Detection of Distributed Denial of Charge (DDoC) Attacks Using Deep Neural Networks With Vector Embedding

被引:4
|
作者
Shafee, Ahmed A. [1 ,2 ]
Mahmoud, Mohamed M. E. A. [3 ]
Srivastava, Gautam [4 ,5 ,6 ]
Fouda, Mostafa M. [7 ,8 ]
Alsabaan, Maazen [9 ]
Ibrahem, Mohamed I. [10 ,11 ]
机构
[1] Adams State Univ, Dept Comp Sci, Alamosa, CO 81101 USA
[2] Helwan Univ, Dept Comp Engn, Cairo 81101, Egypt
[3] Tennessee Technol Univ, Dept Elect & Comp Engn, Cookeville, TN 38505 USA
[4] Brandon Univ, Dept Math & Comp Sci, Brandon, MB R7A 6A9, Canada
[5] China Med Univ, Res Ctr Interneural Comp, Taichung 40402, Taiwan
[6] Lebanese Amer Univ, Dept Comp Sci & Math, Beirut, Lebanon
[7] Idaho State Univ, Coll Sci & Engn, Dept Elect & Comp Engn, Pocatello, ID 83209 USA
[8] Ctr Adv Energy Studies CAES, Idaho Falls, ID 83401 USA
[9] King Saud Univ, Coll Comp & Informat Sci, Dept Comp Engn, Riyadh 11451, Saudi Arabia
[10] Augusta Univ, Sch Comp & Cyber Sci, Augusta, GA 30912 USA
[11] Benha Univ, Fac Engn Shoubra, Dept Elect Engn, Cairo 11672, Egypt
关键词
Security; distributed denial of charging attacks; electric vehicles; smart power grid; spatial-temporal charging coordination; COORDINATION; VEHICLES; INTERNET; STRATEGY; ENERGY; SDN;
D O I
10.1109/ACCESS.2023.3296562
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To prevent excessive strain on the electrical grid and avoid long waiting times of the electric vehicle (EV) at charging stations, charging coordination mechanisms have been implemented. However, there is a potential vulnerability that enable adversaries to launch distributed denial of charge (DDoC) attacks. In these attacks, fake charging requests are sent to book charging time slots without showing up for charging. Existing mechanisms assume the requests from EVs are valid and do not address the detection of DDoC attacks. This research paper aims to assess the disruptive capabilities of DDoC attacks on charging coordination mechanisms and utilize deep neural networks incorporated with vector embedding to develop detectors that can protect against these attacks. The detection approach relies on identifying abnormal behavior that deviates from the typical patterns of charging demand at the charging station. To train and evaluate the detectors, we utilize real routes of vehicles and technical parameters of EVs released by their manufacturers to create a benign dataset. Subsequently, various attacks are introduced to generate a malicious dataset. By analyzing this dataset, temporal and spatial correlations are identified, which can be learned by our detectors to detect the attacks accurately. The reason for the design of our detector is based on utilizing the embedding layer to identify concealed patterns in regular charging demand information. Additionally, the deep learning network is employed to comprehend and learn the connections over time in the sequential data, as well as the relationships between the data of adjacent charging stations. We conducted thorough experiments to assess our detectors, and the outcomes demonstrate that the suggested detectors are highly effective in terms of accurately detecting of DDoC attacks while keeping false alarms to a minimum.
引用
收藏
页码:75381 / 75397
页数:17
相关论文
共 50 条
  • [1] Detection of denial of service attacks using neural networks
    Bolanos, RF
    Cadena, CA
    Nino, F
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL X, PROCEEDINGS: MOBILE/WIRELESS COMPUTING AND COMMUNICATION SYSTEMS II, 2002, : 84 - 87
  • [2] Distributed denial of service attack detection using autoencoder and deep neural networks
    Catak, Ferhat Ozgur
    Mustacoglu, Ahmet Fatih
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 37 (03) : 3969 - 3979
  • [3] Optimization of vector convolutional deep neural network using binary real cumulative incarnation for detection of distributed denial of service attacks
    N. G. Bhuvaneswari Amma
    S. Selvakumar
    Neural Computing and Applications, 2022, 34 : 2869 - 2882
  • [4] Optimization of vector convolutional deep neural network using binary real cumulative incarnation for detection of distributed denial of service attacks
    Amma, N. G. Bhuvaneswari
    Selvakumar, S.
    NEURAL COMPUTING & APPLICATIONS, 2022, 34 (04): : 2869 - 2882
  • [5] Distributed Denial of Service Attacks Detection Using Support Vector Machine
    Ahmad, Iftikhar
    Abdullah, Azween B.
    Alghamdi, Abdullah S.
    Hussain, Muhammad
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (01): : 127 - 134
  • [6] DeepDetect: Detection of distributed denial of service attacks using deep learning
    Asad, Muhammad
    Asim, Muhammad
    Javed, Talha
    Beg, Mirza O.
    Mujtaba, Hasan
    Abbas, Sohail
    Computer Journal, 2021, 63 (07): : 983 - 994
  • [7] DeepDetect: Detection of Distributed Denial of Service Attacks Using Deep Learning
    Asad, Muhammad
    Asim, Muhammad
    Javed, Talha
    Beg, Mirza O.
    Mujtaba, Hasan
    Abbas, Sohail
    COMPUTER JOURNAL, 2020, 63 (07): : 983 - 994
  • [8] Detection of distributed denial of service attacks using statistical pre-processor and unsupervised neural networks
    Jalili, R
    Imani-Mehr, F
    Amini, M
    Shahriari, HR
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2005, 3439 : 192 - 203
  • [9] Detection of Distributed Denial of Service Attacks in Software Defined Networks
    Barki, Lohit
    Shidling, Amrit
    Meti, Nisharani
    Narayan, D. G.
    Mulla, Mohammed Moin
    2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2016, : 2576 - 2581
  • [10] Deep learning in distributed denial-of-service attacks detection method for Internet of Things networks
    Aswad, Firas Mohammed
    Ahmed, Ali Mohammed Saleh
    Alhammadi, Nafea Ali Majeed
    Khalaf, Bashar Ahmad
    Mostafa, Salama A.
    JOURNAL OF INTELLIGENT SYSTEMS, 2023, 32 (01)