Enhancing smart grid security: A novel approach for efficient attack detection using SMART framework

被引:0
|
作者
Duan Y. [1 ]
Zhang Y. [1 ]
机构
[1] XinXiang Vocational and Technical College, Henan, Xinxiang
来源
Measurement: Sensors | 2024年 / 32卷
关键词
CNN-BiLSTM; Network; SMART; Smart grid; Word embedding;
D O I
10.1016/j.measen.2023.101015
中图分类号
学科分类号
摘要
Smart Grids are constructed using control, networking, and advanced computing technologies. Malicious attacks are still a possibility for the grid, although there are now insufficiently fast and accurate detection methods. Cybercrimes affecting the security of the smart grid include the compromise of vital client data by attackers, the spread of viruses, cybersecurity mistakes, and vulnerabilities in distributed systems. In order to provide security in a smart grid context, a SMART (Smart Attack detectoR Technique) framework is developed in this paper. The attacker first sends the request to the risk identification, which will identify the request's original source. Risk estimation calculates the degree of risk and gives processing decisions. Following that, word embedding is used to complete the pre-processing. Information will be prohibited if the process is found to be too vulnerable according to CNN-BiLSTM categorization criteria. The data will be sent to the smart grid automatically if the procedure is low vulnerable and there is no assault. A MATLAB simulator is used to implement the suggested approach. In comparison to the presently used CNN-LSTM [10], SCADA [13], and GOOSE [14] approaches, which have success rates of 19.09 %, 32.22 %, and 57.47 %, respectively, the experimental findings indicate that the suggested SMART strategy has a 99 % success rate, which is very high. © 2023
引用
收藏
相关论文
共 50 条
  • [21] Security risk assessment framework for smart car using the attack tree analysis
    Hee-Kyung Kong
    Myoung Ki Hong
    Tae-Sung Kim
    Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 531 - 551
  • [22] Security Framework for Wireless Communications in Smart Distribution Grid
    Wang, Xudong
    Yi, Ping
    IEEE TRANSACTIONS ON SMART GRID, 2011, 2 (04) : 809 - 818
  • [23] Detection of cyber attack in smart grid: A Comparative Study
    Xiao, Junjie
    Wang, Lu
    Qin, Zian
    Bauer, Pavol
    2022 IEEE 20TH INTERNATIONAL POWER ELECTRONICS AND MOTION CONTROL CONFERENCE, PEMC, 2022, : 48 - 54
  • [24] Machine Learning Methods for Attack Detection in the Smart Grid
    Ozay, Mete
    Esnaola, Inaki
    Vural, Fatos Tunay Yarman
    Kulkarni, Sanjeev R.
    Poor, H. Vincent
    IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2016, 27 (08) : 1773 - 1786
  • [25] Secure Aggregation and Attack Detection for Smart Grid System
    Doh, Inshil
    Lim, Jiyoung
    Chae, Kijoon
    2013 16TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS 2013), 2013, : 270 - 275
  • [26] Device Implant Attack Detection for the Smart Grid Infrastructure
    Baig, Zubair A.
    Ahmad, Saif
    2012 7TH INTERNATIONAL CONFERENCE ON COMPUTING AND CONVERGENCE TECHNOLOGY (ICCCT2012), 2012, : 1062 - 1067
  • [27] Adaptive cross-site scripting attack detection framework for smart devices security using intelligent filters and attack ontology
    Chaudhary, Pooja
    Gupta, B. B.
    Singh, A. K.
    SOFT COMPUTING, 2023, 27 (08) : 4593 - 4608
  • [28] Enhancing Smart Grid Resilience: An Educational Approach to Smart Grid Cybersecurity Skill Gap Mitigation
    Pirta-Dreimane, Ruta
    Romanovs, Andrejs
    Bikovska, Jana
    Peksa, Janis
    Vartiainen, Tero
    Valliou, Maria
    Kamsamrong, Jirapa
    Eltahawy, Bahaa
    ENERGIES, 2024, 17 (08)
  • [29] Adaptive cross-site scripting attack detection framework for smart devices security using intelligent filters and attack ontology
    Pooja Chaudhary
    B. B. Gupta
    A. K. Singh
    Soft Computing, 2023, 27 : 4593 - 4608
  • [30] Smart Grid Security: A new Approach to Detect Intruders in a Smart Grid Neighborhood Area Network
    Sedjelmaci, Hichem
    Senouci, Sidi Mohammed
    2016 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2016, : P6 - P11