[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Sen et al., 2021 - Google Patents

Machine learning based intrusion detection system for real-time smart grid security

Sen et al., 2021

Document ID
17679764356089088243
Author
Sen P
Waghmare S
Publication year
Publication venue
2021 13th IEEE PES Asia Pacific Power & Energy Engineering Conference (APPEEC)

External Links

Snippet

The main objective of this paper is to develop an efficient, scalable, and faster machine learning (ML) based tool for real-time smart grid (SG) security. With the integration of information and communication technologies (ICT), power grid operations have become …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6279Classification techniques relating to the number of classes
    • G06K9/6284Single class perspective, e.g. one-against-all classification; Novelty detection; Outlier detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6268Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • G06K9/6232Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods
    • G06K9/6247Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods based on an approximation criterion, e.g. principal component analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image

Similar Documents

Publication Publication Date Title
Parvez et al. Online power quality disturbance detection by support vector machine in smart meter
US10452845B2 (en) Generic framework to detect cyber threats in electric power grid
EP3373552A1 (en) Multi-modal, multi-disciplinary feature discovery to detect cyber threats in electric power grid
Ganjkhani et al. Integrated cyber and physical anomaly location and classification in power distribution systems
Shirazi et al. Evaluation of anomaly detection techniques for scada communication resilience
Waghmare et al. Data driven approach to attack detection in a cyber-physical smart grid system
Landress A hybrid approach to reducing the false positive rate in unsupervised machine learning intrusion detection
El Chamie et al. Physics-based features for anomaly detection in power grids with micro-pmus
Hu et al. Robust feature extraction and ensemble classification against cyber-physical attacks in the smart grid
Zhang et al. Mitigating blackouts via smart relays: A machine learning approach
Aribisala et al. Machine learning algorithms and their applications in classifying cyber-attacks on a smart grid network
Vosughi et al. Synchrophasor-based event detection, classification, and localization using koopman, transient energy matrix, best worth method, and dynamic graph
Musleh et al. Online characterization and detection of false data injection attacks in wide-area monitoring systems
Sen et al. Machine learning based intrusion detection system for real-time smart grid security
Anderson et al. Distribution system bad data detection using graph signal processing
Aldossary et al. Securing SCADA systems against cyber-attacks using artificial intelligence
Wang et al. Feeder-level fault detection and classification with multiple sensors: A smart grid scenario
Wang et al. Feature selection for precise anomaly detection in substation automation systems
Hu Ensemble feature learning-based event classification for cyber-physical security of the smart grid
Murugesan et al. Mitigating Missing Rate and Early Cyberattack Discrimination Using Optimal Statistical Approach with Machine Learning Techniques in a Smart Grid
Park et al. Machine Learning based Post Event Analysis for Cybersecurity of Cyber-Physical System
Chung et al. The framework of invariant electric vehicle charging network for anomaly detection
Intriago et al. Real-time power system event detection: A novel instance selection approach
Ma Enhancing grid reliability with phasor measurement units
Dai Research on network intrusion detection security based on improved extreme learning algorithms and neural network algorithms