Skip to main content
Erschienen in: Neural Computing and Applications 13/2020

26.08.2019 | Original Article

A whale optimization algorithm-trained artificial neural network for smart grid cyber intrusion detection

verfasst von: Lida Haghnegahdar, Yong Wang

Erschienen in: Neural Computing and Applications | Ausgabe 13/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The smart grid is a revolutionary, intelligent, next-generation power system. Due to its cyber infrastructure nature, it must be able to accurately and detect potential cyber-attacks and take appropriate actions in a timely manner. This paper creates a new intrusion detection model, which is able to classify the binary-class, triple-class, and multi-class cyber-attacks and power-system incidents. The intrusion detection model is based on a whale optimization algorithm (WOA)-trained artificial neural network (ANN). The WOA is applied to initialize and adjust the weight vector of the ANN to achieve the minimum mean square error. The proposed WOA-ANN model can address the challenges of attacks, failure prediction, and failure detection in a power system. We utilize the Mississippi State University and Oak Ridge National Laboratory databases of power-system attacks to demonstrate the proposed model and show the experimental results. The WOA is able to train the ANN to find the optimal weights. We compare the proposed model with other commonly used classifiers. The comparison results show the superiority of the proposed WOA-ANN model.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Wu Y, Xiao Y, Hohn F, Nordström L, Wang J, Zhao W (2018) Bad data detection using linear WLS and sampled values in digital substations. IEEE Trans Power Delivery 33(1):150–157 Wu Y, Xiao Y, Hohn F, Nordström L, Wang J, Zhao W (2018) Bad data detection using linear WLS and sampled values in digital substations. IEEE Trans Power Delivery 33(1):150–157
2.
Zurück zum Zitat Sridhar S, Hahn A, Govindarasu M (2012) Cyber-physical system security for the electric power grid. Proc IEEE 100(1):210–224 Sridhar S, Hahn A, Govindarasu M (2012) Cyber-physical system security for the electric power grid. Proc IEEE 100(1):210–224
3.
Zurück zum Zitat Pan S, Morris TH, Adhikari U (2015) A specification-based intrusion detection framework for cyber-physical environment in electric power system. Int J Netw Secur 17(2):174–188 Pan S, Morris TH, Adhikari U (2015) A specification-based intrusion detection framework for cyber-physical environment in electric power system. Int J Netw Secur 17(2):174–188
4.
Zurück zum Zitat Liu X, Li Z (2014) Local load redistribution attacks in power systems with incomplete network information. IEEE Trans Smart Grid 5(4):1665–1676 Liu X, Li Z (2014) Local load redistribution attacks in power systems with incomplete network information. IEEE Trans Smart Grid 5(4):1665–1676
5.
Zurück zum Zitat Gupta GP, Kulariya M (2016) A framework for fast and efficient cyber security network intrusion detection using apache spark. Procedia Comput Sci 93:824–831 Gupta GP, Kulariya M (2016) A framework for fast and efficient cyber security network intrusion detection using apache spark. Procedia Comput Sci 93:824–831
6.
Zurück zum Zitat Taha AF, Qi J, Wang J, Panchal JH (2016) Risk mitigation for dynamic state estimation against cyber attacks and unknown inputs. IEEE Trans Smart Grid 9(2):886–899 Taha AF, Qi J, Wang J, Panchal JH (2016) Risk mitigation for dynamic state estimation against cyber attacks and unknown inputs. IEEE Trans Smart Grid 9(2):886–899
7.
Zurück zum Zitat Haghnegahdar L, Wang Y (2018) Cyber security and risk analysis in power systems. In: 2018 Proceedings of IISE industrial & systems engineering research conference (ISERC), pp 349–354 Haghnegahdar L, Wang Y (2018) Cyber security and risk analysis in power systems. In: 2018 Proceedings of IISE industrial & systems engineering research conference (ISERC), pp 349–354
8.
Zurück zum Zitat Deng R, Xiao G, Lu R, Liang H, Vasilakos AV (2017) False data injection on state estimation in power systems—attacks, impacts, and defense: a survey. IEEE Trans Industr Inf 13(2):411–423 Deng R, Xiao G, Lu R, Liang H, Vasilakos AV (2017) False data injection on state estimation in power systems—attacks, impacts, and defense: a survey. IEEE Trans Industr Inf 13(2):411–423
9.
Zurück zum Zitat Mehrdad S, Mousavian S, Madraki G, Dvorkin Y (2018) Cyber-physical resilience of electrical power systems against malicious attacks: a review. Curr Sustain Renew Energy Rep 5(1):14–22 Mehrdad S, Mousavian S, Madraki G, Dvorkin Y (2018) Cyber-physical resilience of electrical power systems against malicious attacks: a review. Curr Sustain Renew Energy Rep 5(1):14–22
10.
Zurück zum Zitat Waghmare S, Kazi F, Singh N (2017) Data driven approach to attack detection in a cyber-physical smart grid system. In: 2017 IEEE in control conference (ICC), pp 271–276 Waghmare S, Kazi F, Singh N (2017) Data driven approach to attack detection in a cyber-physical smart grid system. In: 2017 IEEE in control conference (ICC), pp 271–276
11.
Zurück zum Zitat Pan K, Teixeira A, Cvetkovic, Palensky P (2017) Data attacks on power system state estimation: limited adversarial knowledge vs. limited attack resources. arXiv Preprint arXiv:1708.08355 Pan K, Teixeira A, Cvetkovic, Palensky P (2017) Data attacks on power system state estimation: limited adversarial knowledge vs. limited attack resources. arXiv Preprint arXiv:​1708.​08355
12.
Zurück zum Zitat Elhag S, Fernández A, Bawakid A, Alshomrani S, Herrera F (2015) On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on intrusion detection systems. Expert Syst Appl 42:193–202 Elhag S, Fernández A, Bawakid A, Alshomrani S, Herrera F (2015) On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on intrusion detection systems. Expert Syst Appl 42:193–202
13.
Zurück zum Zitat Eesa AS, Orman Z, Brifcan AMA (2015) A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems. Expert Syst Appl 42(5):2670–2679 Eesa AS, Orman Z, Brifcan AMA (2015) A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems. Expert Syst Appl 42(5):2670–2679
14.
Zurück zum Zitat Giani A, Bitar E, Garcia M, McQueen M, Khargonekar P, Poolla K (2013) Smart grid data integrity attacks. IEEE Trans Smart Grid 4(3):1244–1253 Giani A, Bitar E, Garcia M, McQueen M, Khargonekar P, Poolla K (2013) Smart grid data integrity attacks. IEEE Trans Smart Grid 4(3):1244–1253
15.
Zurück zum Zitat Ericsson GN (2010) Cyber security and power system communication—essential parts of a smart grid infrastructure. IEEE Trans Power Delivery 25(3):1501–1507 Ericsson GN (2010) Cyber security and power system communication—essential parts of a smart grid infrastructure. IEEE Trans Power Delivery 25(3):1501–1507
16.
Zurück zum Zitat Yan Y, Qian Y, Sharif H, Tipper D (2012) A survey on cyber security for smart grid communications. IEEE Commun Surv Tutor 14(4):998–1010 Yan Y, Qian Y, Sharif H, Tipper D (2012) A survey on cyber security for smart grid communications. IEEE Commun Surv Tutor 14(4):998–1010
17.
Zurück zum Zitat Kosut O, Jia L, Thomas RJ, Tong L (2011) Malicious data attacks on the smart grid. IEEE Trans Smart Grid 2(4):645–658 Kosut O, Jia L, Thomas RJ, Tong L (2011) Malicious data attacks on the smart grid. IEEE Trans Smart Grid 2(4):645–658
18.
Zurück zum Zitat Kosut O, Jia L, Thomas RJ, Tong L (2010) Malicious data attacks on smart grid state estimation: attack strategies and countermeasures. In: 2010 1st IEEE international conference in smart grid communications (Smart Grid Comm), pp 220–225 Kosut O, Jia L, Thomas RJ, Tong L (2010) Malicious data attacks on smart grid state estimation: attack strategies and countermeasures. In: 2010 1st IEEE international conference in smart grid communications (Smart Grid Comm), pp 220–225
19.
Zurück zum Zitat Kosut O, Jia, L, Thomas, RJ, Tong L (2010) On malicious data attacks on power system state estimation. In: 2010 international universities power engineering conference (UPEC), 45th conference IEEE, pp 1–6 Kosut O, Jia, L, Thomas, RJ, Tong L (2010) On malicious data attacks on power system state estimation. In: 2010 international universities power engineering conference (UPEC), 45th conference IEEE, pp 1–6
20.
Zurück zum Zitat Kosut O, Jia L, Thomas RJ, Tong L (2010) Limiting false data attacks on power system state estimation. In: 2010 conference on information sciences and systems (CISS), 44th annual conference IEEE, pp 1–6 Kosut O, Jia L, Thomas RJ, Tong L (2010) Limiting false data attacks on power system state estimation. In: 2010 conference on information sciences and systems (CISS), 44th annual conference IEEE, pp 1–6
21.
Zurück zum Zitat Qin Z, Li Q, Chuah MC (2012) Unidentifiable attacks in electric power systems. In: 2012 Proceedings of IEEE/ACM, 3rd international conference on cyber-physical systems IEEE Computer Society, pp 193–202 Qin Z, Li Q, Chuah MC (2012) Unidentifiable attacks in electric power systems. In: 2012 Proceedings of IEEE/ACM, 3rd international conference on cyber-physical systems IEEE Computer Society, pp 193–202
22.
Zurück zum Zitat Yang J, Wu W, Zheng W, Xian W, Zhang B (2016) Performance analysis of sparse recovery models for bad data detection and state estimation in electric power networks. In: 2016 power and energy society general meeting (PESGM) IEEE, pp 1–5 Yang J, Wu W, Zheng W, Xian W, Zhang B (2016) Performance analysis of sparse recovery models for bad data detection and state estimation in electric power networks. In: 2016 power and energy society general meeting (PESGM) IEEE, pp 1–5
23.
Zurück zum Zitat Vukovic O, Sou KC, Dan G, Sandberg H (2012) Network-aware mitigation of data integrity attacks on power system state estimation. IEEE J Sel Areas Commun 30(6):1108–1118 Vukovic O, Sou KC, Dan G, Sandberg H (2012) Network-aware mitigation of data integrity attacks on power system state estimation. IEEE J Sel Areas Commun 30(6):1108–1118
24.
Zurück zum Zitat Chen J, Abur A (2006) Placement of PMUs to enable bad data detection in state estimation. IEEE Trans Power Syst 21(4):1608–1615 Chen J, Abur A (2006) Placement of PMUs to enable bad data detection in state estimation. IEEE Trans Power Syst 21(4):1608–1615
25.
Zurück zum Zitat Yang Q, An D, Min R, Yu W, Yang X, Zhao W (2017) On optimal PMU placement-based defense against data integrity attacks in smart grid. IEEE Trans Inf Forensics Secur 12(7):1735–1750 Yang Q, An D, Min R, Yu W, Yang X, Zhao W (2017) On optimal PMU placement-based defense against data integrity attacks in smart grid. IEEE Trans Inf Forensics Secur 12(7):1735–1750
26.
Zurück zum Zitat Wang W, Lu Z (2013) Cyber security in the smart grid: survey and challenges. Comput Netw 57(5):1344–1371 Wang W, Lu Z (2013) Cyber security in the smart grid: survey and challenges. Comput Netw 57(5):1344–1371
27.
Zurück zum Zitat Pan S, Morris T, Adhikari U (2015) Classification of disturbances and cyber-attacks in power systems using heterogeneous time-synchronized data. IEEE Trans Industr Inf 11(3):650–662 Pan S, Morris T, Adhikari U (2015) Classification of disturbances and cyber-attacks in power systems using heterogeneous time-synchronized data. IEEE Trans Industr Inf 11(3):650–662
28.
Zurück zum Zitat Lin H, Deng Y, Shukla S, Thorp J, Mili L (2012) Cyber security impacts on all-PMU state estimator-a case study on co-simulation platform GECO. In: 2012 3rd international conference smart grid communications (Smart Grid Comm.) IEEE, pp 587–592 Lin H, Deng Y, Shukla S, Thorp J, Mili L (2012) Cyber security impacts on all-PMU state estimator-a case study on co-simulation platform GECO. In: 2012 3rd international conference smart grid communications (Smart Grid Comm.) IEEE, pp 587–592
29.
Zurück zum Zitat Xu W, Hu G, Ho DW, & Feng Z (2019). Distributed secure cooperative control under denial-of-service attacks from multiple adversaries. IEEE Trans Cybern (in press) Xu W, Hu G, Ho DW, & Feng Z (2019). Distributed secure cooperative control under denial-of-service attacks from multiple adversaries. IEEE Trans Cybern (in press)
30.
Zurück zum Zitat Feng Z, Hu G (2019) Secure cooperative event-triggered control of linear multiagent systems under DoS attacks. IEEE Trans Control Syst Technol 27(3):1012–1022 Feng Z, Hu G (2019) Secure cooperative event-triggered control of linear multiagent systems under DoS attacks. IEEE Trans Control Syst Technol 27(3):1012–1022
31.
Zurück zum Zitat Hink RCB, Beaver JM, Buckner MA, Morris T, Adhikari U, Pan S (2014) Machine learning for power system disturbance and cyber-attack discrimination. In: 2014 resilient control systems (ISRCS) 7th international symposium IEEE, pp 1–8 Hink RCB, Beaver JM, Buckner MA, Morris T, Adhikari U, Pan S (2014) Machine learning for power system disturbance and cyber-attack discrimination. In: 2014 resilient control systems (ISRCS) 7th international symposium IEEE, pp 1–8
32.
Zurück zum Zitat Fahad A, Tari Z, Khalil I, Habib I, Alnuweiri H (2013) Toward an efficient and scalable feature selection approach for internet traffic classification. Comput Netw 57(9):2040–2057 Fahad A, Tari Z, Khalil I, Habib I, Alnuweiri H (2013) Toward an efficient and scalable feature selection approach for internet traffic classification. Comput Netw 57(9):2040–2057
33.
Zurück zum Zitat Gong Y, Fang Y, Liu L, Li J (2014) Multi-agent intrusion detection system using feature selection approach. In: 2014 10th international conference on IEEE in intelligent information hiding and multimedia signal processing (IIH-MSP), pp 528–531 Gong Y, Fang Y, Liu L, Li J (2014) Multi-agent intrusion detection system using feature selection approach. In: 2014 10th international conference on IEEE in intelligent information hiding and multimedia signal processing (IIH-MSP), pp 528–531
34.
Zurück zum Zitat Wu Y, Onwuachumba A, Musavi M (2013) Bad data detection and identification using neural network-based reduced model state estimator. In: 2013 green technologies conference IEEE, pp 183–189 Wu Y, Onwuachumba A, Musavi M (2013) Bad data detection and identification using neural network-based reduced model state estimator. In: 2013 green technologies conference IEEE, pp 183–189
35.
Zurück zum Zitat Mirjalili SA, Lewis A (2016) The whale optimization algorithm. Adv Eng Softw 95:51–67 Mirjalili SA, Lewis A (2016) The whale optimization algorithm. Adv Eng Softw 95:51–67
36.
Zurück zum Zitat Yamany W, Fawzy M, Tharwat A, Hassanien AE (2015) Moth-flame optimization for training multi-layer perceptrons. In: 2015 computer engineering conference (ICENCO), 11th international IEEE, pp 267–272 Yamany W, Fawzy M, Tharwat A, Hassanien AE (2015) Moth-flame optimization for training multi-layer perceptrons. In: 2015 computer engineering conference (ICENCO), 11th international IEEE, pp 267–272
37.
Zurück zum Zitat Bozorgi SM, Yazdani S (2019) An improved whale optimization algorithm for optimization problems. J Comput Design Eng 6(3):243–259 Bozorgi SM, Yazdani S (2019) An improved whale optimization algorithm for optimization problems. J Comput Design Eng 6(3):243–259
38.
Zurück zum Zitat Aljarah I, Faris H, Mirjalili S (2018) Optimizing connection weights in neural networks using the whale optimization algorithm. Soft Comput 22(1):1–15 Aljarah I, Faris H, Mirjalili S (2018) Optimizing connection weights in neural networks using the whale optimization algorithm. Soft Comput 22(1):1–15
39.
Zurück zum Zitat Chatterjee S, Sarkar S, Hore S, Dey N, Ashour AS, Balas VE (2017) Particle swarm optimization trained neural network for structural failure prediction of multistoried RC buildings. Neural Comput Appl 28(8):2005–2016 Chatterjee S, Sarkar S, Hore S, Dey N, Ashour AS, Balas VE (2017) Particle swarm optimization trained neural network for structural failure prediction of multistoried RC buildings. Neural Comput Appl 28(8):2005–2016
40.
Zurück zum Zitat Ibrahim RT, Mohammed ZT (2017) Training recurrent neural networks by a hybrid PSO-cuckoo search algorithm for problems optimization. Int J Comput Appl 159(3):32–38 Ibrahim RT, Mohammed ZT (2017) Training recurrent neural networks by a hybrid PSO-cuckoo search algorithm for problems optimization. Int J Comput Appl 159(3):32–38
41.
Zurück zum Zitat Chatterjee S, Dzitac S, Sen S, Rohatinovici N., Dey N, Ashour AS, Balas VE (2017) Hybrid modified cuckoo search-neural network in chronic kidney disease classification. In: 2017 engineering of modern electric systems (EMES), 14th international conference IEEE, pp 164–167 Chatterjee S, Dzitac S, Sen S, Rohatinovici N., Dey N, Ashour AS, Balas VE (2017) Hybrid modified cuckoo search-neural network in chronic kidney disease classification. In: 2017 engineering of modern electric systems (EMES), 14th international conference IEEE, pp 164–167
42.
Zurück zum Zitat Chaowanawatee K, Heednacram A (2012) Implementation of cuckoo search in RBF neural network for flood forecasting. In: 2012 computational intelligence communication systems and networks (CICSyN), 4th international conference IEEE, pp 22–26 Chaowanawatee K, Heednacram A (2012) Implementation of cuckoo search in RBF neural network for flood forecasting. In: 2012 computational intelligence communication systems and networks (CICSyN), 4th international conference IEEE, pp 22–26
43.
Zurück zum Zitat Buczak AL, Guven E (2016) A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun Surv Tutor 18(2):1153–1176 Buczak AL, Guven E (2016) A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun Surv Tutor 18(2):1153–1176
44.
Zurück zum Zitat Bhesdadiya R, Jangir P, Jangir N, Trivedi IN, Ladumor D (2016) Training multi-layer perceptron in neural network using whale optimization algorithm. Indian J Sci Technol 9(19):28–36 Bhesdadiya R, Jangir P, Jangir N, Trivedi IN, Ladumor D (2016) Training multi-layer perceptron in neural network using whale optimization algorithm. Indian J Sci Technol 9(19):28–36
45.
Zurück zum Zitat Kisi Ö (2004) Multi-layer perceptrons with Levenberg–Marquardt training algorithm for suspended sediment concentration prediction and estimation Levenberg–Marquardt. Hydrol Sci J 49(6):1025–1040 Kisi Ö (2004) Multi-layer perceptrons with Levenberg–Marquardt training algorithm for suspended sediment concentration prediction and estimation Levenberg–Marquardt. Hydrol Sci J 49(6):1025–1040
Metadaten
Titel
A whale optimization algorithm-trained artificial neural network for smart grid cyber intrusion detection
verfasst von
Lida Haghnegahdar
Yong Wang
Publikationsdatum
26.08.2019
Verlag
Springer London
Erschienen in
Neural Computing and Applications / Ausgabe 13/2020
Print ISSN: 0941-0643
Elektronische ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-019-04453-w

Weitere Artikel der Ausgabe 13/2020

Neural Computing and Applications 13/2020 Zur Ausgabe

Premium Partner