A SHORT REVIEW: CYBER ATTACKS AND DETECTION METHODS BASED ON MACHINE LEARNING AND DEEP LEARNING APPROACHES IN SMART GRIDS
Published 31.07.2024
Keywords
- Power Systems,
- Smart Grids,
- Cyber Attack,
- False Data Injection Attack,
- FDIA
- Machine Learning,
- Deep Learning,
- CNN,
- RNN,
- LSTM ...More
Copyright (c) 2024 Mehmet Karayel; Nevcihan DURU, Mehmet KARA (Co-Author)

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Abstract
Power systems and smart grids constitute critical instruments of national security and the economy. In case of the power system malfunctioning, millions of people are affected. Furthermore, there are extreme financial losses, irreversible data casualties and service outages. Recently, the use of commercial smart measuring and control devices in the field of electricity and power systems has become widespread due to the development of applicable technologies and the reduction of the costs of devices. Although this situation has increased traceability and manageability, it also made smart grids more vulnerable to cyber threats compared to the traditional power systems used before. Cyber threats in smart grids are generally categorized as eavesdropping the data to possess detailed information about the system, tampering with data to disturb the system's stability, denial of services to block accessibility and injecting malicious software that can cause damage to the system. FDI attack is considered one of the most severe cyber-attack types due to its stealthy. FDI attacks disrupt the entire stabilization of the smart grid gradually. Machine learning and deep learning methods in supervised, semi-supervised and unsupervised domains have been widely used to protect smart grids against cyber threats by assisting conventional bad data detection mechanisms. Successful results have mainly been obtained by deep learning algorithms such as CNN and RNN. These algorithms have been supported with improved feature selection techniques to increase the accuracy of the detection and decrease the computational burden of the models. The purpose of the paper is to briefly summarize and combine the significance of smart grids, vulnerabilities of smart grids, cyber threats to smart grids, deep learning and machine learning methods applied against cyber-attacks, especially FDI attacks considered to be the most dangerous attack type and potential future research areas.
References
- S. Vaidya, P. Ambad, C. O’Fallon, S. Bhosle, “Industry 4.0 – A Glimpse,” 2 nd International Conference on Materials Manufacturing and Design Engineering. 11-12 December 2017, Procedia Manufacturing 20 (2018) 1233-238, 2018.
- A.S. George and A.S.H. George, “Industrial Revolution 5.0: The Transformation of The Modern Manufacturing Process To Enable Man And Machine To Work Hand In Hand,” Seybold Report. ISSN NO: 1533-9211. September 2020,
- GW. Arnold, DA. Wollman, GJ. FitzPatrick, D. Prochaska, DG. Holmberg, DH. Su, AR. Hefner, NT. Golmie, TL. Brewer, and M. Bello “2010 NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 1.0,” National Institute of Standards and Technology, Gaithersburg, MD, NIST SP, 1108, 2010.
- A. Gopstein, C. Nguyen, C. O’Fallon, N. Hastings, and D. Wollman, “NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 4.0,” NIST Special Publication 1108r4, 44(16), 3111-3123, 2021.
- K. Keith Stouffer and M. Pease, Guide to Operational Technology (OT) Security, NIST Publication, 2022.
- J. Xie, A. Stefanov, and C.C. Liu, Physical and Cybersecurity in a Smart Grid Environment. In Advances in Energy Systems: The Large-Scale Renewable Energy Integration Challenge, Wiley: Hoboken, NJ, USA, 2019, pp. 85–109.
- C.M. Mathas, C. Vassilakis, N. Kolokotronis, C.C. Zarakovitis, and M.A. Kourtis, On the Design of IoT Security: Analysis of Software Vulnerabilities for Smart Grids. Energies 2021, 14, 2818.
- Y. Xu, Y. Yang, T. Li, J. Ju, and Q. Wang, “Review on cyber vulnerabilities of communication protocols in industrial control system,” in Proceedings of the 2017 IEEE Conference on Energy Internet and Energy System Integration (EI2), Beijing, China, 26–28 November 2017.
- J. Lazaro, A. Astarloa, M. Rodríguez, U. Bidarte and J. Jimenez, A Survey on Vulnerabilities and Countermeasures in the Communications of the Smart Grid. Electronics, 10, 1881, 2021.
- M.Z. Gunduz and R. Das, “Cyber-security on smart grid: Threats and potential solutions,” Comput. Network, vol. 169, 107094, 2020.
- S. Kriaa, M. Bouissou, and L. Pi`etre-Cambac´ed`es, “Modeling the stuxnet attack with bdmp: Towards more formal risk assessments,” in 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS), pages 1–8, 2012.
- R. Khan, P. Maynard, K. McLaughlin, D. Laverty, and S. Sezer. “Threat analysis of blackenergy malware for synchrophasor based real-time control and monitoring in smart grid,” 4th International Symposium for ICS & SCADA Cyber Security Research 2016 4, pages 53–63, 2016.
- Y. Liu, P. Ning, and M.K. Reiter, “False data injection attacks against state estimation in electric power grids,” Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009, pp. 21–32. ACM, New York, NY, USA, 2009.
- S. Sharma, K. R. Niazi, K. Verma, and T. Rawat, “An efficient optimization approach for coordination of network reconfiguration and pv generation on performance improvement of distribution system,” in Control Applications in Modern Power System. Springer, pp.269-278, 2021.
- Y. Zhang, J. Wang, and B. Chen. “Detecting false data injection attacks in smart grids: A semi-supervised deep learning approach,” IEEE Transactions on Smart Grid, 12(1):623–634, 2021.
- A. S. Musleh, M. Debouza, H. M. Khalid, and A. Al-Durra, “Detection of False Data Injection Attacks in Smart Grids: A Real-Time Principle Component Analysis,” 45th Annual Conference of the IEEE Industrial Electronics Society, October 2019.
- F. Mohammadi, M. Saif, M. Ahmadi, and B. Shafai. “A Review of Cyber Resilient Smart Grid,” 2022 World Automation Congress (WAC), Hybrid, San Antonio, TX, USA, October 11-15 2022.
- Yang Weng, Rohit Negi, Christos Faloutsos, and Marija D. Ili´c. Robust data-driven state estimation for smart grid. IEEE Transactions on Smart Grid, 8(4):1956–1967, 2017.
- M. Mohammadpourfard, Y. Weng, M. Pechenizkiy, M. Tajdinian, and B. Mohammadi-Ivatloo, “Ensuring cybersecurity of smart grid against data integrity attacks under concept drift”, Int. J. Electr. Power Energy Syst., vol. 119, p. 105947, Jul. 2020.
- J. Yan, B. Tang, and H. He. “Detection of false data attacks in smart grid with supervised learning,” 2016 International Joint Conference on Neural Networks (IJCNN), pages 1395–1402, 2016.
- B. Wang, P. Zhu, Y. Chen, P. Xun, and Z. Zhang, “False Data Injection Attack Based on Hyperplane Migration of Support Vector Machine in Transmission Network of the Smart Grid,” Symmetry, Vol. 10(5), May 2018.
- P. Xun, P. Zhu, Z. Zhang, P. Cui, and Y. Xiong, “Detectors on Edge Nodes against False Data Injection on Transmission Lines of Smart Grid,” Electronics, Vol. 7(6), Jun. 2018.
- Y. An and D. Liu, “Multivariate Gaussian-Based False Data Detection against Cyber-Attacks,” IEEE Access, vol. 7, pp. 119804–119812, 2019.
- J. Jiang, J. Wu, C. Long, and S. Li, “Location of False Data Injection Attacks in Power System,” 2019 Chinese Control Conference, Jul. 2019.
- M. Panthi, “Anomaly detection in smart grids using machine learning techniques,” 2020 First International Conference on Power, Control and Computing Technologies (ICPC2T), pages 220–222, 2020.
- S. Ahmed, Y. Lee, S. H. Hyun, and I. Koo, “Unsupervised Machine Learning-Based Detection of Covert Data Integrity Assault in Smart Grid Networks Utilizing Isolation Forest,” IEEE Trans. Inf. Forensics Secur., vol. 14, no. 10, pp. 2765–2777, October 2019.
- M. R. Camana Acosta, S. Ahmed, C.E. Garcia, and I. Koo, “Extremely randomized trees-based scheme for stealthy cyber-attack detection in smart grid networks,” IEEE Access, vol. 8, pp. 19921–19933, 2020.
- E. Drayer and T. Routtenberg, “Intrusion Detection in Smart Grid Measurement Infrastructures Based on Principal Component Analysis,” 2019 IEEE Milan PowerTech, Jun. 2019.
- A. Saeed, L. Youngdoo, H. Seung-Ho, and I. Koo. “Feature selection–based detection of covert cyber deception assaults in smart grid communications networks using machine learning,” IEEE Access, 6:27518–27529, 2018.
- J. Sakhnini, H. Karimipour and A. Dehghantanha, "Smart Grid Cyber Attacks Detection Using Supervised Learning and Heuristic Feature Selection," 2019 IEEE 7th International Conference on Smart Energy Grid Engineering (SEGE), Oshawa, ON, Canada, pp. 108-112, 2019.
- D. Wang, X. Wang, Y. Zhang, and L. Jin, “Detection of power grid disturbances and cyber-attacks based on machine learning”, J. Inf. Secur. Appl., vol. 46, pp. 42–52, Jun. 2019.
- S. Wei, J. Xu, Z. Wu, Q. Hu, and X. Yu, “A False Data Injection Attack Detection Strategy for Unbalanced Distribution Networks State Estimation,” IEEE Transactions on Smart Grid, in press.
- S.H. Majidi, S. Hadayeghparast, and H. Karimipour, H. “FDI attack detection using extra trees algorithm and deep learning algorithm-autoencoder in smart grid,” International Journal of Critical Infrastructure Protection, 2022.
- J. Ding, A. Qammar, Z. Zhang, and H. Ning, “Cyber Threats to Smart Grids:Review, Taxonomy, Potential Solution and Future Directions,” MDPI, 2022.
- L. Gotsev, B. Jekov, Y., Parusheva, and E. Kovatcheva, “Cyber Threats on Smart Grid: Concerns, Attacks and Advanced Detection,” 2022 International Conference on Electrical, Computer and Energy Technologies (ICECET), 2022.
- T. Teng and L. Ma, “Deep learning-based risk management of financial market in smart grid, ” Computers and Electrical Engineering, 2022.
- D.M., Menon and N.A. Radhika, “Trust-Based Framework and Deep Learning-Based Attack Detection for Smart Grid Home Area Network.”, International Journal of Intelligent Engineering and Systems, 2022.
- R. Rituraj, “An Investigation into Methods and Applications of Deep Learning in Smart Grid,” ICCC 2022, 10th Jubilee International Conference on Computational Cybernetics and Cyber Medical Systems, 2022.
- A. Khan, “Detection of False Data Injection Cyber-Attack in Smart Grid by Convolutional Neural Network-Based Deep Learning Technique,” Lecture Notes in Electrical Engineering, 2022.
- H.N. Monday, J.P. Li, G.U Nneji,. A.Z. Yutra, B.D. Lemessa, S. Nahar, E.C. James, and A.U. Haq, “The Capability of Wavelet Convolutional Neural Network for Detecting Cyber Attack of Distributed Denial of Service in Smart Grid,” 18th International Computer Conference on Wavelet Active Media Technology and Information Processing, ICCWAMTIP 2021, 2021.
- Y.Wang, Z. Zhang, J. Ma, Q. Jin, “KFRNN: An Effective False Data Injection Attack Detection in Smart Grid Based on Kalman Filter and Recurrent Neural Network,” IEEE Internet of Things Journal, 2022.
- Y. Wang, W. Shi, Q Jin, and J. Ma, “An accurate false data detection in smart grid based on residual recurrent neural network and adaptive threshold,” IEEE International Conference on Energy Internet, ICEI 2019, 2019.
- Y. Wang, D. Chen, C. Zhang, X. Chen, B. Huang, and Cheng, X., “Wide and Recurrent Neural Networks for Detection of False Data Injection in Smart Grids,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2019.
- A. Ayad, H.E.Z. Farag, A.Youssef, and E.F. El-Saadany, “Detection of false data injection attacks in smart grids using Recurrent Neural Networks.”, 2018 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference, ISGT 2018, 2018.
- L. Yang, Y. Zhai, Z. Li, “Deep learning for online AC False Data Injection Attack detection in smart grids: An approach using LSTM-Autoencoder,” Journal of Network and Computer Applications, 2021.
- M. Alazab, S. Khan, S.S.R. Krishnan, Q.V. Pham, M.P.K. Reddy, and T.R. Gadekallu, “A Multidirectional LSTM Model for Predicting the Stability of a Smart Grid,” IEEE Access, 2020.
- N.C. Enriquez, and Y. Weng, “Attack Power System State Estimation by Implicitly Learning the Underlying Models, ” IEEE Transactions On Smart Grid, VOL. 14, NO. 1, January 2023.
- R. D. Zimmerman, C. E. Murillo-Sanchez, and R. J. Thomas, “MATPOWER: Steady-state operations, planning, and analysis tools for power systems research and education,” IEEE Trans. Power Syst., vol. 26, no. 1, pp. 12–19, Feb. 2011.G. Eason, B. Noble, and I. N. Sneddon, “On certain integrals of Lipschitz-Hankel type involving products of Bessel functions,” Phil. Trans. Roy. Soc. London, vol. A247, pp. 529–551, April 1955.