Journal Home > Volume 7 , Issue 2

Big data has the ability to open up innovative and ground-breaking prospects for the electrical grid, which also supports to obtain a variety of technological, social, and financial benefits. There is an unprecedented amount of heterogeneous big data as a consequence of the growth of power grid technologies, along with data processing and advanced tools. The main obstacles in turning the heterogeneous large dataset into useful results are computational burden and information security. The original contribution of this paper is to develop a new big data framework for detecting various intrusions from the smart grid systems with the use of AI mechanisms. Here, an AdaBelief Exponential Feature Selection (AEFS) technique is used to efficiently handle the input huge datasets from the smart grid for boosting security. Then, a Kernel based Extreme Neural Network (KENN) technique is used to anticipate security vulnerabilities more effectively. The Polar Bear Optimization (PBO) algorithm is used to efficiently determine the parameters for the estimate of radial basis function. Moreover, several types of smart grid network datasets are employed during analysis in order to examine the outcomes and efficiency of the proposed AdaBelief Exponential Feature Selection- Kernel based Extreme Neural Network (AEFS-KENN) big data security framework. The results reveal that the accuracy of proposed AEFS-KENN is increased up to 99.5% with precision and AUC of 99% for all smart grid big datasets used in this study.


menu
Abstract
Full text
Outline
About this article

An Intelligent Big Data Security Framework Based on AEFS-KENN Algorithms for the Detection of Cyber-Attacks from Smart Grid Systems

Department of Electrical and Electronics Engineering, CMR College of Engineering & Technology, Hyderabad 501401, India
Department of Electronics and Communication Engineering, Vardhaman College of Engineering Kacharam, Shamshabad 501218, India
Department of Electronics and Communication Engineering, Sreenidhi Institute of Science and Technology, Hyderabad 501301, India
Department of Electronics and Communication Engineering, Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, Chennai 600062, India
Department of Electrical and Electronics Engineering, Bharat Institute of Engineering and Technology, Hyderabad 501510, India
Department of Computer Science and Engineering, Amrita School of Computing, Amrita Vishwa Vidhyapeetham, Bengaluru 560035, India
T-IDMS, Department of Computer Science, Faculty of Sciences and Techniques, Moulay Ismail University, Errachidia 52000, Morocco

Abstract

Big data has the ability to open up innovative and ground-breaking prospects for the electrical grid, which also supports to obtain a variety of technological, social, and financial benefits. There is an unprecedented amount of heterogeneous big data as a consequence of the growth of power grid technologies, along with data processing and advanced tools. The main obstacles in turning the heterogeneous large dataset into useful results are computational burden and information security. The original contribution of this paper is to develop a new big data framework for detecting various intrusions from the smart grid systems with the use of AI mechanisms. Here, an AdaBelief Exponential Feature Selection (AEFS) technique is used to efficiently handle the input huge datasets from the smart grid for boosting security. Then, a Kernel based Extreme Neural Network (KENN) technique is used to anticipate security vulnerabilities more effectively. The Polar Bear Optimization (PBO) algorithm is used to efficiently determine the parameters for the estimate of radial basis function. Moreover, several types of smart grid network datasets are employed during analysis in order to examine the outcomes and efficiency of the proposed AdaBelief Exponential Feature Selection- Kernel based Extreme Neural Network (AEFS-KENN) big data security framework. The results reveal that the accuracy of proposed AEFS-KENN is increased up to 99.5% with precision and AUC of 99% for all smart grid big datasets used in this study.

Keywords: smart grid, Machine Learning (ML), big data analytics, AdaBelief Exponential Feature Selection (AEFS), Polar Bear Optimization (PBO), Kernel Extreme Neural Network (KENN)

References(58)

[1]

P. Ganesan and S. A. E. Xavier, An intelligent intrusion detection system in smart grid using PRNN classifier, Intell. Autom. Soft Comput., vol. 35, no. 3, pp. 2979–2996, 2023.

[2]

Y. Farhaoui, Design and implementation of an intrusion prevention system, Int. J. Netw. Secur., vol. 19, no. 5, pp. 675–683, 2017.

[3]

N. Sahani, R. Zhu, J. H. Cho, and C. C. Liu, Machine learning-based intrusion detection for smart grid computing: A survey, ACM Trans. Cyber-Phys. Syst., vol. 7, no. 2, p. 11, 2023.

[4]

P. Liao, J. Yan, J. M. Sellier, and Y. Zhang, Divergence-based transferability analysis for self-adaptive smart grid intrusion detection with transfer learning, IEEE Access, vol. 10, pp. 68807–68818, 2022.

[5]

Y. Farhaoui, Intrusion prevention system inspired immune systems, Indones. J. Electr. Eng. Comput. Sci., vol. 2, no. 1, pp. 168–179, 2016.

[6]

S. Y. Diaba and M. Elmusrati, Proposed algorithm for smart grid DDoS detection based on deep learning, Neural Netw., vol. 159, pp. 175–184, 2023.

[7]

T. T. Khoei and N. Kaabouch, A comparative analysis of supervised and unsupervised models for detecting attacks on the intrusion detection systems, Information, vol. 14, no. 2, p. 103, 2023.

[8]

M. N. Nafees, N. Saxena, A. Cardenas, S. Grijalva, and P. Burnap, Smart grid cyber-physical situational awareness of complex operational technology attacks: A review, ACM Comput. Surv., vol. 55, no. 10, p. 215, 2023.

[9]
Y. Farhaoui, Editorial, Big Data Mining and Analytics, vol. 6, no. 3, pp. 1–2, 2023.
DOI
[10]

I. Ortega-Fernandez and F. Liberati, A review of denial of service attack and mitigation in the smart grid using reinforcement learning, Energies, vol. 16, no. 2, p. 635, 2023.

[11]
M. Skoumperdis, N. Vakakis, M. Diamantaki, C. R. Medentzidis, D. Karanassos, D. Ioannidis, and D. Tzovaras, A novel self-learning cybersecurity system for smart grids, in Power Systems Cybersecurity : Methods, Concepts, and Best Practices, H. H. Alhelou, N. Hatziargyriou, and Z. Y. Dong, eds. Switzerland: Springer, 2023, pp. 337–362.
DOI
[12]
Y. Farhaoui, Big data analytics applied for control systems, in Proc. Int. Conf. Advanced Information Technology, Services and Systems, Tangier, Morocco, 2018, pp. 408–415.
DOI
[13]
Y. Farhaoui, Editorial, Big Data Mining and Analytics, vol. 5, no. 4, pp. 1–2, 2022.
DOI
[14]

M. Ghiasi, T. Niknam, Z. Wang, M. Mehrandezh, M. Dehghani, and N. Ghadimi, A comprehensive review of cyber-attacks and defense mechanisms for improving security in smart grid energy systems: Past, present and future, Electr. Power Syst. Res., vol. 215, p. 108975, 2023.

[15]
L. Z. Velimirović, A. Janjić, and J. D. Velimirović, Machine learning applications in smart grid, in Multi-criteria Decision Making for Smart Grid Design and Operation : A Society 5.0 Perspective, L. Z. Velimirović, A. Janjić, and J. D. Velimirović, eds. Singapore: Springer, 2023, pp. 207–220.
DOI
[16]
S. R. Devi, P. S. L. Kalyampudi, and N. S. Charitha, Cyber attacks, security data detection, and critical loads in the power systems, in Smart Energy and Electric Power Systems : Current Trends and New Intelligent Perspectives, S. Padmanaban, J. B. Holm-Nielsen, K. Padmanandam, R. K. Dhanaraj, and B. Balusamy, eds. Elsevier, 2023, pp. 169–184.
DOI
[17]
S. S. Alaoui, Y. Farhaoui, and B. Aksasse, Hate speech detection using text mining and machine learning, Int. J. Decis. Support Syst. Technol., vol. 14, no. 1, p. 80, 2022.
DOI
[18]

S. S. Alaoui, Y. Farhaoui, and B. Aksasse, Data openness for efficient e-governance in the age of big data, Int. J. Cloud Comput., vol. 10, nos. 5&6, pp. 522–532, 2021.

[19]
P. Liao, J. Yan, J. M. Sellier, and Y. Zhang, TADA: A transferable domain-adversarial training for smart grid intrusion detection based on ensemble divergence metrics and spatiotemporal features, Energies, vol. 15, no. 23, p. 8778, 2022.
DOI
[20]

S. Mishra, Blockchain-based security in smart grid network, Int. J. Commun. Netw. Distrib. Syst., vol. 28, no. 4, pp. 365–388, 2022.

[21]

T. Kisielewicz, S. Stanek, and M. Zytniewski, A multi-agent adaptive architecture for smart-grid-intrusion detection and prevention, Energies, vol. 15, no. 13, p. 4726, 2022.

[22]

C. Hu, J. Yan, and X. Liu, Reinforcement learning-based adaptive feature boosting for smart grid intrusion detection, IEEE Trans. Smart Grid, no. 14, pp. 3150–3163, 2023.

[23]

Y. Farhaoui, Securing a local area network by IDPS open source, Procedia Comput. Sci., vol. 110, pp. 416–421, 2017.

[24]
A. Dehlaghi-Ghadim, M. H. Moghadam, A. Balador, and H. Hansson, Anomaly detection dataset for industrial control systems, arXiv preprint arXiv: 2305.09678, 2023.
DOI
[25]

B. Kim, M. A. Alawami, E. Kim, S. Oh, J. Park, and H. Kim, A comparative study of time series anomaly detection models for industrial control systems, Sensors, vol. 23, no. 3, p. 1310, 2023.

[26]
I. Ortega-Fernandez, M. Sestelo, J. C. Burguillo, and C. Piñón-Blanco, Network intrusion detection system for DDoS attacks in ICS using deep autoencoders, Wirel. Netw. doi: 10.1007/s11276-022-03214-3.
DOI
[27]

E. Vincent, M. Korki, M. Seyedmahmoudian, A. Stojcevski, and S. Mekhilef, Detection of false data injection attacks in cyber–physical systems using graph convolutional network, Electr. Power Syst. Res., vol. 217, p. 109118, 2023.

[28]

Y. Farhaoui, Teaching computer sciences in morocco: An overview, IT Prof., vol. 19, no. 4, pp. 12–15, 2017.

[29]
D. Kaur, A. Anwar, I. Kamwa, S. Islam, S. M. Muyeen, and N. Hosseinzadeh, A Bayesian deep learning approach with convolutional feature engineering to discriminate cyber-physical intrusions in smart grid systems, IEEE Access, vol. 11, pp. 18910–18920, 2023.
DOI
[30]
A. Abid, F. Jemili, and O. Korbaa, Real-time data fusion for intrusion detection in industrial control systems based on cloud computing and big data techniques, Cluster Comput. doi: 10.1007/s10586-023-04087-7.
DOI
[31]

R. Chaganti, W. Suliman, V. Ravi, and A. Dua, Deep learning approach for SDN-enabled intrusion detection system in IoT networks, Information, vol. 14, no. 1, p. 41, 2023.

[32]

C. I. Nwakanma, L. A. C. Ahakonye, J. N. Njoku, J. C. Odirichukwu, S. A. Okolie, C. Uzondu, C. C. Ndubuisi Nweke, and D. S. Kim, Explainable artificial intelligence (XAI) for intrusion detection and mitigation in intelligent connected vehicles: A review, Appl. Sci., vol. 13, no. 3, p. 1252, 2023.

[33]
S. Sossi Alaoui, Y. Farhaoui, and B. Aksasse, A comparative study of the four well-known classification algorithms in data mining, in Proc. Int. Conf. Advanced Information Technology, Services and Systems, Tangier, Morocco, 2018, pp. 362–373.
DOI
[34]

D. Syed, A. Zainab, A. Ghrayeb, S. S. Refaat, H. Abu-Rub, and O. Bouhali, Smart grid big data analytics: Survey of technologies, techniques, and applications, IEEE Access, vol. 9, pp. 59564–59585, 2020.

[35]

L. Cui, Y. Qu, L. Gao, G. Xie, and S. Yu, Detecting false data attacks using machine learning techniques in smart grid: A survey, J. Netw. Comput. Appl., vol. 170, p. 102808, 2020.

[36]
N. Kumar, G. S. Aujla, A. K. Das, and M. Conti, ECCAuth: A secure authentication protocol for demand response management in a smart grid system, IEEE Trans. Ind. Inform., vol. 15, no. 12, pp. 6572–6582, 2019.
DOI
[37]

H. Karimipour, A. Dehghantanha, R. M. Parizi, K. K. R. Choo, and H. Leung, A deep and scalable unsupervised machine learning system for cyber-attack detection in large-scale smart grids, IEEE Access, vol. 7, pp. 80778–80788, 2019.

[38]
A. Tarik and Y. Farhaoui, Recommender system for orientation student, in Big Data and Networks Technologies, Y. Farhaoui, ed. Switzerland: Springer, 2020, pp. 367–370.
DOI
[39]
P. Rohini, S. Tripathi, C. M. Preeti, A. Renuka, J. L. A. Gonzales, and D. Gangodkar, A study on the adoption of wireless communication in big data analytics using neural networks and deep learning, in Proc. 2 nd Int. Conf. Advance Computing and Innovative Technologies in Engineering (ICACITE), Greater Noida, India, 2022, pp. 1071–1076.
DOI
[40]

S. Latif, Z. e Huma, S. S. Jamal, F. Ahmed, J. Ahmad, A. Zahid, K. Dashtipour, M. U. Aftab, M. Ahmad, and Q. H. Abbasi, Intrusion detection framework for the internet of things using a dense random neural network, IEEE Trans. Ind. Inform., vol. 18, no. 9, pp. 6435–6444, 2022.

[41]

H. Alkahtani and T. H. H. Aldhyani, Intrusion detection system to advance internet of things infrastructure-based deep learning algorithms, Complexity, vol. 2021, p. 5579851, 2021.

[42]
R. Vijayanand, D. Devaraj, and B. Kannapiran, A novel deep learning based intrusion detection system for smart meter communication network, in Proc. IEEE Int. Conf. Intelligent Techniques in Control, Optimization and Signal Processing (INCOS), Tamilnadu, India, 2019, pp. 1–3.
DOI
[43]

K. Zhang, Z. Hu, Y. Zhan, X. Wang, and K. Guo, A smart grid AMI intrusion detection strategy based on extreme learning machine, Energies, vol. 13, no. 18, p. 4907, 2020.

[44]
A. El Mouatasim and Y. Farhaoui, Nesterov step reduced gradient algorithm for convex programming problems, in Big Data and Networks Technologies, Y. Farhaoui, ed. Switzerland: Springer, 2020, pp. 140–148.
DOI
[45]
P. R. Grammatikis, P. Sarigiannidis, G. Efstathopoulos, and E. Panaousis, ARIES: A novel multivariate intrusion detection system for smart grid, Sensors, vol. 20, no. 18, p. 5305, 2020.
DOI
[46]

B. Li, Y. Wu, J. Song, R. Lu, T. Li, and L. Zhao, DeepFed: Federated deep learning for intrusion detection in industrial cyber–physical systems, IEEE Trans. Ind. Inform., vol. 17, no. 8, pp. 5615–5624, 2021.

[47]

M. Mahdavisharif, S. Jamali, and R. Fotohi, Big data-aware intrusion detection system in communication networks: A deep learning approach, J. Grid Comput., vol. 19, no. 4, p. 46, 2021.

[48]

I. A. Khan, M. Keshk, D. Pi, N. Khan, Y. Hussain, and H. Soliman, Enhancing IIoT networks protection: A robust security model for attack detection in Internet industrial control systems, Ad Hoc Netw., vol. 134, p. 102930, 2022.

[49]
J. E. Efiong, B. O. Akinyemi, E. A. Olajubu, G. A. Aderounmu, and J. Degila, CyberSCADA network security analysis model for intrusion detection systems in the smart grid, in Advances in Intelligent Systems, Computer Science and Digital Economics IV, Z. Hu, Y. Wang, and M. He, eds. Switzerland: Springer, 2022, pp. 481–499.
DOI
[50]

E. Anthi, L. Williams, M. Rhode, P. Burnap, and A. Wedgbury, Adversarial attacks on machine learning cybersecurity defences in industrial control systems, J. Inform. Secur. Appl., vol. 58, p. 102717, 2021.

[51]

E. Anthi, L. Williams, P. Burnap, and K. Jones, A three-tiered intrusion detection system for industrial control systems, Journal of Cybersecurity, vol. 7, no. 1, p. tyab006, 2021.

[52]
S. Bahadoripour, E. MacDonald, and H. Karimipour, A deep multi-modal cyber-attack detection in industrial control systems, in Proc. IEEE Int. Conf. Industrial Technology (ICIT), Orlando, FL, USA, 2023, pp. 1–6.
DOI
[53]

S. Nagarajan, S. Kayalvizhi, R. Subhashini, and V. Anitha, Hybrid honey badger-world cup algorithm-based deep learning for malicious intrusion detection in industrial control systems, Comput. Ind. Eng., vol. 180, p. 109166, 2023.

[54]

A. Alzahrani and T. H. H. Aldhyani, Design of efficient based artificial intelligence approaches for sustainable of cyber security in smart industrial control system, Sustainability, vol. 15, no. 10, p. 8076, 2023.

[55]

M. Panthi and T. K. Das, Intelligent intrusion detection scheme for smart power-grid using optimized ensemble learning on selected features, Int. J. Crit. Infrastruct. Prot., vol. 39, p. 100567, 2022.

[56]

Y. Zhang, J. Wang, and B. Chen, Detecting false data injection attacks in smart grids: A semi-supervised deep learning approach, IEEE Trans. Smart Grid, vol. 12, pp. 623–634, 2021.

[57]

N. Javaid, N. Jan, and M. U. Javed, An adaptive synthesis to handle imbalanced big data with deep siamese network for electricity theft detection in smart grids, J. Parallel Distrib. Comput., vol. 153, pp. 44–52, 2021.

[58]
N. Elmrabit, F. Zhou, F. Li, and H. Zhou, Evaluation of machine learning algorithms for anomaly detection, in Proc. Int. Conf. Cyber Security and Protection of Digital Services (Cyber Security), Dublin, Ireland, 2020, pp. 1–8.
DOI
Publication history
Copyright
Rights and permissions

Publication history

Received: 22 March 2023
Revised: 20 July 2023
Accepted: 06 August 2023
Published: 22 April 2024
Issue date: June 2024

Copyright

© The author(s) 2023.

Rights and permissions

The articles published in this open access journal are distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).

Return