] [CrossRef]
- Lin, T.-N.; Giles, C.L.; Horne, B.G.; Kung, S.-Y. A delay damage model selection algorithm for NARX neural networks. IEEE Trans. Signal Process. 1997, 45, 2719–2730. [Google Scholar]
- Ullah, I.; Mahmoud, Q.H. Design and development of a deep learning-based model for anomaly detection in IoT networks. IEEE Access 2021, 9, 103906–103926. [Google Scholar] [CrossRef]
- Kravchik, M.; Shabtai, A. Detecting cyber attacks in industrial control systems using convolutional neural networks. In Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and Privacy, Toronto, ON, Canada, 15–19 October 2018; pp. 72–83. [Google Scholar]
- Susilo, B.; Sari, R.F. Intrusion detection in IoT networks using deep learning algorithm. Information 2020, 11, 279. [Google Scholar] [CrossRef]
- McLaughlin, N.; del Rincon, J.M.; Kang, B.; Yerima, S.; Miller, P.; Sezer, S.; Safaei, Y.; Trickel, E.; Zhao, Z.; Doupé, A.; et al. Deep android malware detection. In Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, Scottsdale, AZ, USA, 22–24 March 2017; pp. 301–308. [Google Scholar]
- Li, Y.; Xu, Y.; Liu, Z.; Hou, H.; Zheng, Y.; Xin, Y.; Zhao, Y.; Cui, L. Robust detection for network intrusion of industrial IoT based on multi-CNN fusion. Measurement 2020, 154, 107450. [Google Scholar] [CrossRef]
- Kaddoura, S.; Alfandi, O.; Dahmani, N. A spam email detection mechanism for English language text emails using deep learning approach. In Proceedings of the 2020 IEEE 29th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), Bayonne, France, 10–13 September 2020; pp. 193–198. [Google Scholar]
- Prakash, A.; Priyadarshini, R. An intelligent software defined network controller for preventing distributed denial of service attack. In Proceedings of the 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), Coimbatore, India, 20–21 April 2018; pp. 585–589. [Google Scholar]
- Meti, N.; Narayan, D.; Baligar, V. Detection of distributed denial of service attacks using machine learning algorithms in software defined networks. In Proceedings of the 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Udupi, India, 13–16 September 2017; pp. 1366–1371. [Google Scholar]
- Mulyanto, M.; Faisal, M.; Prakosa, S.W.; Leu, J.-S. Effectiveness of focal loss for minority classification in network intrusion detection systems. Symmetry 2021, 13, 4. [Google Scholar] [CrossRef]
- Ravipati, R.D.; Abualkibash, M. Intrusion detection system classification using different machine learning algorithms on KDD-99 and NSL-KDD datasets-a review paper. Int. J. Comput. Sci. Inf. Technol. (IJCSIT) 2019, 11, 1–16. [Google Scholar] [CrossRef] [Green Version]
- Abrar, I.; Ayub, Z.; Masoodi, F.; Bamhdi, A.M. A machine learning approach for intrusion detection system on NSL-KDD dataset. In Proceedings of the 2020 International Conference on Smart Electronics and Communication (ICOSEC), Trichy, India, 10–12 September 2020; pp. 919–924. [Google Scholar]
- Gao, X.; Shan, C.; Hu, C.; Niu, Z.; Liu, Z. An adaptive ensemble machine learning model for intrusion detection. IEEE Access 2019, 7, 82512–82521. [Google Scholar] [CrossRef]
- Kocher, G.; Kumar, G. Performance analysis of machine learning classifiers for intrusion detection using unsw-nb15 dataset. Comput. Sci. Inf. Technol.(CS IT) 2020, 10, 31–40. [Google Scholar]
- Kasongo, S.M.; Sun, Y. Performance analysis of intrusion detection systems using a feature selection method on the UNSW-NB15 dataset. J. Big Data 2020, 7, 105. [Google Scholar] [CrossRef]
- Russel, M.O.F.K.; Rahman, S.S.M.M.; Islam, T. A large-scale investigation to identify the pattern of app component in obfuscated Android malwares. In Proceedings of the Machine Learning, Image Processing, Network Security and Data Sciences: Second International Conference, MIND 2020, Proceedings Part II 2, Silchar, India, 30–31 July 2020; pp. 513–526. [Google Scholar]
- Singh, M. User-Centered Spam Detection Using Linear and Non-Linear Machine Learning Models. 2019. Available online: https://dspace.library.uvic.ca/handle/1828/10751 (accessed on 15 January 2023).
- Ding, Y.; Zhai, Y. Intrusion detection system for NSL-KDD dataset using convolutional neural networks. In Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence, Shenzhen, China, 8–10 December 2018; pp. 81–85. [Google Scholar]
- Gamage, S.; Samarabandu, J. Deep learning methods in network intrusion detection: A survey and an objective comparison. J. Netw. Comput. Appl. 2020, 169, 102767. [Google Scholar] [CrossRef]
- Potluri, S.; Ahmed, S.; Diedrich, C. Convolutional neural networks for multi-class intrusion detection system. In Proceedings of the Mining Intelligence and Knowledge Exploration: 6th International Conference, MIKE 2018, Proceedings 6, Cluj-Napoca, Romania, 20–22 December 2018; pp. 225–238. [Google Scholar]
- Ferrag, M.A.; Maglaras, L.; Janicke, H.; Smith, R. Deep learning techniques for cyber security intrusion detection: A detailed analysis. In Proceedings of the 6th International Symposium for ICS & SCADA Cyber Security Research 2019, Athens, Greece, 10–12 September 2019; pp. 126–136. [Google Scholar]
- Muhuri, P.S.; Chatterjee, P.; Yuan, X.; Roy, K.; Esterline, A. Using a long short-term memory recurrent neural network (LSTM-RNN) to classify network attacks. Information 2020, 11, 243. [Google Scholar] [CrossRef]
- Sun, P.; Liu, P.; Li, Q.; Liu, C.; Lu, X.; Hao, R.; Chen, J. DL-IDS: Extracting features using CNN-LSTM hybrid network for intrusion detection system. Secur. Commun. Netw. 2020, 2020, 8890306. [Google Scholar] [CrossRef]
- Khan, R.U.; Zhang, X.; Alazab, M.; Kumar, R. An improved convolutional neural network model for intrusion detection in networks. In Proceedings of the 2019 Cybersecurity and Cyberforensics Conference (CCC), Melbourne, VIC, Australia, 8–9 May 2019; pp. 74–77. [Google Scholar]
- Hasan, M.N.; Toma, R.N.; Nahid, A.-A.; Islam, M.M.; Kim, J.-M. Electricity theft detection in smart grid systems: A CNN-LSTM based approach. Energies 2019, 12, 3310. [Google Scholar] [CrossRef] [Green Version]
- Tian, J.; Wang, B.; Li, J.; Wang, Z. Adversarial attacks and defense for CNN based power quality recognition in smart grid. IEEE Trans. Netw. Sci. Eng. 2021, 9, 807–819. [Google Scholar] [CrossRef]
- Rouzbahani, H.M.; Karimipour, H.; Lei, L. An ensemble deep convolutional neural network model for electricity theft detection in smart grids. In Proceedings of the 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Toronto, ON, Canada, 11–14 October 2020; pp. 3637–3642. [Google Scholar]
- Doshi, F.; Pineau, J.; Roy, N. Reinforcement learning with limited reinforcement: Using Bayes risk for active learning in POMDPs. In Proceedings of the 25th International Conference on Machine Learning, Helsinki, Finland, 5–9 July 2008; pp. 256–263. [Google Scholar]
- Liu, Y.; Cheng, L. Relentless false data injection attacks against Kalman-filter-based detection in smart grid. IEEE Trans. Control Netw. Syst. 2022, 9, 1238–1250. [Google Scholar] [CrossRef]
- Chen, J.; Wang, Y.; Lan, T. Bringing fairness to actor-critic reinforcement learning for network utility optimization. In Proceedings of the IEEE INFOCOM 2021-IEEE Conference on Computer Communications, Vancouver, BC, Canada, 10–13 May 2021; pp. 1–10. [Google Scholar]
- Mekni, M.; Jayaramireddy, C.S.; Naraharisetti, S.V.V.S.S. Reinforcement Learning Toolkits for Gaming: A Comparative Qualitative Analysis. J. Softw. Eng. Appl. 2022, 15, 417–435. [Google Scholar] [CrossRef]
- Yu, D.; Ma, Z.; Wang, R. Efficient smart grid load balancing via fog and cloud computing. Math. Probl. Eng. 2022, 2022, 3151249. [Google Scholar] [CrossRef]
- Kaur, M.; Aron, R. A systematic study of load balancing approaches in the fog computing environment. J. Supercomput. 2021, 77, 9202–9247. [Google Scholar] [CrossRef]
- Tran, C.H.; Bui, T.K.; Pham, T.V. Virtual machine migration policy for multi-tier application in cloud computing based on Q-learning algorithm. Computing 2022, 104, 1285–1306. [Google Scholar] [CrossRef]
- Singh, G.; Malhotra, M.; Sharma, A. An adaptive mechanism for virtual machine migration in the cloud environment. Int. J. Cloud Appl. Comput. (IJCAC) 2022, 12, 1–10. [Google Scholar] [CrossRef]
- Cai, T.; Dong, M.; Liu, H.; Nojavan, S. Integration of hydrogen storage system and wind generation in power systems under demand response program: A novel p-robust stochastic programming. Int. J. Hydrog. Energy 2022, 47, 443–458. [Google Scholar] [CrossRef]
- Fan, S.; Wang, X.; Cao, S.; Wang, Y.; Zhang, Y.; Liu, B. A novel model to determine the relationship between dust concentration and energy conversion efficiency of photovoltaic (PV) panels. Energy 2022, 252, 123927. [Google Scholar] [CrossRef]
- Kumari, A.; Chintukumar Sukharamwala, U.; Tanwar, S.; Raboaca, M.S.; Alqahtani, F.; Tolba, A.; Sharma, R.; Aschilean, I.; Mihaltan, T.C. Blockchain-Based Peer-to-Peer Transactive Energy Management Scheme for Smart Grid System. Sensors 2022, 22, 4826. [Google Scholar] [CrossRef]
- Razaque, A.; Al Ajlan, A.; Melaoune, N.; Alotaibi, M.; Alotaibi, B.; Dias, I.; Oad, A.; Hariri, S.; Zhao, C. Avoidance of cybersecurity threats with the deployment of a web-based blockchain-enabled cybersecurity awareness system. Appl. Sci. 2021, 11, 7880. [Google Scholar] [CrossRef]
- Xie, M.; Li, H.; Zhao, Y. Blockchain financial investment based on deep learning network algorithm. J. Comput. Appl. Math. 2020, 372, 112723. [Google Scholar] [CrossRef]
- Alzubi, O.A.; Alzubi, J.A.; Shankar, K.; Gupta, D. Blockchain and artificial intelligence enabled privacy-preserving medical data transmission in Internet of Things. Trans. Emerg. Telecommun. Technol. 2021, 32, e4360. [Google Scholar] [CrossRef]
- Kim, S.-K.; Huh, J.-H. A study on the improvement of smart grid security performance and blockchain smart grid perspective. Energies 2018, 11, 1973. [Google Scholar] [CrossRef] [Green Version]
- Alladi, T.; Chamola, V.; Rodrigues, J.J.; Kozlov, S.A. Blockchain in smart grids: A review on different use cases. Sensors 2019, 19, 4862. [Google Scholar] [CrossRef] [Green Version]
- Long, C.; Zhou, Y.; Wu, J. A game theoretic approach for peer to peer energy trading. Energy Procedia 2019, 159, 454–459. [Google Scholar] [CrossRef]
- Morstyn, T.; Teytelboym, A.; McCulloch, M.D. Bilateral contract networks for peer-to-peer energy trading. IEEE Trans. Smart Grid 2018, 10, 2026–2035. [Google Scholar] [CrossRef]
- Dorri, A.; Hill, A.; Kanhere, S.; Jurdak, R.; Luo, F.; Dong, Z.Y. Peer-to-peer energytrade: A distributed private energy trading platform. In Proceedings of the 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Seoul, Republic of Korea, 14–17 May 2019; pp. 61–64. [Google Scholar]
- Seven, S.; Yao, G.; Soran, A.; Onen, A.; Muyeen, S. Peer-to-peer energy trading in virtual power plant based on blockchain smart contracts. IEEE Access 2020, 8, 175713–175726. [Google Scholar] [CrossRef]
- Han, D.; Zhang, C.; Ping, J.; Yan, Z. Smart contract architecture for decentralized energy trading and management based on blockchains. Energy 2020, 199, 117417. [Google Scholar] [CrossRef]
- Wongthongtham, P.; Marrable, D.; Abu-Salih, B.; Liu, X.; Morrison, G. Blockchain-enabled Peer-to-Peer energy trading. Comput. Electr. Eng. 2021, 94, 107299. [Google Scholar] [CrossRef]
- He, L.; Liu, Y.; Zhang, J. Peer-to-peer energy sharing with battery storage: Energy pawn in the smart grid. Appl. Energy 2021, 297, 117129. [Google Scholar] [CrossRef]
- Mehdinejad, M.; Shayanfar, H.; Mohammadi-Ivatloo, B. Decentralized blockchain-based peer-to-peer energy-backed token trading for active prosumers. Energy 2022, 244, 122713. [Google Scholar] [CrossRef]
- Sarker, I.H.; Colman, A.; Han, J. Recencyminer: Mining recency-based personalized behavior from contextual smartphone data. J. Big Data 2019, 6, 49. [Google Scholar] [CrossRef] [Green Version]
- Ahsan, M.; Gomes, R.; Chowdhury, M.M.; Nygard, K.E. Enhancing machine learning prediction in cybersecurity using dynamic feature selector. J. Cybersecur. Priv. 2021, 1, 199–218. [Google Scholar] [CrossRef]
- Ahsan, M.; Gomes, R.; Denton, A. Smote implementation on phishing data to enhance cybersecurity. In Proceedings of the 2018 IEEE International Conference on Electro/Information Technology (EIT), Rochester, MI, USA, 3–5 May 2018; pp. 531–536. [Google Scholar]
- Shi, Y. Advances in Big Data Analytics; Springer: Berlin/Heidelberg, Germany, 2022. [Google Scholar]
- Freitas, L.O.; Henriques, P.R.; Novais, P. Uncertainty Identification in Context-Aware Systems Using Public Datasets. In Proceedings of the Ambient Intelligence–Software and Applications–12th International Symposium on Ambient Intelligence; Springer: Cham, Switzerland, 2022; pp. 115–125. [Google Scholar]
- Mantas, J. The hazards of data mining in healthcare. Inform. Empower. Healthc. Transform. 2017, 238, 80. [Google Scholar]
- Gupta, I.; Mittal, S.; Tiwari, A.; Agarwal, P.; Singh, A.K. TIDF-DLPM: Term and inverse document frequency based data leakage prevention model. arXiv 2022, arXiv:2203.05367. [Google Scholar]
- Pulido-Gaytan, L.B.; Tchernykh, A.; Cortés-Mendoza, J.M.; Babenko, M.; Radchenko, G. A survey on privacy-preserving machine learning with fully homomorphic encryption. In Proceedings of the High Performance Computing: 7th Latin American Conference, CARLA 2020, Revised Selected Papers 7, Cuenca, Ecuador, 2–4 September 2020; pp. 115–129. [Google Scholar]
- Kjamilji, A.; Savaş, E.; Levi, A. Efficient secure building blocks with application to privacy preserving machine learning algorithms. IEEE Access 2021, 9, 8324–8353. [Google Scholar] [CrossRef]
- Mavroeidis, V.; Vishi, K.; Zych, M.D.; Jøsang, A. The impact of quantum computing on present cryptography. arXiv 2018, arXiv:1804.00200. [Google Scholar] [CrossRef] [Green Version]
- Thomas, T.; Vijayaraghavan, A.P.; Emmanuel, S. Machine Learning Approaches in Cyber Security Analytics; Springer: Singapore, 2020. [Google Scholar]
- Chio, C.; Freeman, D. Machine Learning and Security: Protecting Systems with Data and Algorithms; O’Reilly Media, Inc.: Sebastopol, CA, USA, 2018. [Google Scholar]
References | Cyberattacks | Objectives |
---|---|---|
[10] | Multiple cyberattacks were launched targeting the CIA computers and the five OSI communication layers. | The various forms of cyberattacks and the over-all necessity of taking prevention achievement. An analysis of multiple cyberattacks, including the requirements for their protection, as well as the directions for the future. |
[11] | Analysis of traffic, social engineering, scanning an IP address, scanning a port, scanning a vulnerability, worms, denial of service attacks, forward data thefts, replays, violations of privacy, and DDoS. | Cyber-physical security of smart grids and potential attack scenarios based on information technology. Methods of prevention and detection, as well as the difficulties involved, concerning the threats posed by smart grids. |
[12] | Attacks against the generation system, attacks against the transmission system, attacks against the distribution system and the client side, and attacks against the electrical market. | Critical cyber-physical attacks and the various ways to defend against them. Investigating the effects of combined cyber and physical attacks on smart grids. |
[10] | DoS/DDoS attacks | The smart grid and all of its core elements. Methods now in use for various communication protocols and their underlying systems Attacks of the DoS and DDoS variety, and the effects they have on smart grids. |
[13] | Some of the hacking techniques covered in this article are traffic analysis, social engineering, scanning IP addresses, monitoring ports, scanning vulnerabilities, worms, Trojan horses, DoS, FDI, replay, privacy violations, integrity violations, backdoors, MITM, jamming, popping the HMI, and masquerade. | Major cyberattacks against the smart grid and the effects have various security approaches to solve the cyber-security problem in smart grids. |
[14] | Various forms of online attacks on confidentiality, integrity, availability, authorization, and authenticity. | The most commonly encountered challenges when dealing with smart homes and smart grids. A variety of cyberattack situations, each with its unique defensive measures. Strategies to protect against or avoid the occurrence of cyberattacks. |
[1] | MITM, jamming, FDI, spoofing, DoS, malware, replay attacks. | Multiple cyberattacks have been directed at smart grids and the security systems used. |
[15] | Attacks of various forms launched against energy corporations, renewable energy resources, and metering networks. | Vulnerabilities in the traditional electricity network that cyberattacks can target. In the case of smart grid metering networks, security, and privacy criteria must be addressed research in the future, including its trends and problems. |
Abbreviations | Full Form | Abbreviations | Full Form |
---|---|---|---|
P.M.U.s | power monitoring units | N.I.S | National Institute of Standards |
A.I | Artificial Intelligence | A.M.I | advanced metering infrastructure |
W.A.M.R | wireless asset management relay | IoE | Internet of Energy |
S.G | Smart grid | E.I | Energy Internet |
S.S | Smart system | IoT | Internet of Things |
S.H | Smart House | D.O.E | Department of Energy |
E.V | Electric Vehicle | EISA | Energy Independence and Security Act |
I.G | Intelligent grid | NASPI | North American Synchro Phasor Initiative |
N.E.T.L | National Energy Technology Laboratory | NERC | North American Electric Reliability Corporation |
L.A.N | Local area network | EEGI | European Electric Grids Initiative |
H.A.N | home-area network | ISGTF | Indian Smart grid Task Force |
S.G.M.M | Smart grid Maturity Model | CPRI | Central Power Research Institute’s |
AI Technique | Advantages | Disadvantages |
---|---|---|
ANN | AI methods are more complex to understand than artificial neural networks. A multi-step process known as information technology is used to analyze data and look for a potentially unexpected pattern. It works with a range of teaching techniques [45]. | It has a higher computational cost and tends to overload. The model creation process is based on empirical research [45]. |
SVM | Control parameters in ANN keep the model without being too accurate. This works best when there are apparent differences between the groups in the data set. The kernel technique makes it quick and easy to become an authority on a particular subject [46]. | Large data sets are too complicated for this method. Using this method when there are overlapping categories is not practical. Testing is a slow process [46]. |
ANFIS | By combining the learning capabilities of an ANN with fuzzy systems, a neuro-fuzzy system may automatically create fuzzy if-then rules and optimize their parameters. This fixes the fundamental problems that have prevented designing fuzzy systems up to now [47]. | Depending on the number of fuzzy rules that were initially used. More calculations must be done as unclear regulations are added. |
Cyber-Attack | Objectives | Layers | Impacts | Security Requirements |
---|---|---|---|---|
Jamming Attacks | The main objective is to create trouble with both the data transfer and the data receiving. | Physical Data Link Networks | To prevent the sending and receiving of information collisions by blocking one or more nodes. | Availability |
Spoofing Attacks | Trying to trick an authorized node into getting unauthorized access to the system | Physical Data Link Network Transport | Trying to mislead other nodes in the network. | Integrity Availability Confidentiality Accountability |
Injection Attacks | The practice of inserting false or untrusted data packets into a network. | Data Link Network Transport Application | It injects false data perverting legal procedures and business activities with corruption the appearance in the network of nodes not authorized to be there. | Integrity |
Flooding Attack | The main objective is to Bring about the loss and destruction of system resources. | Data Link Network Transport Application | In a network, failure of individual nodes and loss of availability of resources. | Availability |
Man-in-the-Middle Attack | It blocks or alters the flow of data while it is being transmitted over the network. | Data Link Network Session | Access to confidential information that was not allowed. | Integrity Confidentiality |
Social Engineering Attacks | Using fraud to encourage people to provide confidential information | Application | The users’ right to privacy was violated. The system may suffer either temporary or permanent damage. Take confidential and sensitive information without permission. Theft of personal identity | Confidentiality |
Eavesdropping Attack | Following up on and recording every bit of network activity | Physical Network | A violation of somebody’s security | Confidentiality |
Intrusion Attack | Acquire access to the node or network in an unauthorized manner. | Network Application | To Misuse the resources that are accessible on the network. | Integrity Confidentiality |
Brute Force Attacks | Cracking user names and passwords requires a lot of work. | Session Presentation | It is obtaining access to a user’s system or account without permission. | Integrity Confidentiality |
Time synchronization Attack | Attacking the timing data and causing the nodes to lose their time synchronization | Physical | Events that compromise security, such as location estimation and fault detection, Performance decrease. | Integrity Availability |
Traffic Analysis Attack | Execute command over the computers and other electronic devices linked to the network. | Data Link | Detect the message and analyze it to obtain information about the communication patterns between the nodes. | Confidentiality |
References | Types of Attacks | Solution |
---|---|---|
[94] | FDIA | A method based on data-driven ML to identify stealthy FDIA on state estimate. |
[95] | FDIA | Consider the notion drift while analyzing historical data, and concentrate on the distribution shift. Dimensionality reduction and statistical testing of hypotheses are used. |
[96] | SCA | The data are transformed into a lower-dimensional space using the KPCA approach. The KPCA-transformed data are inputted for the ERT’s SCA assault detection system. |
[97] | DoS | A multi-class classification technique used in the smart grid for anomaly detection. |
[98] | Pulse, ramp, relay trip, and replay attack | Supervised machine learning and model-based mitigation for anomaly detection (AD). The robustness and detection accuracy of the ML model was boosted by physics and signal entropy-based feature extraction. |
[99] | FDIA | A CPADS created using ML techniques, network packet characteristics, and PMU. Metrics. |
[100] | FDIA | A new FLGB ensemble classifier and optimum feature extraction ensemble learning-based FDIA detection algorithm are used. |
[101] | FDIA | Extreme learning machines create a classifier that can identify abnormalities brought on by FDIAs. |
References | Methods | Solution |
---|---|---|
[120] | Naive Bayes | Can be applied to analyses of both discrete and continuous variables. Features are assessed mutually exclusive, speeding up the process and making it applicable for real-time decision-making. |
[121] | Support Vector Machines | In high-dimensional spaces, it effetely uses memory. Features that use numbers and categories |
[122] | Decision Tree | Effectively uses memory in elevated environments. Features that employ categories and numbers |
[123] | Sequential Pattern Mining | Frequent sequential patterns for a frequency support measure. |
[124] | DBSCAN | Identify outliers and separate clusters of high density from sets of low density. |
[125] | ADMIT | It doesn’t need a lot of labeled data to function. Makes use of a recursive clustering algorithm, A K-means clustering variant. |
[126] | A priori algorithm | As a result, the resulting restrictions make sense. Unsupervised, therefore labeled data aren’t needed. |
[73] | Radial Basis Function | Real-time network anomaly detection. |
[127] | Random forest | Multi-class classification of network traffic threat |
[128] | Extra-tree classifier | Multi-class classification of DoS, probe, R2L, and U2R |
[129] | Radial Basis Function | Comparative classification between lazy, eager learning, and deep learning |
[130] | Random forest | Comparative classification between lazy, eager learning, and deep learning. |
[130] | Random forest | Android malware detection |
[131] | ANN | Abilities to learn, classify, and process information; faster self-organization. |
[132] | Deep Flow | Specifically designed to identify malicious software. Flow Droid, a program for static impurity analysis, is employed. Determines the paths taken by potentially sensitive data within Android applications |
[133] | DBNs | Discovers layers of features and uses a feed-forward neural network to optimize discrimination. |
[134] | Deep Belief Network | Real-time network anomaly detection. |
[135] | Gated Recurrent Unit | Multi-class classification of network traffic threats |
[136] | CNN-LSTM | Multi-class classification of DoS, probe, R2L, and U2R. |
[137] | Deep Feed Forward | Differentiating between shallow, intermediate, and deep learning |
[138] | Temporal convolutional networks | Comparative classification between lazy, eager learning, and deep learning. |
[139] | CNN | Android malware detection. |
[140] | Bi-LSTM | Classification of spam and ham from emails. |
References | Objectives | Techniques | Limitations | Solutions |
---|---|---|---|---|
[145] | Auto-scaling of VM and VM-to-PM packing. | The approach is based on shadow routing. | Less no. of hosting PMs by intelligently packing VMs-into-PM. | Less no. of hosting PMs by intelligently packing VMs-into-PM. |
[146] | Balance the load of network resources. | Layered virtual machine migration. | The migration cost is high. | High performance in balancing the bandwidth utilization rate of hosts and sound management of both the physical and network resources. |
[147] | Minimize resource consumption and heavy traffic. | Cluster-aware VM collaborative migration scheme for media cloud. | The approach that has been proposed does not optimize the virtual machine migration in the media cloud. The expense of migration is costly. | A perfect migration is achieved by the utilization of clustering and placement algorithms, as well as an efficient migration of VM media servers. |
[148] | Reduce energy consumption with high migration costs. | An improved grouping genetic algorithm (IGGA). | The migration cost is still high because of the migration of one VM at a time. | Increases the concentration score while bringing down the energy consumed while the consolidation score is high. |
[149] | Minimize energy consumption and excellent migration cost. | Ant colony system (ACO) | The migration cost is still high because of migrating one VM at a time. | Reduces the overall amount of energy used by reducing the number of active PMs while ensuring compliance with the SLA’s quality of service requirements. |
[150] | Lessen energy consumption and excellent migration cost. | Firefly optimization approach. | Because migration may only result in a high utilization rate of network resources, the load cloud data centers are currently carrying is not going away. | Technique for migrating virtual machines in the cloud that is sensitive to energy consumption and moves overloaded VMs to regular PMs. |
References | Methods | Short Description | Findings |
---|---|---|---|
[157] | A game theoretic approach | A framework for energy trade and decision-making based on game theory | The strategy makes P2P trade both fair and optimum. |
[158] | Networks of bilateral agreements for peer-to-peer energy trading | Networks for P2P energy trade that are bilateral and scalable | combines real-time and forward contract trading strategies |
[61] | blockchain Applications in Smart grid | It looked at new blockchain applications and how they were used in the SG. | It showed the advantages of blockchain in the electrical network and the SG framework SPB, which reduces the costs, size, and processing time associated with energy trade. |
[159] | A Distributed Private Energy Trading Platform. | Presented a proof-of-concept for a secure private blockchain energy transaction system. | It showed the advantages of using blockchains in the electrical network and the SPB framework, which lowers the expenses, volume, and processing times related to energy trade. |
[160] | Energy Trading Between Individuals Using a Virtual Power Plant Which Is Powered by Smart Contracts Stored on a blockchain | A public, sale price purchasing mechanism SC enables is recommended for energy trading. | Auction-based energy-trading platform |
[161] | blockchain-based smart contract architecture for distributed generation trade and management | An infrastructure built on the blockchain to close the demand-response gap between energy supply by producers and consumer demand in peer-to-peer energy trading. | More than 25 individuals can trade energy at once due to it. |
[162] | Blockchain-enabled Peer-to-Peer energy trading | investigates the best application of blockchain technology for peer-to-peer energy trading | The method is cheap for blockchain transactions. |
[163] | Energy sharing between peers using batteries | It proposed an energy-sharing architecture based on energy pieces in a community market with a shareholder energy storage system, consumers, and users | Maximizes the income output for the energy supplier |
[164] | Energy-backed token trading that is peer-to-peer and based on a decentralized blockchain platform for active producers and consumers | Utilize the blockchain to enable peer-to-peer trading of energy tokens | The suggested strategy ensures a global and practical resolution while requesting no private information from the participants. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Mazhar, T.; Irfan, H.M.; Khan, S.; Haq, I.; Ullah, I.; Iqbal, M.; Hamam, H. Analysis of Cyber Security Attacks and Its Solutions for the Smart grid Using Machine Learning and Blockchain Methods. Future Internet 2023, 15, 83. https://doi.org/10.3390/fi15020083
Mazhar T, Irfan HM, Khan S, Haq I, Ullah I, Iqbal M, Hamam H. Analysis of Cyber Security Attacks and Its Solutions for the Smart grid Using Machine Learning and Blockchain Methods. Future Internet. 2023; 15(2):83. https://doi.org/10.3390/fi15020083
Chicago/Turabian StyleMazhar, Tehseen, Hafiz Muhammad Irfan, Sunawar Khan, Inayatul Haq, Inam Ullah, Muhammad Iqbal, and Habib Hamam. 2023. "Analysis of Cyber Security Attacks and Its Solutions for the Smart grid Using Machine Learning and Blockchain Methods" Future Internet 15, no. 2: 83. https://doi.org/10.3390/fi15020083
APA StyleMazhar, T., Irfan, H. M., Khan, S., Haq, I., Ullah, I., Iqbal, M., & Hamam, H. (2023). Analysis of Cyber Security Attacks and Its Solutions for the Smart grid Using Machine Learning and Blockchain Methods. Future Internet, 15(2), 83. https://doi.org/10.3390/fi15020083