IDEAS home Printed from https://ideas.repec.org/a/gam/jeners/v15y2022i23p8778-d979986.html
   My bibliography  Save this article

TADA: A Transferable Domain-Adversarial Training for Smart Grid Intrusion Detection Based on Ensemble Divergence Metrics and Spatiotemporal Features

Author

Listed:
  • Pengyi Liao

    (Department of Electrical and Computer Engineering (ECE), Concordia University, Montréal, QC H3G 1M8, Canada)

  • Jun Yan

    (Concordia Institute for Information Systems Engineering (CIISE), Concordia University, Montréal, QC H3G 1M8, Canada)

  • Jean Michel Sellier

    (Ericsson GAIA Montréal, AI hub Canada, Montréal, QC H4S 0B6, Canada)

  • Yongxuan Zhang

    (Department of Computer Science and Software Engineering (CSSE), Concordia University, Montréal, QC H3G 1M8, Canada)

Abstract

For attack detection in the smart grid, transfer learning is a promising solution to tackle data distribution divergence and maintain performance when facing system and attack variations. However, there are still two challenges when introducing transfer learning into intrusion detection: when to apply transfer learning and how to extract effective features during transfer learning. To address these two challenges, this paper proposes a transferability analysis and domain-adversarial training (TADA) framework. The framework first leverages various data distribution divergence metrics to predict the accuracy drop of a trained model and decides whether one should trigger transfer learning to retain performance. Then, a domain-adversarial training model with CNN and LSTM is developed to extract the spatiotemporal domain-invariant features to reduce distribution divergence and improve detection performance. The TADA framework is evaluated in extensive experiments where false data injection (FDI) attacks are injected at different times and locations. Experiments results show that the framework has high accuracy in accuracy drop prediction, with an RMSE lower than 1.79%. Compared to the state-of-the-art models, TADA demonstrates the highest detection accuracy, achieving an average accuracy of 95.58%. Moreover, the robustness of the framework is validated under different attack data percentages, with an average F1-score of 92.02%.

Suggested Citation

  • Pengyi Liao & Jun Yan & Jean Michel Sellier & Yongxuan Zhang, 2022. "TADA: A Transferable Domain-Adversarial Training for Smart Grid Intrusion Detection Based on Ensemble Divergence Metrics and Spatiotemporal Features," Energies, MDPI, vol. 15(23), pages 1-18, November.
  • Handle: RePEc:gam:jeners:v:15:y:2022:i:23:p:8778-:d:979986
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1996-1073/15/23/8778/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1996-1073/15/23/8778/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Kamran Shaukat & Suhuai Luo & Vijay Varadharajan & Ibrahim A. Hameed & Shan Chen & Dongxi Liu & Jiaming Li, 2020. "Performance Comparison and Current Challenges of Using Machine Learning Techniques in Cybersecurity," Energies, MDPI, vol. 13(10), pages 1-27, May.
    2. Sarra Houidi & Dominique Fourer & François Auger & Houda Ben Attia Sethom & Laurence Miègeville, 2021. "Comparative Evaluation of Non-Intrusive Load Monitoring Methods Using Relevant Features and Transfer Learning," Energies, MDPI, vol. 14(9), pages 1-28, May.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Chetna Monga & Deepali Gupta & Devendra Prasad & Sapna Juneja & Ghulam Muhammad & Zulfiqar Ali, 2022. "Sustainable Network by Enhancing Attribute-Based Selection Mechanism Using Lagrange Interpolation," Sustainability, MDPI, vol. 14(10), pages 1-15, May.
    2. Wojciech Szczepanik & Marcin Niemiec, 2022. "Heuristic Intrusion Detection Based on Traffic Flow Statistical Analysis," Energies, MDPI, vol. 15(11), pages 1-19, May.
    3. Nasir, Nida & Kansal, Afreen & Alshaltone, Omar & Barneih, Feras & Shanableh, Abdallah & Al-Shabi, Mohammad & Al Shammaa, Ahmed, 2023. "Deep learning detection of types of water-bodies using optical variables and ensembling," LSE Research Online Documents on Economics 118724, London School of Economics and Political Science, LSE Library.
    4. Yuan Wang & Liping Yang & Jun Wu & Zisheng Song & Li Shi, 2022. "Mining Campus Big Data: Prediction of Career Choice Using Interpretable Machine Learning Method," Mathematics, MDPI, vol. 10(8), pages 1-18, April.
    5. Yuan, Yue & Chen, Zhihua & Wang, Zhe & Sun, Yifu & Chen, Yixing, 2023. "Attention mechanism-based transfer learning model for day-ahead energy demand forecasting of shopping mall buildings," Energy, Elsevier, vol. 270(C).
    6. Fatima Rafiq & Mazhar Javed Awan & Awais Yasin & Haitham Nobanee & Azlan Mohd Zain & Saeed Ali Bahaj, 2022. "Privacy Prevention of Big Data Applications: A Systematic Literature Review," SAGE Open, , vol. 12(2), pages 21582440221, May.
    7. Hail Jung & Jinsu Jeon & Dahui Choi & Jung-Ywn Park, 2021. "Application of Machine Learning Techniques in Injection Molding Quality Prediction: Implications on Sustainable Manufacturing Industry," Sustainability, MDPI, vol. 13(8), pages 1-16, April.
    8. Frank Cremer & Barry Sheehan & Michael Fortmann & Arash N. Kia & Martin Mullins & Finbarr Murphy & Stefan Materne, 2022. "Cyber risk and cybersecurity: a systematic review of data availability," The Geneva Papers on Risk and Insurance - Issues and Practice, Palgrave Macmillan;The Geneva Association, vol. 47(3), pages 698-736, July.
    9. Feng Wu & Wanqiang Xu & Chaoran Lin & Yanwei Zhang, 2022. "Knowledge Trajectories on Public Crisis Management Research from Massive Literature Text Using Topic-Clustered Evolution Extraction," Mathematics, MDPI, vol. 10(12), pages 1-18, June.
    10. Ahmed Abdu & Zhengjun Zhai & Redhwan Algabri & Hakim A. Abdo & Kotiba Hamad & Mugahed A. Al-antari, 2022. "Deep Learning-Based Software Defect Prediction via Semantic Key Features of Source Code—Systematic Survey," Mathematics, MDPI, vol. 10(17), pages 1-26, August.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jeners:v:15:y:2022:i:23:p:8778-:d:979986. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.