Sen et al., 2021 - Google Patents
Machine learning based intrusion detection system for real-time smart grid securitySen et al., 2021
- Document ID
- 17679764356089088243
- Author
- Sen P
- Waghmare S
- Publication year
- Publication venue
- 2021 13th IEEE PES Asia Pacific Power & Energy Engineering Conference (APPEEC)
External Links
Snippet
The main objective of this paper is to develop an efficient, scalable, and faster machine learning (ML) based tool for real-time smart grid (SG) security. With the integration of information and communication technologies (ICT), power grid operations have become …
- 238000001514 detection method 0 title abstract description 19
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
- G06K9/6284—Single class perspective, e.g. one-against-all classification; Novelty detection; Outlier detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6232—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods
- G06K9/6247—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods based on an approximation criterion, e.g. principal component analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Parvez et al. | Online power quality disturbance detection by support vector machine in smart meter | |
US10452845B2 (en) | Generic framework to detect cyber threats in electric power grid | |
EP3373552A1 (en) | Multi-modal, multi-disciplinary feature discovery to detect cyber threats in electric power grid | |
Ganjkhani et al. | Integrated cyber and physical anomaly location and classification in power distribution systems | |
Shirazi et al. | Evaluation of anomaly detection techniques for scada communication resilience | |
Waghmare et al. | Data driven approach to attack detection in a cyber-physical smart grid system | |
Landress | A hybrid approach to reducing the false positive rate in unsupervised machine learning intrusion detection | |
El Chamie et al. | Physics-based features for anomaly detection in power grids with micro-pmus | |
Hu et al. | Robust feature extraction and ensemble classification against cyber-physical attacks in the smart grid | |
Zhang et al. | Mitigating blackouts via smart relays: A machine learning approach | |
Aribisala et al. | Machine learning algorithms and their applications in classifying cyber-attacks on a smart grid network | |
Vosughi et al. | Synchrophasor-based event detection, classification, and localization using koopman, transient energy matrix, best worth method, and dynamic graph | |
Musleh et al. | Online characterization and detection of false data injection attacks in wide-area monitoring systems | |
Sen et al. | Machine learning based intrusion detection system for real-time smart grid security | |
Anderson et al. | Distribution system bad data detection using graph signal processing | |
Aldossary et al. | Securing SCADA systems against cyber-attacks using artificial intelligence | |
Wang et al. | Feeder-level fault detection and classification with multiple sensors: A smart grid scenario | |
Wang et al. | Feature selection for precise anomaly detection in substation automation systems | |
Hu | Ensemble feature learning-based event classification for cyber-physical security of the smart grid | |
Murugesan et al. | Mitigating Missing Rate and Early Cyberattack Discrimination Using Optimal Statistical Approach with Machine Learning Techniques in a Smart Grid | |
Park et al. | Machine Learning based Post Event Analysis for Cybersecurity of Cyber-Physical System | |
Chung et al. | The framework of invariant electric vehicle charging network for anomaly detection | |
Intriago et al. | Real-time power system event detection: A novel instance selection approach | |
Ma | Enhancing grid reliability with phasor measurement units | |
Dai | Research on network intrusion detection security based on improved extreme learning algorithms and neural network algorithms |